{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T11:19:12Z","timestamp":1767611952984,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/ijcnn48605.2020.9207627","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T00:40:33Z","timestamp":1601426433000},"page":"1-7","source":"Crossref","is-referenced-by-count":8,"title":["An Adversarial Attack Detection Paradigm With Swarm Optimization"],"prefix":"10.1109","author":[{"given":"Ayyaz-Ul-Haq","family":"Qureshi","sequence":"first","affiliation":[]},{"given":"Hadi","family":"Larijani","sequence":"additional","affiliation":[]},{"given":"Nhamoinesu","family":"Mtetwa","sequence":"additional","affiliation":[]},{"given":"Mehdi","family":"Yousefi","sequence":"additional","affiliation":[]},{"given":"Abbas","family":"Javed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29135-8_5"},{"journal-title":"NSL-KDD &#x2014; Datasets &#x2014; Research","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8488987"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/computers8030059"},{"article-title":"Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network","year":"2019","author":"rawat","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-9042-5_75"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCT.2019.8869492"},{"article-title":"Intriguing properties of neural networks","year":"2013","author":"szegedy","key":"ref18"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"goodfellow","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/UCET.2019.8881840"},{"key":"ref3","first-page":"1","author":"sriram","year":"2019","journal-title":"5G Security Concepts and Challenges"},{"key":"ref6","first-page":"43","author":"mirjalili","year":"2019","journal-title":"Genetic Algorithm"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-007-9149-x"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854599"},{"key":"ref2","article-title":"The current state of affairs in 5g security and the main remaining security challenges","volume":"abs 1904 8394","author":"jover","year":"2019","journal-title":"CoRR"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30244-3_22"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22871-2_7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"article-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition","year":"2014","author":"simonyan","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.502"},{"key":"ref24","article-title":"Technical report on the cleverhans v2.1.0 adversarial examples library","author":"papernot","year":"2018","journal-title":"arXiv preprint arXiv 1610 00768"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CEEC.2018.8674228"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2863036"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICFC.2019.00009"}],"event":{"name":"2020 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2020,7,19]]},"location":"Glasgow, United Kingdom","end":{"date-parts":[[2020,7,24]]}},"container-title":["2020 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9200848\/9206590\/09207627.pdf?arnumber=9207627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:58:04Z","timestamp":1656453484000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9207627\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ijcnn48605.2020.9207627","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}