{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:33:10Z","timestamp":1730266390473,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,18]]},"DOI":"10.1109\/ijcnn52387.2021.9534190","type":"proceedings-article","created":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T20:32:37Z","timestamp":1632342757000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Dynamically Sampled Nonlocal Gradients for Stronger Adversarial Attacks"],"prefix":"10.1109","author":[{"given":"Leo","family":"Schwinn","sequence":"first","affiliation":[]},{"given":"An","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Rene","family":"Raab","sequence":"additional","affiliation":[]},{"given":"Dario","family":"Zanca","sequence":"additional","affiliation":[]},{"given":"Bjoern M.","family":"Eskofier","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Tenbrinck","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Burger","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"7472","article-title":"The-oretically Principled Trade-off between Robustness and Accuracy","volume":"97","author":"zhang","year":"2019","journal-title":"Proceedings of the ICML International Conference on Machine Learning"},{"journal-title":"Fashion-mnist a novel image dataset for benchmarking machine learning algorithms","year":"2017","author":"xiao","key":"ref32"},{"key":"ref31","article-title":"Un-derstanding and Enhancing the Transferability of Adversarial Examples","volume":"abs 1802 9707","author":"wu","year":"2018","journal-title":"CoRR"},{"key":"ref30","article-title":"Fast is better than free: Revisiting adversarial training","author":"wong","year":"0","journal-title":"ICLRE"},{"key":"ref10","article-title":"Nonlocal Modeling, Analysis, and Computation: Nonlocal Modeling, Analysis, and Computation","author":"du","year":"0","journal-title":"SIAM"},{"key":"ref11","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"0","journal-title":"ICLRE"},{"key":"ref12","article-title":"Countering Adversarial Images using Input Transformations","author":"guo","year":"0","journal-title":"ICLRE"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref14","article-title":"Adam: A Method for Stochastic Optimization","author":"kingma","year":"2015","journal-title":"ICLRE"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1.1.222.9220"},{"key":"ref16","article-title":"Ensemble adversarial training: Attacks and defenses","author":"kurakin","year":"0","journal-title":"ICLRE"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref18","article-title":"Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks","author":"lin","year":"0","journal-title":"ICLRE"},{"key":"ref19","article-title":"Towards Deep Learning Models Resistant to Adversarial Attacks","author":"madry","year":"0","journal-title":"ICLRE"},{"key":"ref28","article-title":"Di-versity can be Transferred: Output Diversification for White- and Black-box Attacks","author":"tashiro","year":"0","journal-title":"NeurIPS"},{"key":"ref4","article-title":"Accurate, reliable and fast robustness evaluation","author":"brendel","year":"0","journal-title":"NeurIPS"},{"key":"ref27","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"0","journal-title":"ICLRE"},{"key":"ref3","article-title":"Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models","author":"brendel","year":"0","journal-title":"ICLRE"},{"key":"ref6","article-title":"On Evaluating Adversarial Robustness","volume":"abs 1902 6705","author":"carlini","year":"2019","journal-title":"CoRR"},{"key":"ref29","first-page":"5032","article-title":"Adversarial Risk and the Dangers of Evaluating Against Weak Attacks","volume":"80","author":"uesato","year":"2018","journal-title":"Proceedings of the ICML International Conference on Machine Learning"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1137\/030601296"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref7","first-page":"2206","article-title":"Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks","volume":"119","author":"croce","year":"2020","journal-title":"Proceedings of the ICML International Conference on Machine Learning"},{"key":"ref2","first-page":"284","article-title":"Synthesizing Robust Adversarial Exam-pies","volume":"80","author":"athalye","year":"2018","journal-title":"Proceedings of the ICML International Conference on Machine Learning"},{"key":"ref9","article-title":"advertorch v0.1: An Adversarial Robustness Toolbox based on PvTorch","volume":"abs 1902 7623","author":"ding","year":"2019","journal-title":"CoRR"},{"key":"ref1","first-page":"274","article-title":"Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples","author":"athalye","year":"0","journal-title":"Proceedings of the ICML International Conference on Machine Learning"},{"key":"ref20","article-title":"Ad-versarial Defense by Restricting the Hidden Space of Deep Neural Networks","author":"mustafa","year":"0","journal-title":"ICCV"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.21105\/joss.02607"},{"key":"ref21","first-page":"125","article-title":"WaveNet: A Generative Model for Raw Audio","author":"van den oord","year":"0","journal-title":"The 9th ISCA Speech Synthesis Workshop"},{"key":"ref24","article-title":"SmoothGrad: removing noise by adding noise","volume":"abs 1706 3825","author":"smilkov","year":"2017","journal-title":"CoRR"},{"key":"ref23","article-title":"Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models","author":"samangouei","year":"0","journal-title":"ICLRE"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/9.119632"},{"key":"ref25","first-page":"464","article-title":"Cyclical Learning Rates for Training Neural Networks","author":"smith","year":"0","journal-title":"IEEE Winter Conference on Applications of Computer Vision"}],"event":{"name":"2021 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2021,7,18]]},"location":"Shenzhen, China","end":{"date-parts":[[2021,7,22]]}},"container-title":["2021 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9533266\/9533267\/09534190.pdf?arnumber=9534190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:46:05Z","timestamp":1652197565000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9534190\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,18]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/ijcnn52387.2021.9534190","relation":{},"subject":[],"published":{"date-parts":[[2021,7,18]]}}}