{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:00:36Z","timestamp":1729648836524,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,18]]},"DOI":"10.1109\/ijcnn52387.2021.9534294","type":"proceedings-article","created":{"date-parts":[[2021,9,21]],"date-time":"2021-09-21T20:40:52Z","timestamp":1632256852000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive Retraining for Neural Network Robustness in Classification"],"prefix":"10.1109","author":[{"given":"Ruozhu","family":"Yao","sequence":"first","affiliation":[{"name":"Huawei Technology Co., Ltd.,RAMS Reliability Technology Lab"}]},{"given":"Chengqiang","family":"Huang","sequence":"additional","affiliation":[{"name":"Huawei Technology Co., Ltd.,RAMS Reliability Technology Lab"}]},{"given":"Zheng","family":"Hu","sequence":"additional","affiliation":[{"name":"Huawei Technology Co., Ltd.,RAMS Reliability Technology Lab"}]},{"given":"Ke","family":"Pei","sequence":"additional","affiliation":[{"name":"Huawei Technology Co., Ltd.,TTE-DE RAMS Lab"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Benchmarking Neural Network Robustness to Common Corruptions and Perturbations","author":"hendrycks","year":"2019","journal-title":"ArXiv e-prints"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref13","article-title":"Foolbox: A Python toolbox to benchmark the robustness of machine learning models","author":"rauber","year":"2017","journal-title":"ArXiv e-prints"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00467"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00123"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00487"},{"key":"ref17","article-title":"Generative Adversarial Networks","author":"goodfellow","year":"2014","journal-title":"ArXiv e-prints"},{"key":"ref18","article-title":"Auto-Encoding Variational Bayes","author":"kingma","year":"2013","journal-title":"ArXiv e-prints"},{"key":"ref19","article-title":"Noise or Signal: The Role of Image Backgrounds in Object Recognition","author":"xiao","year":"2020","journal-title":"ArXiv e-prints"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref4","article-title":"Explaining and Harnessing Adversarial Examples","author":"goodfellow","year":"2014","journal-title":"ArXiv e-prints"},{"journal-title":"Combining multiple classifiers for pen-based handwritten digit recognition","year":"1996","author":"alimoglu","key":"ref27"},{"key":"ref3","first-page":"6586","article-title":"On the convergence and robustness of adversarial training","volume":"97","author":"wang","year":"2019","journal-title":"Proceedings of the 36th International Conference on Machine Learning"},{"journal-title":"Pattern Recognition and Machine Learning","year":"2006","author":"bishop","key":"ref6"},{"key":"ref29","article-title":"Visualizing data using t-sne","volume":"9","author":"van der maaten","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"ref5","article-title":"Certifying Some Distributional Robustness with Principled Adversarial Training","author":"sinha","year":"2017","journal-title":"ArXiv e-prints"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00059"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v32i1.11504","article-title":"Improving the adversarial robustness and interpretability of deep neural networks by regularizing their input gradients","volume":"32","author":"ross","year":"2018","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"ref2","article-title":"Fast is better than free: Revisiting adversarial training","author":"wong","year":"2020","journal-title":"ArXiv e-prints"},{"key":"ref9","article-title":"Natural Adversarial Examples","author":"hendrycks","year":"2019","journal-title":"ArXiv e-prints"},{"key":"ref1","article-title":"Towards Deep Learning Models Resistant to Adversarial Attacks","author":"madry","year":"2017","journal-title":"ArXiv e-prints"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013240"},{"key":"ref22","article-title":"Certi-fying geometric robustness of neural networks","volume":"32","author":"balunovic","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3290354"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref23","article-title":"Evaluating Robustness of Neural Networks with Mixed Integer Programming","author":"tjeng","year":"2017","journal-title":"ArXiv e-prints"},{"key":"ref26","article-title":"Adversarial training methods for semi-supervised text classification","author":"miyato","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.541"}],"event":{"name":"2021 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2021,7,18]]},"location":"Shenzhen, China","end":{"date-parts":[[2021,7,22]]}},"container-title":["2021 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9533266\/9533267\/09534294.pdf?arnumber=9534294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T21:51:25Z","timestamp":1673301085000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9534294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,18]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ijcnn52387.2021.9534294","relation":{},"subject":[],"published":{"date-parts":[[2021,7,18]]}}}