{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:25:58Z","timestamp":1730265958675,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,18]]},"DOI":"10.1109\/ijcnn54540.2023.10191250","type":"proceedings-article","created":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T17:30:03Z","timestamp":1690997403000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["LpAdvGAN: Noise Optimization Based Adversarial Network Generation Adversarial Example"],"prefix":"10.1109","author":[{"given":"Delong","family":"Yang","sequence":"first","affiliation":[{"name":"College of Computer Science, Inner Mongolia University,Hohhot,China"}]},{"given":"Jing","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science, Inner Mongolia University,Hohhot,China"}]}],"member":"263","reference":[{"journal-title":"Intriguing properties of neural networks","year":"2013","author":"christian","key":"ref13"},{"journal-title":"Generating adversarial examples with adversarial networks","year":"2018","author":"chaowei","key":"ref12"},{"journal-title":"Texture networks Feed-forward synthesis of textures and stylized images","year":"2016","author":"dmitry","key":"ref15"},{"journal-title":"Explaining and Harnessing Adversarial Examples","year":"2014","author":"goodfellow","key":"ref14"},{"journal-title":"Spectral normalization for generative adversarial networks","year":"2018","author":"takeru","key":"ref31"},{"journal-title":"The relativistic discriminator A key element missing from standard GAN","year":"2018","author":"jolicoeur-martineau","key":"ref30"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/MSP.2017.2765202","article-title":"Generative adversarial networks: An overview","volume":"35","author":"antonia","year":"2018","journal-title":"IEEE Signal Processing Magazine"},{"journal-title":"Learning multiple layers of features from tiny images","year":"2009","author":"alex","key":"ref33"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01149"},{"journal-title":"The MNIST Database of Handwritten Digits","year":"1998","author":"yann","key":"ref32"},{"key":"ref2","first-page":"2452","article-title":"Generalizable data-free objective for crafting universal adversarial perturbations","author":"mopuri","year":"2018","journal-title":"IEEE transactions on pattern analysis and machine intelligence 41 10"},{"key":"ref1","first-page":"43","article-title":"Learning universal adversarial perturbations with generative models","author":"jamie","year":"0","journal-title":"2018 IEEE Security and Privacy Workshops (SPW) SPW"},{"key":"ref17","first-page":"2414","article-title":"Image style transfer using convolutional neural networks","author":"leon a","year":"0","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref16","first-page":"694","article-title":"Perceptual losses for real-time style transfer and super-resolution","author":"justin","year":"2016","journal-title":"Computer Vision-ECCV 2016 14th European Conference Amsterdam"},{"journal-title":"Unsupervised Representation learning with deep convolutional generative adversarial networks CoRR","year":"2015","author":"alec","key":"ref19"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1007\/978-3-319-46454-1_36","article-title":"Generative visual manipulation on the natural image manifold","author":"zhu","year":"2016","journal-title":"Computer Vision-ECCV 2016 14th European Conference Amsterdam The Netherlands"},{"key":"ref24","first-page":"828","article-title":"One pixel attack for fooling deep neural networks","author":"jiawei","year":"2019","journal-title":"IEEE Transactions on Evolutionary Computation 23 5"},{"key":"ref23","first-page":"341","article-title":"Differential evolution-a simple and efficient heuristic for global optimization over continuous spaces","author":"rainer","year":"1997","journal-title":"Journal of Global Optimization 11"},{"key":"ref26","first-page":"2794","article-title":"Least squares generative adversarial networks","author":"xudong","year":"0","journal-title":"Proceedings of the IEEE International Conference on Computer Vision"},{"key":"ref25","first-page":"53","article-title":"Generative adversarial networks: An overview","author":"antonia","year":"2018","journal-title":"IEEE Signal Processing Magazine 35 1"},{"journal-title":"Adversarial transformation networks Learning to generate adversarial examples","year":"2017","author":"shumeet","key":"ref20"},{"key":"ref22","first-page":"4","article-title":"Differential evolution: A survey of the state-of-the-art","author":"swagatam","year":"2010","journal-title":"IEEE Transactions on Evolutionary Computation 1"},{"key":"ref21","first-page":"398","article-title":"Differential evolution algorithm with strategy adaptation for global numerical optimization","author":"qin","year":"2008","journal-title":"IEEE transactions on Evolutionary Computation 13 2"},{"key":"ref28","article-title":"Improved training of wasserstein gans","volume":"30","author":"ishaan","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref27","first-page":"214","article-title":"Wasserstein generative adversarial networks","author":"martin","year":"0","journal-title":"Int Conference on Machine Learning"},{"key":"ref29","article-title":"Are gans created equal? a large-scale study","author":"mario","year":"2018","journal-title":"Advances in Neural IInformation Processing Systems"},{"key":"ref8","first-page":"372","article-title":"The limitations of deep learning in adversarial settings","author":"nicolas","year":"0","journal-title":"2016 IEEE European Symposium on Security and Privacy (EuroS&P)"},{"key":"ref7","first-page":"372","article-title":"The limitations of deep learning in adversarial settings","author":"nicolas","year":"0","journal-title":"2016 IEEE European Symposium on Security and Privacy (EuroS&P)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2019.00257"},{"key":"ref4","first-page":"1528","article-title":"Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition","author":"mahmood","year":"0","journal-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00084"},{"journal-title":"Towards deep learning models resistant to adversarial attacks","year":"2017","author":"aleksander","key":"ref6"},{"key":"ref5","first-page":"1625","article-title":"Robust physical-world attacks on deep learning visual classification","author":"kevin","year":"0","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"}],"event":{"name":"2023 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2023,6,18]]},"location":"Gold Coast, Australia","end":{"date-parts":[[2023,6,23]]}},"container-title":["2023 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10190990\/10190992\/10191250.pdf?arnumber=10191250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T17:46:58Z","timestamp":1692640018000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10191250\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,18]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/ijcnn54540.2023.10191250","relation":{},"subject":[],"published":{"date-parts":[[2023,6,18]]}}}