{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:22:43Z","timestamp":1740100963984,"version":"3.37.3"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62077044,61702470,62002343"],"award-info":[{"award-number":["62077044,61702470,62002343"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1109\/ijcnn55064.2022.9892161","type":"proceedings-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T19:56:04Z","timestamp":1664567764000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["GTAT: Adversarial Training with Generated Triplets"],"prefix":"10.1109","author":[{"given":"Baoli","family":"Wang","sequence":"first","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Xinxin","family":"Fan","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Quanliang","family":"Jing","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Yueyang","family":"Su","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Jingwei","family":"Li","sequence":"additional","affiliation":[{"name":"University of Buffalo,Department of Computer Science and Engineerting,SUNY,US"}]},{"given":"Jingping","family":"Bi","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences,Beijing,China"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Adversarial examples in the physical world","author":"kurakin","year":"2017","journal-title":"5th International Conference on Learning Representations ICLR 2017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/403"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01149"},{"key":"ref13","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref14","article-title":"Metric learning for adversarial robustness","author":"mao","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00465"},{"key":"ref19","first-page":"8093","article-title":"Overfitting in adversarially robust deep learning","author":"rice","year":"0","journal-title":"International Conference on Machine Learning"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MASSW.2019.00012"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01240-3_31"},{"journal-title":"Large scale online learning of image similarity through ranking","year":"2010","author":"chechik","key":"ref3"},{"key":"ref6","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"3rd International Conference on Learning Representations ICLR 2015"},{"key":"ref5","article-title":"A study of the effect of jpg compression on adversarial images","author":"dziugaite","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00624"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2019.00257"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref9","article-title":"Adversarial logit pairing","author":"kannan","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref1","first-page":"274","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","author":"athalye","year":"0","journal-title":"International Conference on Machine Learning"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref22","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"ArXiv Preprint"},{"key":"ref21","article-title":"Ape-gan: Adversarial perturbation elimination with gan","author":"shen","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533901"},{"key":"ref23","article-title":"Ensemble adversarial training: Attacks and defenses","author":"tram\u00e8r","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00059"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.29007\/6bnf"}],"event":{"name":"2022 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2022,7,18]]},"location":"Padua, Italy","end":{"date-parts":[[2022,7,23]]}},"container-title":["2022 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9891857\/9889787\/09892161.pdf?arnumber=9892161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T22:57:29Z","timestamp":1667516249000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9892161\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ijcnn55064.2022.9892161","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]}}}