{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:34:03Z","timestamp":1730266443967,"version":"3.28.0"},"reference-count":62,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1109\/ijcnn55064.2022.9892842","type":"proceedings-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T19:56:04Z","timestamp":1664567764000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Latent Space-Based Backdoor Attacks Against Deep Neural Networks"],"prefix":"10.1109","author":[{"given":"Adrian","family":"Kristanto","sequence":"first","affiliation":[{"name":"Monash University,Australia"}]},{"given":"Shuo","family":"Wang","sequence":"additional","affiliation":[{"name":"CSIRO&#x0027;s Data61 &#x0026; Cybersecurity CRC,Australia"}]},{"given":"Carsten","family":"Rudolph","sequence":"additional","affiliation":[{"name":"Monash University,Melbourne,Australia"}]}],"member":"263","reference":[{"journal-title":"Auto-encoding variational bayes","year":"0","author":"kingma","key":"ref39"},{"journal-title":"Analyzing and improving the image quality of StyleGAN","year":"0","author":"karras","key":"ref38"},{"key":"ref33","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"0","journal-title":"Advances in neural information processing systems"},{"journal-title":"InfoGAN Interpretable representation learning by information maximizing generative adversarial nets","year":"0","author":"chen","key":"ref32"},{"key":"ref31","first-page":"1798","volume":"35","author":"bengio","year":"0","journal-title":"Representation Learning A Review and New Perspectives"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"journal-title":"A style-based generator architecture for generative adversarial networks","year":"0","author":"karras","key":"ref37"},{"journal-title":"Progressive growing of GANs for improved quality stability and variation","year":"0","author":"karras","key":"ref36"},{"key":"ref35","first-page":"5767","article-title":"Improved training of wasserstein gans","author":"gulrajani","year":"0","journal-title":"Advances in neural information processing systems"},{"journal-title":"Wasserstein GAN","year":"0","author":"arjovsky","key":"ref34"},{"journal-title":"Deep residual learning for image recognition","year":"0","author":"he","key":"ref60"},{"journal-title":"InterFaceGAN Interpreting the Disentangled Face Representation Learned by GANs","year":"0","author":"shen","key":"ref62"},{"key":"ref61","first-page":"9","author":"yosinski","year":"0","journal-title":"How transferable are features in deep neural networks?"},{"journal-title":"Label-consistent backdoor attacks","year":"0","author":"turner","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354209"},{"key":"ref2","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","author":"mikolov","year":"0","journal-title":"Advances in neural information processing systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"journal-title":"Deep Inside Convolutional Networks Visualising Image Classification Models and Saliency Maps","year":"2013","author":"simonyan","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3021407"},{"journal-title":"Rethinking the trigger of backdoor attack","year":"2020","author":"li","key":"ref24"},{"journal-title":"Neuroninspect Detecting backdoors in neural networks via output explanations","year":"2019","author":"huang","key":"ref23"},{"journal-title":"Backdoor embedding in convolutional neural network models via invisible perturbation","year":"0","author":"liao","key":"ref26"},{"journal-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","year":"0","author":"radford","key":"ref25"},{"key":"ref50","volume":"15","author":"liu","year":"2018","journal-title":"Large-scale celebfaces attributes (celeba) dataset"},{"key":"ref51","first-page":"8026","article-title":"Pytorch: An imperative style, high-performance deep learning library","author":"paszke","year":"0","journal-title":"Advances in neural information processing systems"},{"key":"ref59","first-page":"6306","article-title":"Neural discrete representation learning","author":"van den oord","year":"0","journal-title":"Advances in neural information processing systems"},{"journal-title":"Hidden Trigger Backdoor Attacks","year":"0","author":"saha","key":"ref58"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2011.6033395"},{"journal-title":"Learning multiple layers of features from tiny images","year":"0","author":"krizhevsky","key":"ref56"},{"journal-title":"Delving into transferable adversarial examples and black-box attacks","year":"0","author":"liu","key":"ref55"},{"journal-title":"Conditional generative adversarial nets","year":"0","author":"mirza","key":"ref54"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01445"},{"journal-title":"In-visible backdoor attacks against deep neural networks","year":"0","author":"li","key":"ref52"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.354"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00928"},{"key":"ref40","first-page":"13","author":"higgins","year":"0","journal-title":"?-VAE LEARNING BASIC VISUAL CONCEPTS WITH A CONSTRAINED VARIATIONAL FRAME-WORK"},{"journal-title":"Explaining and Harnessing Adversarial Examples","year":"0","author":"goodfellow","key":"ref12"},{"journal-title":"Poisoning Attacks Against Support Vector Machines","year":"0","author":"biggio","key":"ref13"},{"journal-title":"Generative poisoning attack method against neural networks","year":"0","author":"yang","key":"ref14"},{"key":"ref15","first-page":"47230","volume":"7","author":"gu","year":"0","journal-title":"BadNets Evaluating Backdooring Attacks on Deep Neural Networks"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228656"},{"journal-title":"Targeted backdoor attacks on deep learning systems using data poisoning","year":"0","author":"chen","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2011.6033589"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"ref3","first-page":"484","volume":"529","author":"silver","year":"0","journal-title":"Mastering the game of Go with deep neural networks and tree search"},{"key":"ref6","first-page":"115","volume":"542","author":"esteva","year":"0","journal-title":"Dermatologist-Level Classification of Skin Cancer with Deep Neural Networks Nature"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_20"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref7","first-page":"2278","volume":"86","author":"lecun","year":"1998","journal-title":"Gradient-based Learning Applied to Document Recognition"},{"journal-title":"Labeled Faces in the Wild A Database Forstudying Face Recognition in Unconstrained Environments","year":"0","author":"huang","key":"ref49"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.371"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3155975"},{"key":"ref48","first-page":"211","volume":"115","author":"russakovsky","year":"0","journal-title":"Imagenet Large Scale Visual Recognition Challenge"},{"journal-title":"Very Deep Convolutional Networks for Large-scale Image Recognition","year":"0","author":"simonyan","key":"ref47"},{"journal-title":"Generating diverse high-fidelity images with vq-vae-2","year":"0","author":"razavi","key":"ref42"},{"journal-title":"Disentangling by factorising","year":"0","author":"kim","key":"ref41"},{"journal-title":"Generating semantic adversarial examples via feature manipulation","year":"2020","author":"wang","key":"ref44"},{"journal-title":"Poisoning Attacks With Generative Adversarial Nets","year":"0","author":"mu\u00f1oz gonz\u00e1lez","key":"ref43"}],"event":{"name":"2022 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2022,7,18]]},"location":"Padua, Italy","end":{"date-parts":[[2022,7,23]]}},"container-title":["2022 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9891857\/9889787\/09892842.pdf?arnumber=9892842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T22:58:03Z","timestamp":1667516283000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9892842\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/ijcnn55064.2022.9892842","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]}}}