{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T14:00:26Z","timestamp":1768485626392,"version":"3.49.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,30]]},"DOI":"10.1109\/ijcnn60899.2024.10650213","type":"proceedings-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:35:05Z","timestamp":1725903305000},"page":"1-8","source":"Crossref","is-referenced-by-count":7,"title":["STARNet: Sensor Trustworthiness and Anomaly Recognition via Lightweight Likelihood Regret for Robust Edge Autonomy"],"prefix":"10.1109","author":[{"given":"Nastaran","family":"Darabi","sequence":"first","affiliation":[{"name":"University of Illinois,Department of Electrical and Computer Engineering,Chicago,IL,USA,60607"}]},{"given":"Sina","family":"Tayebati","sequence":"additional","affiliation":[{"name":"University of Illinois,Department of Electrical and Computer Engineering,Chicago,IL,USA,60607"}]},{"given":"Sureshkumar","family":"Senthilkumar","sequence":"additional","affiliation":[{"name":"University of Illinois,Department of Electrical and Computer Engineering,Chicago,IL,USA,60607"}]},{"given":"Dinithi","family":"Jayasuriya","sequence":"additional","affiliation":[{"name":"University of Illinois,Department of Electrical and Computer Engineering,Chicago,IL,USA,60607"}]},{"given":"Sathya","family":"Ravi","sequence":"additional","affiliation":[{"name":"University of Illinois,Department of Computer Science,Chicago,IL,USA,60607"}]},{"given":"Theja","family":"Tulabandhula","sequence":"additional","affiliation":[{"name":"University of Illinois,Department of Information and Decision Sciences,Chicago,IL,USA,60607"}]},{"given":"Amit R.","family":"Trivedi","sequence":"additional","affiliation":[{"name":"University of Illinois,Department of Electrical and Computer Engineering,Chicago,IL,USA,60607"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11244203"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSTQE.2019.2908555"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JEDS.2019.2911085"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26172-6"},{"key":"ref5","first-page":"13","article-title":"Mitigation of crosstalk effects in multi-lidar configurations","volume-title":"Electro-Optical Remote Sensing XII","volume":"10796","author":"Diehm","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2019.8814205"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2007.903444"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2004.1336490"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560527"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1561\/9781680833577"},{"key":"ref11","article-title":"Warningnet: A deep learning-based approach to anomaly detection in image input patterns","author":"Lee","year":"2020","journal-title":"Journal of Machine Learning"},{"key":"ref12","article-title":"Proactive anomaly detection in unpredictable environments","author":"Ji","year":"2022","journal-title":"Journal of Autonomous Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP42928.2021.9506795"},{"key":"ref14","article-title":"Anomaly detection using generative adversarial networks","author":"Bergmann","year":"2023","journal-title":"Journal of Machine Vision"},{"key":"ref15","article-title":"Benchmarking out-of-distribution detection","author":"Hendrycks","year":"2019","journal-title":"Journal of Machine Learning"},{"key":"ref16","article-title":"A baseline for detecting misclassified and out-of-distribution examples in neural networks","author":"Hendrycks","year":"2016"},{"key":"ref17","article-title":"A simple unified framework for detecting out-of-distribution samples and adversarial attacks","volume":"31","author":"Lee","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref18","first-page":"20 685","article-title":"Likelihood regret: An out-of-distribution detection score for variational auto-encoder","volume":"33","author":"Xiao","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.3003837"},{"key":"ref20","article-title":"A comprehensive linear speedup analysis for asynchronous stochastic parallel optimization from zeroth-order to first-order","volume":"29","author":"Lian","year":"2016","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21701"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-014-0846-1"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10915-017-0621-6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CISS56502.2023.10089720"},{"key":"ref25","first-page":"652","article-title":"Pointnet: Deep learning on point sets for 3d classification and segmentation","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","author":"Qi"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00033"},{"key":"ref27","article-title":"Sign-opt: A query-efficient hard-label adversarial attack","author":"Cheng","year":"2019"},{"key":"ref28","article-title":"beta-vae: Learning basic visual concepts with a constrained variational framework","author":"Higgins","year":"2016"},{"key":"ref29","article-title":"Likelihood ratios for out-of-distribution detection","volume":"32","author":"Ren","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref30","article-title":"Input complexity and out-of-distribution detection with likelihood-based generative models","author":"Serr\u00e0","year":"2019"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01830"}],"event":{"name":"2024 International Joint Conference on Neural Networks (IJCNN)","location":"Yokohama, Japan","start":{"date-parts":[[2024,6,30]]},"end":{"date-parts":[[2024,7,5]]}},"container-title":["2024 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10649807\/10649898\/10650213.pdf?arnumber=10650213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T05:17:21Z","timestamp":1725945441000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10650213\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,30]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/ijcnn60899.2024.10650213","relation":{},"subject":[],"published":{"date-parts":[[2024,6,30]]}}}