{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:33:33Z","timestamp":1730266413354,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,30]]},"DOI":"10.1109\/ijcnn60899.2024.10650468","type":"proceedings-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:35:05Z","timestamp":1725903305000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["OCGEC: One-class Graph Embedding Classification for DNN Backdoor Detection"],"prefix":"10.1109","author":[{"given":"Haoyu","family":"Jiang","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University,School of Cyber Science and Engineering,Shanghai,China,200240"}]},{"given":"Haiyang","family":"Yu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,School of Cyber Science and Engineering,Shanghai,China,200240"}]},{"given":"Nan","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,School of Cyber Science and Engineering,Shanghai,China,200240"}]},{"given":"Ping","family":"Yi","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University,School of Cyber Science and Engineering,Shanghai,China,200240"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3182979"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359790"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/spw50608.2020.00025"},{"article-title":"Detecting backdoor attacks on deep neural networks by activation clustering","volume-title":"Workshop on Artificial Intelligence Safety","author":"Chen","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/647"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01617"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20065-6_11"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref10","first-page":"25 656","article-title":"Topology-aware network pruning using multi-stage graph embedding and reinforcement learning","volume-title":"International Conference on Machine Learning","author":"Yu"},{"key":"ref11","first-page":"4393","article-title":"Deep one-class classification","volume-title":"International Conference on Machine Learning","author":"Ruff"},{"article-title":"BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain","year":"2019","author":"Gu","key":"ref12"},{"article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","year":"2017","author":"Chen","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00034"},{"article-title":"WaNet-Imperceptible warping-based backdoor attack","volume-title":"International Conference on Learning Representations","author":"Nguyen","key":"ref15"},{"key":"ref16","article-title":"Spectral signatures in backdoor attacks","volume":"31","author":"Tran","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2020.2968275"},{"article-title":"Detecting backdoors in neural networks using novel feature-based anomaly detection","year":"2020","author":"Fu","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP.2019.8918908"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66415-2_4"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363216"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00038"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i8.26192"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539321"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1017\/S026988891300043X"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.12.026"},{"key":"ref30","first-page":"139","article-title":"One-class SVMs for document classification","volume":"2","author":"Manevitz","year":"2001","journal-title":"Journal of machine Learning research"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000008084.60811.49"},{"article-title":"One-Class Classification: A Survey","year":"2021","author":"Perera","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2011.6033395"},{"article-title":"Learning multiple layers of features from tiny images","year":"2009","author":"Krizhevsky","key":"ref34"},{"article-title":"Speech commands: A dataset for limited-vocabulary speech recognition","year":"2018","author":"Warden","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624183"},{"article-title":"An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks","year":"2022","author":"Zhang","key":"ref38"},{"key":"ref39","article-title":"EM algorithms for PCA and SPCA","volume":"10","author":"Roweis","year":"1997","journal-title":"Advances in neural information processing systems"},{"article-title":"Variational graph auto-encoders","year":"2016","author":"Kipf","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"}],"event":{"name":"2024 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2024,6,30]]},"location":"Yokohama, Japan","end":{"date-parts":[[2024,7,5]]}},"container-title":["2024 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10649807\/10649898\/10650468.pdf?arnumber=10650468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T05:22:00Z","timestamp":1725945720000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10650468\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,30]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/ijcnn60899.2024.10650468","relation":{},"subject":[],"published":{"date-parts":[[2024,6,30]]}}}