{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:28:40Z","timestamp":1763191720350,"version":"3.45.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1109\/ijcnn64981.2025.11228345","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:46:15Z","timestamp":1763145975000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing the \"Immunity\" of Mixture-of-Experts Networks for Adversarial Defense"],"prefix":"10.1109","author":[{"given":"Qiao","family":"Han","sequence":"first","affiliation":[{"name":"Zhejiang Lab"}]},{"given":"Yong","family":"Huang","sequence":"additional","affiliation":[{"name":"China Mobile Information Technology Co., Ltd,Zhejiang Lab"}]},{"given":"Xinling","family":"Guo","sequence":"additional","affiliation":[{"name":"NingboTech University,School of Information Science and Engineering"}]},{"given":"Yiteng","family":"Zhai","sequence":"additional","affiliation":[{"name":"Zhejiang Lab"}]},{"given":"Yu","family":"Qin","sequence":"additional","affiliation":[{"name":"Institute of Software Chinese Academy of Science"}]},{"given":"Yao","family":"Yang","sequence":"additional","affiliation":[{"name":"Zhejiang Lab"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00759"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMIA48430.2020.9074920"},{"key":"ref3","article-title":"Learning representations by maximizing mutual information across views","volume":"32","author":"Bachman","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref4","first-page":"531","article-title":"Mutual information neural estimation","volume-title":"International conference on machine learning","author":"Belghazi"},{"article-title":"The consciousness prior","year":"2017","author":"Bengio","key":"ref5"},{"article-title":"Learning independent features with adversarial nets for non-linear ica","year":"2017","author":"Brakel","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00138"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-6736(18)31645-3"},{"article-title":"Provably robust adversarial examples","year":"2020","author":"Dimitrov","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"Goodfellow","key":"ref12"},{"article-title":"Laurens van der maaten, \u201ccountering adversarial images using input transformations\u201d","volume-title":"International Conference on Learning Representations","author":"Guo","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr42600.2020.00071"},{"key":"ref15","first-page":"29335","article-title":"Dselect-k: Differentiable selection in the mixture of experts with applications to multi-task learning","volume":"34","author":"Hazimeh","year":"2021","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00624"},{"article-title":"Adversarial logit pairing","year":"2018","author":"Kannan","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1038\/s41568-020-00327-9"},{"article-title":"Adversarial machine learning at scale","year":"2016","author":"Kurakin","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_23"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01468"},{"article-title":"Towards deep learning models resistant to adversarial attacks","year":"2017","author":"Madry","key":"ref23"},{"article-title":"Towards deep learning models resistant to adversarial attacks","year":"2017","author":"Madry","key":"ref24"},{"article-title":"Improving interpretability in medical imaging diagnosis using adversarial training","year":"2020","author":"Margeloiu","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9338-y"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01210"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00894"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58542-6_13"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"article-title":"Outrageously large neural networks: The sparsely-gated mixture-of-experts layer","year":"2017","author":"Shazeer","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556968"},{"article-title":"Ensemble adversarial training: Attacks and defenses","year":"2017","author":"Tram\u00e8r","key":"ref34"},{"article-title":"Ss-cam: Smoothed score-cam for sharper visual feature localization","year":"2020","author":"Wang","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00020"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/833"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_25"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00090"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851823"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref42","first-page":"7472","article-title":"Theoretically principled trade-off between robustness and accuracy","volume-title":"International conference on machine learning","author":"Zhang"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.319"},{"key":"ref44","first-page":"27338","article-title":"Improving adversarial robustness via mutual information estimation","volume-title":"International Conference on Machine Learning","author":"Zhou"}],"event":{"name":"2025 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2025,6,30]]},"location":"Rome, Italy","end":{"date-parts":[[2025,7,5]]}},"container-title":["2025 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11227166\/11227148\/11228345.pdf?arnumber=11228345","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:27:05Z","timestamp":1763191625000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11228345\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/ijcnn64981.2025.11228345","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]}}}