{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:59:09Z","timestamp":1730267949262,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/indin.2018.8472060","type":"proceedings-article","created":{"date-parts":[[2018,10,9]],"date-time":"2018-10-09T02:00:15Z","timestamp":1539050415000},"page":"760-765","source":"Crossref","is-referenced-by-count":9,"title":["Generation of Adversarial Examples to Prevent Misclassification of Deep Neural Network based Condition Monitoring Systems for Cyber-Physical Production Systems"],"prefix":"10.1109","author":[{"given":"Felix","family":"Specht","sequence":"first","affiliation":[{"name":"Fraunhofer IOSB-INA Langenbruch 6, Lemgo, 32657, Germany"}]},{"given":"Jens","family":"Otto","sequence":"additional","affiliation":[{"name":"Fraunhofer IOSB-INA Langenbruch 6, Lemgo, 32657, Germany"}]},{"given":"Oliver","family":"Niggemann","sequence":"additional","affiliation":[{"name":"Fraunhofer IOSB-INA Langenbruch 6, Lemgo, 32657, Germany"}]},{"given":"Barbara","family":"Hammer","sequence":"additional","affiliation":[{"name":"Barbara Hammer CITEC, Bielefeld University Inspiration 1, Bielefeld, 33619, Germany"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Adversarial examples: Attacks and defenses for deep learning","author":"yuan","year":"2017","journal-title":"Computing Research Repository (CoRR)"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ETFA.2014.7005187"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1108\/IR-05-2016-0140"},{"key":"ref13","first-page":"3","author":"jeschke","year":"2017","journal-title":"Integrated Manufacturing Systems"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/SP.2017.49"},{"key":"ref15","article-title":"Adversarial examples in the physical world","author":"kurakin","year":"2016","journal-title":"Computing Research Repository (CoRR)"},{"key":"ref16","first-page":"372","article-title":"The limitations of deep learning in adversarial settings","author":"papernot","year":"2016","journal-title":"Proc IEEE Symposium on Security and Privacy (SP)"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/3128572.3140444"},{"key":"ref18","article-title":"Transferability in machine learning: from phenomena to black-box attacks using adversarial samples","author":"papernot","year":"2016","journal-title":"Computing Research Repository (CoRR)"},{"key":"ref19","article-title":"On the effectiveness of defensive distillation","author":"papernot","year":"2016","journal-title":"Computing Research Repository (CoRR)"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1515\/auto-2017-0123"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TII.2017.2718729"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/MCSE.2007.55"},{"key":"ref3","first-page":"1","article-title":"Automatic configuration (plug & produce) of industrial ethernet networks","author":"reinhart","year":"2010","journal-title":"Proc 9th IEEE\/IAS International Conference on Industry Applications (INDUSCON)"},{"key":"ref6","first-page":"621","article-title":"Cyber-physical systems in manufacturing","volume":"65","author":"monostori","year":"2016","journal-title":"International Academy for Production Engineering Annals"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TSUSC.2017.2782737"},{"key":"ref8","first-page":"16","article-title":"Guide to industrial control systems (ics) security","volume":"800","author":"stouffer","year":"2011","journal-title":"NIST Special Publication"},{"key":"ref7","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"Proc of the Int Conf on Learning Representations (ICLR)"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1515\/auto-2017-0124"},{"key":"ref9","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"Proc of the Int Conf on Learning Representations (ICLR)"},{"key":"ref1","first-page":"255","article-title":"Communication, configuration, application: The three layer concept for plug-and-produce","author":"zimmermann","year":"2008","journal-title":"Proc 5th International Conference on Informatics in Control Automation and Robotics (ICINCO)"},{"key":"ref20","article-title":"Feature squeezing: Detecting adversarial examples in deep neural networks","author":"xu","year":"2017","journal-title":"Computing Research Repository (CoRR)"},{"year":"2008","author":"mccann","article-title":"Uci ml repository secom dataset","key":"ref22"},{"key":"ref21","article-title":"Feature squeezing mitigates and detects carlini\/wagner adversarial examples","author":"xu","year":"2017","journal-title":"Computing Research Repository (CoRR)"},{"key":"ref24","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"Computing Research Repository (CoRR)"},{"key":"ref23","first-page":"265","article-title":"Tensorflow: A system for large-scale machine learning","volume":"16","author":"abadi","year":"2016","journal-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI'02)"},{"year":"0","author":"jones","article-title":"SciPy: Open source scientific tools for Python, 2001&#x2013;","key":"ref26"},{"key":"ref25","article-title":"cleverhans v2.0.0.: an adversarial machine learning library","author":"goodfellow","year":"2016","journal-title":"Computing Research Repository (CoRR)"}],"event":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2018,7,18]]},"location":"Porto, Portugal","end":{"date-parts":[[2018,7,20]]}},"container-title":["2018 IEEE 16th International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8453042\/8471919\/08472060.pdf?arnumber=8472060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T00:47:48Z","timestamp":1623199668000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8472060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/indin.2018.8472060","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}