{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:13:23Z","timestamp":1755800003946,"version":"3.44.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:00:00Z","timestamp":1751846400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:00:00Z","timestamp":1751846400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Union","doi-asserted-by":"publisher","award":["101069595"],"award-info":[{"award-number":["101069595"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,7]]},"DOI":"10.1109\/iolts65288.2025.11116992","type":"proceedings-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T18:07:28Z","timestamp":1755626848000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Leveraging Image-Based Transformations to Mitigate Adversarial Attacks in AI-Based Safety-Critical Systems"],"prefix":"10.1109","author":[{"given":"Mart\u00ed","family":"Caro","sequence":"first","affiliation":[{"name":"Barcelona Supercomputing Center (BSC),Barcelona,Spain"}]},{"given":"Axel","family":"Brando","sequence":"additional","affiliation":[{"name":"Barcelona Supercomputing Center (BSC),Barcelona,Spain"}]},{"given":"Jaume","family":"Abella","sequence":"additional","affiliation":[{"name":"Barcelona Supercomputing Center (BSC),Barcelona,Spain"}]}],"member":"263","reference":[{"volume-title":"ISO 26262: Road Vehicles - Functional Safety","year":"2011","key":"ref1"},{"volume-title":"DO-178B \/ ED-12B, Software Considerations in Airborne Systems and Equipment Certification","year":"1992","key":"ref2"},{"volume-title":"ISOISAE PAS 22736:2021: Taxonomy and definitions for terms related to driving automation systems for on-road motor vehicles","year":"2021","key":"ref3"},{"volume-title":"Apollo, an open autonomous driving platform","year":"2018","key":"ref4"},{"volume-title":"Space Case Study","year":"2023","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3929\/ethz-b-000407661"},{"article-title":"Software-Only Semantic Diverse Redundancy for High-Integrity AI-Based Functionalities","volume-title":"European Congress on Embedded Real-Time Systems (ERTS)","author":"Caro","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3716140"},{"volume-title":"YOLOv4: Optimal Speed and Accuracy of Object Detection","year":"2020","author":"Bochkovskiy","key":"ref9"},{"volume-title":"Mitigating Adversarial Effects Through Randomization","year":"2018","author":"Xie","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3398665"},{"volume-title":"Towards Deep Learning Models Resistant to Adversarial Attacks","year":"2019","author":"Madry","key":"ref12"},{"key":"ref13","article-title":"Keeping the Bad Guys Out: Protecting and Vaccinating Deep Learning with JPEG Compression","volume":"abs\/1705.02900","author":"Das","year":"2017","journal-title":"ArXiv"},{"volume-title":"An Efficient Pre-processing Method to Eliminate Adversarial Effects","year":"2019","author":"Wang","key":"ref14"},{"volume-title":"Image Transformation can make Neural Networks more robust against Adversarial Examples","year":"2019","author":"Thang","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00669"},{"volume-title":"Demystifying the Adversarial Robustness of Random Transformation Defenses","year":"2022","author":"Sitawarin","key":"ref17"},{"volume-title":"Generative Adversarial Networks","year":"2014","author":"Goodfellow","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2765202"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3094201"},{"volume-title":"AURIX Multicore 32-bit Microcontroller Family to Meet Safety and Powertrain Requirements of Upcoming Vehicle Generations","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2019.8854378"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715177"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC57700.2023.00013"},{"volume-title":"YOLOv4 on the Darknet Framework and Publicly Available Weights","year":"2024","author":"Bochkovskiyi","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSIP48289.2020.9145130"}],"event":{"name":"2025 IEEE 31st International Symposium on On-Line Testing and Robust System Design (IOLTS)","start":{"date-parts":[[2025,7,7]]},"location":"Ischia, Italy","end":{"date-parts":[[2025,7,9]]}},"container-title":["2025 IEEE 31st International Symposium on On-Line Testing and Robust System Design (IOLTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11115077\/11116814\/11116992.pdf?arnumber=11116992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T06:20:31Z","timestamp":1755670831000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11116992\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iolts65288.2025.11116992","relation":{},"subject":[],"published":{"date-parts":[[2025,7,7]]}}}