{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:20:05Z","timestamp":1772644805199,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,5]]},"DOI":"10.1109\/ipas55744.2022.10052858","type":"proceedings-article","created":{"date-parts":[[2023,2,28]],"date-time":"2023-02-28T18:32:15Z","timestamp":1677609135000},"page":"1-8","source":"Crossref","is-referenced-by-count":14,"title":["XAI enhancing cyber defence against adversarial attacks in industrial applications"],"prefix":"10.1109","author":[{"given":"Georgios","family":"Makridis","sequence":"first","affiliation":[{"name":"University of Piraeus,Department of Digital Systems,Athens,Greece"}]},{"given":"Spyros","family":"Theodoropoulos","sequence":"additional","affiliation":[{"name":"University of Piraeus,Department of Digital Systems,Athens,Greece"}]},{"given":"Dimitrios","family":"Dardanis","sequence":"additional","affiliation":[{"name":"University of Piraeus,Department of Digital Systems,Athens,Greece"}]},{"given":"Ioannis","family":"Makridis","sequence":"additional","affiliation":[{"name":"University of Piraeus,Department of Digital Systems,Athens,Greece"}]},{"given":"Maria Margarita","family":"Separdani","sequence":"additional","affiliation":[{"name":"University of Piraeus,Department of Maritime Studies,Athens,Greece"}]},{"given":"Georgios","family":"Fatouros","sequence":"additional","affiliation":[{"name":"University of Piraeus,Department of Digital Systems,Athens,Greece"}]},{"given":"Dimosthenis","family":"Kyriazis","sequence":"additional","affiliation":[{"name":"University of Piraeus,Department of Digital Systems,Athens,Greece"}]},{"given":"Panagiotis","family":"Koulouris","sequence":"additional","affiliation":[{"name":"University of Piraeus,Department of Digital Systems,Athens,Greece"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC45102.2020.9294450"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/su10010085"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.preteyeres.2021.101034"},{"key":"ref4","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv preprint"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23198"},{"key":"ref7","article-title":"Certified defenses for data poisoning attacks","volume":"30","author":"Steinhardt","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2018.042731661"},{"key":"ref9","first-page":"1899","article-title":"Graying the black box: Understanding dqns","volume-title":"International conference on machine learning","author":"Zahavy"},{"key":"ref10","article-title":"Explainable artificial intelligence (xai) darpa-baa-16\u201353","author":"Gunning","year":"2016","journal-title":"Defense Advanced Research Projects Agency"},{"key":"ref11","article-title":"A review of explainable artificial intelligence in manufacturing","author":"Sofianidis","year":"2021","journal-title":"arXiv preprint"},{"key":"ref12","article-title":"Detecting egregious responses in neural sequence-to-sequence models","author":"He","year":"2018","journal-title":"arXiv preprint"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-019-1211-x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref15","first-page":"274","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","volume-title":"International conference on machine learning","author":"Athalye"},{"key":"ref16","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv preprint"},{"key":"ref17","article-title":"Adversarial machine learning at scale","author":"Kurakin","year":"2016","journal-title":"arXiv preprint"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140444"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref20","article-title":"Fooling neural network interpretations via adversarial model manipulation","volume":"32","author":"Heo","year":"2019","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP40778.2020.9190952"},{"key":"ref22","volume-title":"Performance evaluation of explainable ai methods against adversarial noise","author":"Fenoy"},{"key":"ref23","article-title":"Explanations can be manipulated and geometry is to blame","volume":"32","author":"Dombrowski","year":"2019","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207637"},{"key":"ref25","first-page":"5498","article-title":"The odds are odd: A statistical test for detecting adversarial examples","volume-title":"International Conference on Machine Learning","author":"Roth"},{"key":"ref26","article-title":"Adversarial examples are not bugs, they are features","volume":"32","author":"Ilyas","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.trac.2013.04.015"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0197-0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref31","article-title":"Deep inside convolutional networks: Visualising image classification models and saliency maps","author":"Simonyan","year":"2013","journal-title":"arXiv preprint"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"}],"event":{"name":"2022 IEEE 5th International Conference on Image Processing Applications and Systems (IPAS)","location":"Genova, Italy","start":{"date-parts":[[2022,12,5]]},"end":{"date-parts":[[2022,12,7]]}},"container-title":["2022 IEEE 5th International Conference on Image Processing Applications and Systems (IPAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10052787\/10052789\/10052858.pdf?arnumber=10052858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T18:50:34Z","timestamp":1707850234000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10052858\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/ipas55744.2022.10052858","relation":{},"subject":[],"published":{"date-parts":[[2022,12,5]]}}}