{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:13:00Z","timestamp":1730272380264,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,5]],"date-time":"2021-09-05T00:00:00Z","timestamp":1630800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,5]],"date-time":"2021-09-05T00:00:00Z","timestamp":1630800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,5]],"date-time":"2021-09-05T00:00:00Z","timestamp":1630800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,5]]},"DOI":"10.1109\/iscc53001.2021.9631532","type":"proceedings-article","created":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T20:46:50Z","timestamp":1639601210000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Interpretable deep learning method for attack detection based on spatial domain attention"],"prefix":"10.1109","author":[{"given":"Hongyu","family":"Liu","sequence":"first","affiliation":[]},{"given":"Bo","family":"Lang","sequence":"additional","affiliation":[]},{"given":"Shaojie","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Mengyang","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9206780"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.352"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591457"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"journal-title":"Not just a black box Learning important features through propagating activation differences","year":"2016","author":"shrikumar","key":"ref16"},{"journal-title":"Intriguing properties of neural networks","year":"2013","author":"szegedy","key":"ref17"},{"key":"ref18","first-page":"818","article-title":"Visualizing and understanding convolutional networks","author":"zeiler","year":"2014","journal-title":"European Conference on Computer Vision"},{"key":"ref19","article-title":"Growing interpretable part graphs on convnets via multi-shot learning","volume":"31","author":"zhang","year":"2017","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00058"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.371"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.216"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243792"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.213"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3029088"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.522"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2018.8430788"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.215"},{"journal-title":"Interactively transferring cnn patterns for part localization","year":"2017","author":"zhang","key":"ref20"},{"key":"ref22","article-title":"Object detectors emerge in deep scene cnns","author":"zhou","year":"2015","journal-title":"ICLRE"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00642"},{"journal-title":"Visualizing Deep Neural Network Decisions Prediction Difference Analysis","year":"2017","author":"zintgraf","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.319"}],"event":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2021,9,5]]},"location":"Athens, Greece","end":{"date-parts":[[2021,9,8]]}},"container-title":["2021 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9631377\/9631248\/09631532.pdf?arnumber=9631532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:54:26Z","timestamp":1652201666000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9631532\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/iscc53001.2021.9631532","relation":{},"subject":[],"published":{"date-parts":[[2021,9,5]]}}}