{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:03:15Z","timestamp":1769745795425,"version":"3.49.0"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,2,1]]},"DOI":"10.1109\/jiot.2021.3091683","type":"journal-article","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T19:55:01Z","timestamp":1624478101000},"page":"1875-1884","source":"Crossref","is-referenced-by-count":8,"title":["Toward Efficiently Evaluating the Robustness of Deep Neural Networks in IoT Systems: A GAN-Based Method"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2034-8026","authenticated-orcid":false,"given":"Tao","family":"Bai","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3004-7091","authenticated-orcid":false,"given":"Jun","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jinlin","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0572-4748","authenticated-orcid":false,"given":"Shoudong","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jiefeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6262-8125","authenticated-orcid":false,"given":"Alex","family":"Kot","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2867917"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701204"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2006.138"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767608"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2810291"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2950048"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2845844"},{"key":"ref9","first-page":"9","article-title":"Intriguing properties of neural networks","volume-title":"Proc. ICLR","author":"Szegedy"},{"key":"ref10","first-page":"6","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. ICLR","author":"Goodfellow"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3019225"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3008232"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2825478"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref17","first-page":"2672","article-title":"Generative adversarial nets","volume-title":"Proc. NIPS","author":"Goodfellow"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/543"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00465"},{"key":"ref20","first-page":"8312","article-title":"Constructing unrestricted adversarial examples with generative models","volume-title":"Proc. NIPS","author":"Song"},{"key":"ref21","first-page":"1","article-title":"Don\u2019t let your discriminator be fooled","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Zhou"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01149"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref27","volume-title":"Generative adversarial text to image synthesis,","author":"Reed","year":"2016"},{"key":"ref28","volume-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","author":"Radford","year":"2015"},{"key":"ref29","volume-title":"Wasserstein GAN","author":"Arjovsky","year":"2017"},{"key":"ref30","first-page":"5767","article-title":"Improved training of Wasserstein GANs","volume-title":"Proc. NIPS","author":"Gulrajani"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref33","volume-title":"Gap++: Learning to Generate Target-Conditioned Adversarial Examples","author":"Mao","year":"2020"},{"key":"ref34","first-page":"2642","article-title":"Conditional image synthesis with auxiliary classifier GANs","volume-title":"Proc. ICML","author":"Odena"},{"key":"ref35","first-page":"274","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","volume":"80","author":"Athalye"},{"key":"ref36","volume-title":"Massively multitask networks for drug discovery","author":"Ramsundar","year":"2015"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00723"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01264-9_28"},{"key":"ref39","volume-title":"A simple framework for contrastive learning of visual representations","author":"Chen","year":"2020"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00674"},{"key":"ref41","volume-title":"Improving Language Understanding by Generative Pre-Training","author":"Radford","year":"2018"},{"key":"ref42","first-page":"13063","article-title":"Unified language model pre-training for natural language understanding and generation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Dong"},{"key":"ref43","volume-title":"MNIST Handwritten Digit Database","author":"LeCun","year":"2010"},{"key":"ref44","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref45","volume-title":"CGANs with projection discriminator","author":"Miyato","year":"2018"},{"key":"ref46","volume-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014"},{"key":"ref47","first-page":"6","article-title":"Ensemble adversarial training: Attacks and defenses","volume-title":"Proc. ICLR","author":"Tram\u00e8r"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.5244\/C.30.87"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref50","first-page":"6","article-title":"Defense-{GAN}: Protecting classifiers against adversarial attacks using generative models","volume-title":"Proc. ICLR","author":"Samangouei"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00059"},{"key":"ref52","volume-title":"Adversarial transformation networks: Learning to generate adversarial examples","author":"Baluja","year":"2017"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/591"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9690636\/09463482.pdf?arnumber=9463482","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:06:04Z","timestamp":1705017964000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9463482\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,1]]},"references-count":53,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3091683","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,1]]}}}