{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T08:45:26Z","timestamp":1743583526547,"version":"3.37.3"},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/mc.2024.3420782","type":"journal-article","created":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T17:21:27Z","timestamp":1729012887000},"page":"49-59","source":"Crossref","is-referenced-by-count":1,"title":["Defenses Against Artificial Intelligence Attacks"],"prefix":"10.1109","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6898-952X","authenticated-orcid":false,"given":"Michail","family":"Tsikerdekis","sequence":"first","affiliation":[{"name":"Department of Computer Science, Western Washington University, Bellingham, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5982-8190","authenticated-orcid":false,"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[{"name":"University of Kentucky, Lexington, KY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3376-3218","authenticated-orcid":false,"given":"Iyad","family":"Katib","sequence":"additional","affiliation":[{"name":"Department of Computer Science and the dean of the Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4108\/eai.23-11-2021.172218"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3284677"},{"article-title":"Poisoning attacks against support vector machines","year":"2012","author":"Biggio","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110542"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2017.49"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/spw.2018.00009"},{"volume-title":"Simple hacking technique can extract Chatgpt training data.","year":"2024","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/sci6010003"},{"key":"ref11","article-title":"Strong and weak AI: Deweyan considerations","volume-title":"Proc. AAAI Spring Symp. Towards Conscious AI Syst.","author":"Flowers","year":"2019"},{"key":"ref12","first-page":"1345","article-title":"High accuracy and high fidelity extraction of neural networks","volume-title":"Proc. 29th USENIX Secur. Symp. (USENIX Secur.)","author":"Jagielski","year":"2020"},{"article-title":"Fundamentals of generative large language models and perspectives in cyber-defense","year":"2023","author":"Kucharavy","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-019-00179-x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2021.3124599"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v27i4.1904"},{"article-title":"Simple black-box adversarial perturbations for deep networks","year":"2016","author":"Narodytska","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16014-1_64"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/app9050909"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482029"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.caeai.2022.100107"},{"key":"ref22","first-page":"5866","article-title":"Adversarial training and robustness for multiple perturbations","volume":"32","author":"Tramer","year":"2019","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241142"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32236-6_51"},{"key":"ref25","first-page":"325","article-title":"Learning fair representations","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zemel","year":"2013"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/2\/10718654\/10718665.pdf?arnumber=10718665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T05:42:08Z","timestamp":1729057328000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10718665\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":25,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/mc.2024.3420782","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"type":"print","value":"0018-9162"},{"type":"electronic","value":"1558-0814"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}