{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T14:32:33Z","timestamp":1744209153244,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1109\/mlsp49062.2020.9231583","type":"proceedings-article","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T17:53:19Z","timestamp":1603302799000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Adversarial Attacks on Hierarchical Composite Classifiers VIA Convex Programming"],"prefix":"10.1109","author":[{"given":"Ismail","family":"Alkhouri","sequence":"first","affiliation":[]},{"given":"George K.","family":"Atia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2529620"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2015.2495104"},{"key":"ref12","volume":"3","author":"kay","year":"2013","journal-title":"Fundamentals of Statistical Signal Processing Practical Algorithm Development"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-2265-2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/78.928688"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854234"},{"key":"ref16","article-title":"Hierar-chical classification of emotional speech","volume":"37","author":"xiao","year":"2007","journal-title":"IEEE Transactions on Multimedia"},{"key":"ref17","volume":"67","author":"bottcher","year":"2000","journal-title":"Toeplitz Matrices Asymptotic Linear Algebra and Functional Analysis"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1977.tb01600.x"},{"journal-title":"Game Theory","year":"1991","author":"fudenberg","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS45731.2020.9180821"},{"journal-title":"Trust region based adversarial attack on neural networks","year":"2018","author":"yao","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2018.8645290"},{"key":"ref8","first-page":"1","article-title":"Im-proving human action recognition through hierarchical neural network classifiers","author":"zhdanov","year":"2018","journal-title":"IEEE International Joint Conference on Neural Networks"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-010-0175-9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref9","article-title":"Group sparsity based airborne wide angle SAR imaging","volume":"10004","author":"wei","year":"2016","journal-title":"Image and Signal Processing for Remote Sensing XI"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1993.298559"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1590\/0101-7438.2014.034.03.0395"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-155-8_7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1137\/110836936"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1561\/2200000016"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.11.086"},{"key":"ref25","article-title":"Deepfool: A simple and accurate method to fool deep neural networks","author":"m-dezfooli","year":"2016","journal-title":"The IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"}],"event":{"name":"2020 IEEE 30th International Workshop on Machine Learning for Signal Processing (MLSP)","start":{"date-parts":[[2020,9,21]]},"location":"Espoo, Finland","end":{"date-parts":[[2020,9,24]]}},"container-title":["2020 IEEE 30th International Workshop on Machine Learning for Signal Processing (MLSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9217888\/9231523\/09231583.pdf?arnumber=9231583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:56:23Z","timestamp":1656453383000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9231583\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/mlsp49062.2020.9231583","relation":{},"subject":[],"published":{"date-parts":[[2020,9]]}}}