{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:26:02Z","timestamp":1740101162915,"version":"3.37.3"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100007431","name":"NRF","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007431","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,26]]},"DOI":"10.1109\/mmsp55362.2022.9949274","type":"proceedings-article","created":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T21:39:16Z","timestamp":1669153156000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Adversarial Robustness of Flow-based Image Super-Resolution"],"prefix":"10.1109","author":[{"given":"Junha","family":"Park","sequence":"first","affiliation":[{"name":"School of Integrated Technology, Yonsei University,Republic of Korea"}]},{"given":"Jun-Ho","family":"Choi","sequence":"additional","affiliation":[{"name":"School of Integrated Technology, Yonsei University,Republic of Korea"}]},{"given":"Jong-Seok","family":"Lee","sequence":"additional","affiliation":[{"name":"School of Integrated Technology, Yonsei University,Republic of Korea"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.19"},{"key":"ref11","first-page":"63","article-title":"ESRGAN: enhanced super-resolution generative adversarial networks","author":"wang","year":"2018","journal-title":"Proc European Conf Computer Vision Workshops"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00236"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00557"},{"key":"ref14","article-title":"Density estimation using real NVP","author":"dinh","year":"2017","journal-title":"Proc Int Conf Learning Representations"},{"key":"ref15","first-page":"1530","article-title":"Variational inference with normalizing flows","author":"rezende","year":"2015","journal-title":"Proc Int Conf Machine Learning"},{"key":"ref16","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"Proc Int Conf Learning Representations"},{"key":"ref17","first-page":"3795","article-title":"Adversarial robustness of flow-based generative models","author":"pope","year":"2020","journal-title":"Proc Int Conf Artificial Intelligence and Statistics"},{"key":"ref18","article-title":"Adversarial machine learning at scale","author":"kurakin","year":"2017","journal-title":"Proc Int Conf Learning Representations"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3240508.3240603"},{"key":"ref3","article-title":"Deep image destruction: A comprehensive study on vulnerability of deep image-to-image models against adversarial attacks","author":"choi","year":"2022","journal-title":"Proc Int Conf Pattern Recognition"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00046"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58558-7_42"},{"key":"ref8","first-page":"256","article-title":"Fast, accurate, and lightweight super-resolution with cascading residual network","author":"ahn","year":"2018","journal-title":"Proc European Conf Computer Vision"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.151"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00039"},{"key":"ref9","first-page":"294","article-title":"Image super-resolution using very deep residual channel attention networks","author":"zhang","year":"2018","journal-title":"Proc European Conf Computer Vision"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2982166"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2001.937655"},{"key":"ref22","article-title":"A study of the effect of JPG compression on adversarial images","author":"dziugaite","year":"2016","journal-title":"ArXiv"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23198"},{"key":"ref23","article-title":"Mitigating adversarial effects through randomization","author":"xie","year":"2018","journal-title":"Proc Int Conf Learning Representations"}],"event":{"name":"2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP)","start":{"date-parts":[[2022,9,26]]},"location":"Shanghai, China","end":{"date-parts":[[2022,9,28]]}},"container-title":["2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9948698\/9948704\/09949274.pdf?arnumber=9949274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:54:27Z","timestamp":1670874867000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9949274\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,26]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/mmsp55362.2022.9949274","relation":{},"subject":[],"published":{"date-parts":[[2022,9,26]]}}}