{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:57:48Z","timestamp":1761976668744,"version":"build-2065373602"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T00:00:00Z","timestamp":1752624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T00:00:00Z","timestamp":1752624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,16]]},"DOI":"10.1109\/qrs-c65679.2025.00033","type":"proceedings-article","created":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:10:04Z","timestamp":1761930604000},"page":"196-203","source":"Crossref","is-referenced-by-count":0,"title":["Design and Validation of a Verification Platform for Enhancing Robustness of Image Object Recognition Systems"],"prefix":"10.1109","author":[{"given":"Hao","family":"Zhang","sequence":"first","affiliation":[{"name":"CAEP,Institute of Computer Application,Mian Yang,China"}]},{"given":"Tao","family":"Xiao","sequence":"additional","affiliation":[{"name":"CAEP,Institute of Computer Application,Mian Yang,China"}]},{"given":"Fei","family":"Deng","sequence":"additional","affiliation":[{"name":"CAEP,Institute of Computer Application,Mian Yang,China"}]},{"given":"Chi","family":"Hu","sequence":"additional","affiliation":[{"name":"CAEP,Institute of Computer Application,Mian Yang,China"}]},{"given":"Yuyao","family":"Zhou","sequence":"additional","affiliation":[{"name":"CAEP,Institute of Computer Application,Mian Yang,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2024.105405"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397357"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3680464"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598093"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2025.112984"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/aaai.12173"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1049\/icp.2024.4293"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-023-00661-1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0020"},{"article-title":"Countering Adversarial Images using Input Transformations","volume-title":"proceedings of the 6th International Conference on Learning Representation (ICLR)","author":"Guo","key":"ref10"},{"article-title":"Keeping the bad guys out: Protecting and vaccinating deep learning with jpeg compression","year":"2017","author":"Das","key":"ref11"},{"article-title":"Towards deep neural network architectures robust to adversarial examples","volume-title":"ICLR","author":"Gu","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00191"},{"article-title":"Explaining and Harnessing Adversarial Examples","volume-title":"ICLR","author":"Goodfellow","key":"ref14"},{"article-title":"Adversarial Machine Learning at Scale","volume-title":"ICLR","author":"Kurakin","key":"ref15"},{"article-title":"Towards Deep Learning Models Resistant to Adversarial Attacks","volume-title":"ICLR","author":"Madry","key":"ref16"},{"article-title":"On Detecting Adversarial Perturbations","volume-title":"ICLR","author":"Metzen","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.56"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01446"},{"key":"ref20","first-page":"336","article-title":"No bot expects the deepcaptcha! introducing immutable adversarial exam-ples with applications to captcha","author":"Osadchy","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"article-title":"PixelDefend: Leveraging generative models to understand and defend against adversarial examples","volume-title":"ICLR","author":"Song","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00624"},{"journal-title":"Adversarial Training for Free!","year":"2019","author":"Shafahi","key":"ref23"},{"article-title":"Fast is better than free: Revisiting adversarial training","volume-title":"Proceedings of the International Conference on Learning Representations","author":"Wong","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00126"},{"article-title":"MMA Training: Direct Input Space Margin Maximization through Adversarial Training","volume-title":"Proceedings of the International Conference on Learning Representations","author":"Ding","key":"ref26"},{"article-title":"Rethinking Softmax Cross-Entropy Loss for Adversarial Robustness","volume-title":"Proceedings of the International Conference on Learning Representations","author":"Pang","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3301608"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6140"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23198"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2874243"},{"article-title":"VisionGuard: Runtime Detection of Adversarial Inputs to Perception Systems","year":"2020","author":"Yiannis","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.109027"}],"event":{"name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","start":{"date-parts":[[2025,7,16]]},"location":"Hangzhou, China","end":{"date-parts":[[2025,7,20]]}},"container-title":["2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11216429\/11216154\/11216527.pdf?arnumber=11216527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:55:02Z","timestamp":1761976502000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11216527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,16]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/qrs-c65679.2025.00033","relation":{},"subject":[],"published":{"date-parts":[[2025,7,16]]}}}