{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:03:39Z","timestamp":1764842619581,"version":"3.37.3"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/spw54247.2022.9833884","type":"proceedings-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:14:47Z","timestamp":1658780087000},"page":"80-87","source":"Crossref","is-referenced-by-count":21,"title":["Parameterizing Activation Functions for Adversarial Robustness"],"prefix":"10.1109","author":[{"given":"Sihui","family":"Dai","sequence":"first","affiliation":[{"name":"Princeton University,Electrical and Computer Engineering,Princeton,USA"}]},{"given":"Saeed","family":"Mahloujifar","sequence":"additional","affiliation":[{"name":"Princeton University,Electrical and Computer Engineering,Princeton,USA"}]},{"given":"Prateek","family":"Mittal","sequence":"additional","affiliation":[{"name":"Princeton University,Electrical and Computer Engineering,Princeton,USA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58558-7_29"},{"key":"ref38","article-title":"Denoising diffusion probabilistic models","author":"ho","year":"2020","journal-title":"Advances in Neural Information Processing Systems 33 Annual Conference on Neural Information Processing Systems 2020 NeurIPS 2020 December 6-12 2020 virtual"},{"key":"ref33","article-title":"Defend deep neural networks against adversarial examples via fixed and dynamic quantized activation functions","author":"rakin","year":"2018","journal-title":"arXiv preprint arXiv 1807 06714"},{"article-title":"Splash: Learnable activation functions for improving accuracy and adversarial robustness","year":"2020","author":"tavakoli","key":"ref32"},{"article-title":"Adversarial defense via data dependent activation function and total variation minimization","year":"2018","author":"wang","key":"ref31"},{"article-title":"Suppressing the unusual: towards robust cnns using symmetric activation functions","year":"2016","author":"zhao","key":"ref30"},{"key":"ref37","article-title":"The deep bootstrap framework: Good online learners are good offline generalizers","author":"nakkiran","year":"2020","journal-title":"International Conference on Learning Representations"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2019.8913972"},{"key":"ref35","first-page":"472","article-title":"Incorporating second-order functional knowledge for better option pricing","author":"dugas","year":"2001","journal-title":"Advances in neural information processing systems"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01611"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref11","article-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models","author":"brendel","year":"2018","journal-title":"International Conference on Learning Representations"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"ref13","article-title":"Transferability in machine learning: from phenomena to black-box attacks using adversarial samples","author":"papernot","year":"2016","journal-title":"arXiv preprint arXiv 1605 07761"},{"key":"ref14","article-title":"On the convergence and robustness of adversarial training","author":"wang","year":"2019","journal-title":"International Conference on Machine Learning"},{"key":"ref15","article-title":"Geometryaware instance-reweighted adversarial training","author":"zhang","year":"2020","journal-title":"International Conference on Learning Representations"},{"key":"ref16","article-title":"Attacks which do not kill training make adversarial learning stronger","author":"zhang","year":"2020","journal-title":"ICML"},{"key":"ref17","article-title":"Adversarial weight perturbation helps robust generalization","author":"wu","year":"2020","journal-title":"NeurIPS"},{"key":"ref18","article-title":"Bag of tricks for adversarial training","author":"pang","year":"2020","journal-title":"International Conference on Learning Representations"},{"key":"ref19","first-page":"11192","article-title":"Unlabeled data improves adversarial robustness","author":"carmon","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"ref4","article-title":"Timothy Mann, and Pushmeet Kohli. Uncovering the limits of adversarial training against norm-bounded adversarial examples","author":"gowal","year":"2020","journal-title":"arXiv preprint arXiv 2010 00170"},{"article-title":"Searching for activation functions","year":"0","author":"ramachandran","key":"ref27"},{"key":"ref3","first-page":"7472","article-title":"Theoretically principled trade-off between robustness and accuracy","author":"zhang","year":"0"},{"article-title":"Does network width really help adversarial robustness?","year":"2020","author":"wu","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140449"},{"key":"ref5","article-title":"Intriguing properties of adversarial training at scale","author":"xie","year":"2019","journal-title":"International Conference on Learning Representations"},{"key":"ref8","first-page":"2206","article-title":"Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks","author":"croce","year":"2020","journal-title":"International Conference on Machine Learning"},{"key":"ref7","article-title":"Smooth adversarial training","author":"xie","year":"2020","journal-title":"arXiv preprint arXiv 2006 14536"},{"key":"ref2","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2018","journal-title":"International Conference on Learning Representations"},{"key":"ref9","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"3rd International Conference on Learning Representations ICLR 2015 San Diego CA USA May 7-9 2015 Conference Track Proceedings"},{"key":"ref1","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"2nd International Conference on Learning Representations ICLR 2014 Banff AB Canada April 1416 2014 Conference Track Proceedings"},{"article-title":"Improving adversarial robustness using proxy distributions","year":"2021","author":"sehwag","key":"ref20"},{"key":"ref22","first-page":"8093","article-title":"Overfitting in adversarially robust deep learning","author":"rice","year":"2020","journal-title":"International Conference on Machine Learning"},{"key":"ref21","article-title":"Fixing data augmentation to improve adversarial robustness","author":"rebuffi","year":"2021","journal-title":"CoRR"},{"key":"ref24","article-title":"A universal law of robustness via isoperimetry","author":"bubeck","year":"2021","journal-title":"arXiv preprint arXiv 2105 12806"},{"key":"ref23","article-title":"Robustbench: a standardized adversarial robustness benchmark","author":"croce","year":"2020","journal-title":"arXiv preprint arXiv 2010 00170"},{"key":"ref26","first-page":"315","article-title":"Deep sparse rectifier neural networks","author":"glorot","year":"2011","journal-title":"Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics"},{"key":"ref25","article-title":"Fast and accurate deep network learning by exponential linear units (elus)","author":"clevert","year":"2016","journal-title":"4th International Conference on Learning Representations ICLR 2016 San Juan Puerto Rico May 2-4 2016 Conference Track Proceedings"}],"event":{"name":"2022 IEEE Security and Privacy Workshops (SPW)","start":{"date-parts":[[2022,5,22]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Security and Privacy Workshops (SPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833855\/9833856\/09833884.pdf?arnumber=9833884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T20:04:12Z","timestamp":1661198652000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833884\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/spw54247.2022.9833884","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}