{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:31:45Z","timestamp":1773930705775,"version":"3.50.1"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772198"],"award-info":[{"award-number":["61772198"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972181"],"award-info":[{"award-number":["61972181"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20191331"],"award-info":[{"award-number":["BK20191331"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National First-Class Discipline Program of Light Industry and Engineering","award":["LITE2018"],"award-info":[{"award-number":["LITE2018"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1109\/tcyb.2020.3034792","type":"journal-article","created":{"date-parts":[[2020,12,8]],"date-time":"2020-12-08T01:36:42Z","timestamp":1607391402000},"page":"6857-6871","source":"Crossref","is-referenced-by-count":27,"title":["KAT: A Knowledge Adversarial Training Method for Zero-Order Takagi\u2013Sugeno\u2013Kang Fuzzy Classifiers"],"prefix":"10.1109","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9636-9536","authenticated-orcid":false,"given":"Bin","family":"Qin","sequence":"first","affiliation":[{"name":"School of AI and Computer Science, Jiangnan University, Wuxi, China"}]},{"given":"Fu-Lai","family":"Chung","sequence":"additional","affiliation":[{"name":"Department of Computing, Hong Kong Polytechnic University, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8393-6554","authenticated-orcid":false,"given":"Shitong","family":"Wang","sequence":"additional","affiliation":[{"name":"School of AI and Computer Science, Jiangnan University, Wuxi, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081950"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref3","first-page":"8322","article-title":"Constructing unrestricted adversarial examples with generative models","volume-title":"Proc. Conf. Neural Inf. Process. Syst. (NIPS)","author":"Song"},{"key":"ref4","first-page":"97","article-title":"Support vector machines under adversarial label noise","volume":"20","author":"Biggio","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref5","first-page":"1","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Goodfellow"},{"key":"ref6","volume-title":"Adversarial machine learning at scale","author":"Kurakin","year":"2016"},{"key":"ref7","volume-title":"Towards deeplearning models resistant to adversarial attacks","author":"Madry","year":"2017"},{"key":"ref8","first-page":"1","article-title":"Certifiable distributional robustness with principled adversarial training","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Sinha"},{"key":"ref9","first-page":"1","article-title":"Intriguing properties of neural networks","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Szegedy"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2920268"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2868826"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2858821"},{"issue":"1","key":"ref13","first-page":"1369","article-title":"A novel deep fuzzy classifier by stacking adversarial interpretable TSK fuzzy sub-classifiers with smooth gradient information","volume":"1","author":"Gu","year":"2019","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"ref14","volume-title":"Improving Neural Networks by Preventing Co-Adaptation of Feature Detectors","author":"Hinton","year":"2012"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2017.2729507"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2016.2598270"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/5326.971670"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2004.03.014"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.04.001"},{"key":"ref20","first-page":"505","article-title":"On least learning machine","volume":"9","author":"Wang","year":"2010","journal-title":"J. Jiangnan Univ."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.07.040"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2012.2230179"},{"issue":"2","key":"ref23","first-page":"255","article-title":"KEEL data-mining software tool: Data set repository, integration of algorithms and experimental analysis framework","volume":"17","author":"Alcal\u00e1-Fdez","year":"2011","journal-title":"J. Multiple Valued Logic Soft Comput."},{"key":"ref24","volume-title":"UCI Machine Learning Repository","author":"Bache","year":"2015"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2004.842257"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2012.2215331"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2019.2907497"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.08.081"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2330844"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2280171"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2014.2341655"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3523-0"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2011.2174151"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2016.2604003"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2750679"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2016.2639565"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.2307\/2279372"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.2307\/2279169"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177731944"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2705582"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2759090"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2857815"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2012.2230253"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2011.2142314"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2016.2578341"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.3016972"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.3015749"},{"key":"ref48","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J. Mach. Learn. Res."}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/9814890\/09284461.pdf?arnumber=9284461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:07:30Z","timestamp":1704841650000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9284461\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":48,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2020.3034792","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"value":"2168-2267","type":"print"},{"value":"2168-2275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7]]}}}