{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T10:14:29Z","timestamp":1760609669321,"version":"3.37.3"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Eng. Manage."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tem.2022.3194487","type":"journal-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T22:46:53Z","timestamp":1667861213000},"page":"12475-12486","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Hypersphere Embedding Scale Against Adversarial Attacks"],"prefix":"10.1109","volume":"71","author":[{"given":"Mohammed","family":"Hassanin","sequence":"first","affiliation":[{"name":"School of Engineering and Information Technology, University of New South Wales at the Australian Defence Force Academy, Canberra, ACT, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6127-9349","authenticated-orcid":false,"given":"Nour","family":"Moustafa","sequence":"additional","affiliation":[{"name":"School of Engineering and Information Technology, University of New South Wales at the Australian Defence Force Academy, Canberra, ACT, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3930-6600","authenticated-orcid":false,"given":"Imran","family":"Razzak","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of New South Wales, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5727-3697","authenticated-orcid":false,"given":"M.","family":"Tanveer","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computer Science, Indian Institute of Technology-Indore, Indore, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0599-8362","authenticated-orcid":false,"given":"David","family":"Ormrod","sequence":"additional","affiliation":[{"name":"University of South Australia, Adelaide, SA, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2352-8815","authenticated-orcid":false,"given":"Jill","family":"Slay","sequence":"additional","affiliation":[{"name":"University of South Australia, Adelaide, SA, Australia"}]}],"member":"263","reference":[{"key":"ref1","first-page":"274","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Athalye","year":"2018"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/SNPD.2017.8022700"},{"key":"ref3","article-title":"Understanding batch normalization","volume-title":"Adv. Neural Inf. Process. Syst.","volume":"31","author":"Bjorck","year":"2018"},{"year":"2016","author":"Carlini","article-title":"Defensive distillation is not robust to adversarial examples","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/SP.2017.49"},{"key":"ref6","first-page":"2206","article-title":"Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Croce","year":"2020"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/CVPR.2019.00482"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/WACV51458.2022.00385"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3506852"},{"year":"2019","author":"Galloway","article-title":"Batch normalization is a cause of adversarial vulnerability","key":"ref10"},{"key":"ref11","first-page":"2280","article-title":"Adversarial examples are a natural consequence of test error in noise","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Gilmer","year":"2019"},{"year":"2014","author":"Goodfellow","article-title":"Explaining and harnessing adversarial examples","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/3446370"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/SSCI47803.2020.9308330"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1016\/j.cose.2022.102640"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.jvcir.2022.103448"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.5555\/3045118.3045167"},{"year":"2018","author":"Kannan","article-title":"Adversarial logit pairing","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/EWDTS.2018.8524672"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1201\/9781351251389-8"},{"key":"ref21","article-title":"Large-margin softmax loss for convolutional neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Liu","year":"2016"},{"key":"ref22","first-page":"1","article-title":"Characterizing adversarial subspaces using local intrinsic dimensionality","volume-title":"Proc. 6th Int. Conf. Learn. Representations","author":"Ma","year":"2018"},{"year":"2017","author":"Madry","article-title":"Towards deep learning models resistant to adversarial attacks","key":"ref23"},{"key":"ref24","first-page":"353","article-title":"Probability risk identification based intrusion detection system for SCADA systems","volume-title":"Proc. Int. Conf. Mobile Netw. Manage.","author":"Marsden","year":"2017"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-981-10-7871-2_3","article-title":"Flow aggregator module for analysing network traffic","volume-title":"Progress in Computing, Analytics and Networking","author":"Moustafa","year":"2018"},{"key":"ref26","first-page":"4016","article-title":"Max-Mahalanobis linear discriminant analysis networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Pang","year":"2018"},{"year":"2019","author":"Pang","article-title":"Rethinking softmax cross-entropy loss for adversarial robustness","key":"ref27"},{"key":"ref28","first-page":"7779","article-title":"Boosting adversarial training with hypersphere embedding","volume":"33","author":"Pang","year":"2020"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/SP.2016.41"},{"year":"2017","author":"Ranjan","article-title":"L2-constrained softmax loss for discriminative face verification","key":"ref30"},{"key":"ref31","article-title":"How does batch normalization help optimization","volume-title":"Adv. Neural Inf. Process. Syst.","volume":"31","author":"Santurkar","year":"2018"},{"key":"ref32","first-page":"11539","article-title":"Improving robustness against common corruptions by covariate shift adaptation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Schneider","year":"2020"},{"key":"ref33","first-page":"11539","article-title":"Improving robustness against common corruptions by covariate shift adaptation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Schneider","year":"2020"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/LSP.2018.2822810"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1145\/3123266.3123359"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/CVPR.2018.00552"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/ICCV.2019.00673"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/CVPR.2018.00813"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1007\/978-3-319-46478-7_31"},{"key":"ref40","article-title":"Intriguing properties of adversarial training at scale","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Xie","year":"2020"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.14722\/ndss.2018.23198"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.5244\/C.30.87"},{"key":"ref43","first-page":"1831","article-title":"Defense against adversarial attacks using feature scattering-based adversarial training","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Zhang","year":"2019"},{"key":"ref44","first-page":"7472","article-title":"Theoretically principled trade-off between robustness and accuracy","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zhang","year":"2019"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1007\/978-3-030-58574-7_18"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/CVPR.2018.00534"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/ICCV.2019.00665"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/BigData50022.2020.9378303"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1109\/ICCV48922.2021.00772"}],"container-title":["IEEE Transactions on Engineering Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/17\/10339242\/09940553.pdf?arnumber=9940553","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T06:47:44Z","timestamp":1723186064000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9940553\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/tem.2022.3194487","relation":{},"ISSN":["0018-9391","1558-0040"],"issn-type":[{"type":"print","value":"0018-9391"},{"type":"electronic","value":"1558-0040"}],"subject":[],"published":{"date-parts":[[2024]]}}}