{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T22:50:11Z","timestamp":1752101411539,"version":"3.37.3"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Neural Netw. Learning Syst."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tnnls.2023.3299408","type":"journal-article","created":{"date-parts":[[2023,8,10]],"date-time":"2023-08-10T17:43:38Z","timestamp":1691689418000},"page":"17070-17084","source":"Crossref","is-referenced-by-count":4,"title":["Generating Semantic Adversarial Examples via Feature Manipulation in Latent Space"],"prefix":"10.1109","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8938-2364","authenticated-orcid":false,"given":"Shuo","family":"Wang","sequence":"first","affiliation":[{"name":"CSIRO&#x2019;s Data61 and Cybersecurity CRC, Marsfield, NSW, Australia"}]},{"given":"Shangyu","family":"Chen","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Monash University, Melbourne, VIC, Australia"}]},{"given":"Tianle","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Queensland, St Lucia, QLD, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3289-6599","authenticated-orcid":false,"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[{"name":"CSIRO&#x2019;s Data61 and Cybersecurity CRC, Marsfield, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9050-5675","authenticated-orcid":false,"given":"Carsten","family":"Rudolph","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Monash University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6933-0145","authenticated-orcid":false,"given":"Marthie","family":"Grobler","sequence":"additional","affiliation":[{"name":"CSIRO&#x2019;s Data61 and Cybersecurity CRC, Marsfield, NSW, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00212"},{"key":"ref2","article-title":"Unrestricted adversarial examples via semantic manipulation","author":"Bhattad","year":"2019","journal-title":"arXiv:1904.06347"},{"key":"ref3","first-page":"1802","article-title":"A rotation and a translation suffice: Fooling CNNs with simple transformations","volume-title":"Proc. Int. Conf. Mach. Learn. (PMLR)","author":"Engstrom"},{"key":"ref4","article-title":"Generating natural adversarial examples","author":"Zhao","year":"2017","journal-title":"arXiv:1710.11342"},{"key":"ref5","article-title":"Autoencoding beyond pixels using a learned similarity metric","author":"Larsen","year":"2015","journal-title":"arXiv:1512.09300"},{"key":"ref6","article-title":"\u03b2-VAE: Learning basic visual concepts with a constrained variational framework","volume-title":"Proc. Int. Conf. Learn. Represent.","volume":"3","author":"Higgins"},{"key":"ref7","article-title":"Disentangling by factorising","author":"Kim","year":"2018","journal-title":"arXiv:1802.05983"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"ref9","first-page":"2172","article-title":"InfoGAN: Interpretable representation learning by information maximizing generative adversarial nets","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Chen"},{"key":"ref10","article-title":"Adversarial feature learning","author":"Donahue","year":"2016","journal-title":"arXiv:1605.09782"},{"key":"ref11","first-page":"5534","article-title":"Improved semi-supervised learning with GANs using manifold invariances","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NIPS)","author":"Kumar"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.19"},{"key":"ref13","article-title":"Generative adversarial text to image synthesis","volume-title":"arXiv:1605.05396","author":"Reed","year":"2016"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1147\/rd.41.0066"},{"key":"ref15","first-page":"700","article-title":"Unsupervised image-to-image translation networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Liu"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01219-9_11"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref18","article-title":"Adversarial autoencoders","author":"Makhzani","year":"2015","journal-title":"arXiv:1511.05644"},{"key":"ref19","article-title":"A neural algorithm of artistic style","author":"Gatys","year":"2015","journal-title":"arXiv:1508.06576"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2003.1292216"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"volume-title":"MNIST Handwritten Digit Database","year":"2010","author":"LeCun","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref24","article-title":"Backdoor embedding in convolutional neural network models via invisible perturbation","author":"Liao","year":"2018","journal-title":"arXiv:1808.10307"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"ref26","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46805-6_19"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref31","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv:1312.6199"},{"key":"ref32","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref34","article-title":"On the (statistical) detection of adversarial examples","author":"Grosse","year":"2017","journal-title":"arXiv:1702.06280"},{"key":"ref35","article-title":"On detecting adversarial perturbations","author":"Metzen","year":"2017","journal-title":"arXiv:1702.04267"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02362"},{"key":"ref37","article-title":"Towards verifying robustness of neural networks against semantic perturbations","author":"Mohapatra","year":"2019","journal-title":"arXiv:1912.09533"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58568-6_2"},{"key":"ref39","article-title":"Differentiable augmentation for data-efficient GAN training","author":"Zhao","year":"2020","journal-title":"arXiv:2006.10738"}],"container-title":["IEEE Transactions on Neural Networks and Learning Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962385\/10772360\/10214428.pdf?arnumber=10214428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T19:10:07Z","timestamp":1733253007000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10214428\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":39,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tnnls.2023.3299408","relation":{},"ISSN":["2162-237X","2162-2388"],"issn-type":[{"type":"print","value":"2162-237X"},{"type":"electronic","value":"2162-2388"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}