{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T10:45:18Z","timestamp":1778150718460,"version":"3.51.4"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Proofpoint Inc."},{"name":"AgAID AI Institute for Agriculture Decision Support"},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"name":"United States Department of Agriculture - National Institute of Food and Agriculture","award":["2021-67021-35344"],"award-info":[{"award-number":["2021-67021-35344"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Pattern Anal. Mach. Intell."],"published-print":{"date-parts":[[2023,6,1]]},"DOI":"10.1109\/tpami.2022.3224754","type":"journal-article","created":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T23:14:47Z","timestamp":1670282087000},"page":"7353-7366","source":"Crossref","is-referenced-by-count":40,"title":["Dynamic Time Warping Based Adversarial Framework for Time-Series Domain"],"prefix":"10.1109","volume":"45","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8749-6632","authenticated-orcid":false,"given":"Taha","family":"Belkhouja","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, USA"}]},{"given":"Yan","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3848-5301","authenticated-orcid":false,"given":"Janardhan Rao","family":"Doppa","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851936"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2986319"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99626-4_3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.09.027"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106384"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2785963"},{"key":"ref8","article-title":"Tutorial adversarial robustness: Theory and practice","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Kolter"},{"key":"ref9","first-page":"1","article-title":"Deep adversarial learning for NLP","volume-title":"Proc. Conf. North Amer. Chapter Assoc. Comput. Linguistics: Hum. Lang. Technol.","author":"Wang","year":"2019"},{"key":"ref10","first-page":"64","article-title":"Dynamic-programming approach to continuous speech recognition","volume-title":"Proc. Int. Congr. Acoust.","author":"Sakoe"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74048-3_4"},{"key":"ref12","first-page":"359","article-title":"Using dynamic time warping to find patterns in time series","volume-title":"Proc. 3rd Int. Conf. Knowl. Discov. Data Mining","author":"Berndt"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3069927"},{"key":"ref14","first-page":"4100","article-title":"Learning sleep stages from radio signals: A conditional adversarial architecture","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zhao"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-016-0455-0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1198\/106186008x318440"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref18","first-page":"894","article-title":"Soft-DTW: A differentiable loss function for time-series","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Cuturi"},{"key":"ref19","first-page":"10408","article-title":"Functional adversarial attacks","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Laidlaw"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1017\/S0025557200003508"},{"key":"ref22","article-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models","volume-title":"Proc. 6th Int. Conf. Learn. Representations","author":"Brendel","year":"2018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref24","first-page":"10 408","article-title":"Functional adversarial attacks","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Laidlaw"},{"key":"ref25","article-title":"Spatially transformed adversarial examples","volume-title":"Proc. 6th Int. Conf. Learn. Representations","author":"Xiao","year":"2018"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.0-136"},{"key":"ref27","article-title":"Towards crafting text adversarial samples","author":"Samanta","year":"2017"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00016"},{"key":"ref29","article-title":"On adaptive attacks to adversarial example defenses","author":"Tramer","year":"2020"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.485"},{"key":"ref31","first-page":"274","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Athalye","year":"2018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref33","article-title":"Ensemble adversarial training: Attacks and defenses","volume-title":"Proc. 6th Int. Conf. Learn. Representations","author":"Tram\u00e8r","year":"2018"},{"key":"ref34","article-title":"Adversarial examples in the physical world","volume-title":"Proc. 5th Int. Conf. Learn. Representations","author":"Kurakin","year":"2017"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342648"},{"key":"ref36","article-title":"The UEA & UCR time series classification rep","author":"Bagnall","year":"2020"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2007-11508"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-018-0565-y"},{"key":"ref39","article-title":"FastDTW is approximate and generally slower than the algorithm it approximates","author":"Wu","year":"2020"},{"key":"ref40","article-title":"TensorFlow: Large-scale machine learning on heterogeneous systems","author":"Abadi","year":"2015"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref42","article-title":"Technical report on the CleverHans v2.1.0 adversarial examples library","author":"Papernot","year":"2018"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3012171"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.13543"},{"key":"ref45","doi-asserted-by":"crossref","DOI":"10.1145\/3508352.3549430","article-title":"Reliable machine learning for wearable activity monitoring: Novel algorithms and theoretical guarantees","volume-title":"Proc. 41st Int. Conf. Comput.-Aided Des. (ICCAD)","author":"Hussein","year":"2022"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i6.20552"}],"container-title":["IEEE Transactions on Pattern Analysis and Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/34\/10120646\/9970291-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/34\/10120646\/09970291.pdf?arnumber=9970291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T19:53:17Z","timestamp":1719345197000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9970291\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,1]]},"references-count":46,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tpami.2022.3224754","relation":{},"ISSN":["0162-8828","2160-9292","1939-3539"],"issn-type":[{"value":"0162-8828","type":"print"},{"value":"2160-9292","type":"electronic"},{"value":"1939-3539","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,1]]}}}