{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T15:29:31Z","timestamp":1778081371739,"version":"3.51.4"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"One Connect Financial","award":["RGOCFT2001"],"award-info":[{"award-number":["RGOCFT2001"]}]},{"DOI":"10.13039\/501100001459","name":"Ministry of Education &#x2013; Singapore","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001459","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/tr.2022.3159784","type":"journal-article","created":{"date-parts":[[2022,4,11]],"date-time":"2022-04-11T20:36:08Z","timestamp":1649709368000},"page":"880-895","source":"Crossref","is-referenced-by-count":53,"title":["Model Agnostic Defence Against Backdoor Attacks in Machine Learning"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6484-6249","authenticated-orcid":false,"given":"Sakshi","family":"Udeshi","sequence":"first","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shanshan","family":"Peng","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gerald","family":"Woo","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lionell","family":"Loh","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Louth","family":"Rawshan","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4843-5391","authenticated-orcid":false,"given":"Sudipta","family":"Chattopadhyay","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref2","first-page":"99","article-title":"On a measure of divergence between two statistical populations defined by their probability distributions","volume":"35","author":"Bhattacharyya","year":"1943","journal-title":"Bull. Calcutta Math. Soc"},{"key":"ref3","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"Chen","year":"2017"},{"key":"ref4","first-page":"550","article-title":"A dual approach to scalable verification of deep networks","volume-title":"Proc. 34th Conf. Uncertainty Artif. Intell.","author":"Dvijotham","year":"2018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359790"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00058"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.21.001231"},{"key":"ref8","article-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain,","author":"Gu","year":"2017","journal-title":"NIPS MLSec Workshop"},{"key":"ref9","article-title":"SciPy: Open source scientific tools for Python","author":"Jones","year":"2001"},{"key":"ref10","first-page":"97","article-title":"Reluplex: An efficient SMT solver for verifying deep neural networks","volume-title":"Proc. 29th Int. Conf. Comput. Aided Verification","author":"Katz"},{"key":"ref11","first-page":"9","article-title":"Efficient backprop","volume":"7700","author":"LeCun","year":"2012","journal-title":"Neural Networks: Tricks of the Trade"},{"key":"ref12","first-page":"273","article-title":"Fine-pruning: Defending against backdooring attacks on deep neural networks","volume-title":"Proc. 21st Int. Symp. Res. Attacks, Intrusions, Defenses","author":"Liu"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1137\/1.9780898717716","volume-title":"Introduction to Interval Analysis","author":"Moore","year":"2009"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"ref17","first-page":"1","article-title":"Deepxplore: Automated whitebox testing of deep learning systems","volume-title":"Proc. 26th Symp. Operating Syst. Princ.","author":"Pei","year":"2017"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238172"},{"key":"ref21","article-title":"Intriguing properties of neural networks","volume-title":"Proc. 2nd Int. Conf. Learn. Representations","author":"Szegedy","year":"2014"},{"key":"ref22","volume-title":"Introduction to Data Mining","author":"Tan","year":"2005"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"ref24","first-page":"8011","article-title":"Spectral signatures in backdoor attacks","volume-title":"Proc. Adv. Neural Inf. Process. Syst. 31: Annu. Conf. Neural Inf. Process. Syst.","author":"Tran","year":"2018"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238165"},{"key":"ref26","article-title":"On certifying robustness against backdoor attacks via randomized smoothing","volume-title":"Proc. CVPR Workshop Adversarial Mach. Learn. Comput. Vis.","author":"Wang","year":"2020"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00126"},{"key":"ref28","first-page":"1599","article-title":"Formal security analysis of neural networks using symbolic intervals","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Wang"},{"key":"ref29","article-title":"RAB: Provable robustness against backdoor attacks,","author":"Weber","year":"2020"},{"key":"ref30","first-page":"408","article-title":"Feature-guided black-box safety testing of deep neural networks","volume-title":"Proc. 24th Int. Conf. Tools Algorithms Construction Anal. Syst., Held as Part Eur. Joint Conf. Theory Pract. Softw.","author":"Wicker","year":"2018"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3450569.3463560"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/9787285\/09754562.pdf?arnumber=9754562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T18:12:08Z","timestamp":1705687928000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9754562\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":31,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tr.2022.3159784","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6]]}}}