{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T11:56:07Z","timestamp":1753358167952,"version":"3.37.3"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-19-1-0053"],"award-info":[{"award-number":["W911NF-19-1-0053"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CIF-1909320","CIF-2224263"],"award-info":[{"award-number":["CIF-1909320","CIF-2224263"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Signal Process."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tsp.2022.3198169","type":"journal-article","created":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T19:28:20Z","timestamp":1660246100000},"page":"4124-4139","source":"Crossref","is-referenced-by-count":4,"title":["Generalized Likelihood Ratio Test for Adversarially Robust Hypothesis Testing"],"prefix":"10.1109","volume":"70","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1083-137X","authenticated-orcid":false,"given":"Bhagyashree","family":"Puranik","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of California Santa Barbara, Santa Barbara, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7800-4138","authenticated-orcid":false,"given":"Upamanyu","family":"Madhow","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of California Santa Barbara, Santa Barbara, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1126-0292","authenticated-orcid":false,"given":"Ramtin","family":"Pedarsani","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of California Santa Barbara, Santa Barbara, CA, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413587"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"article-title":"Intriguing properties of neural networks","year":"2013","author":"Szegedy","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref6","first-page":"513","article-title":"Hidden voice commands","volume-title":"Proc. 25th USENIX Secur. Symp.","author":"Carlini","year":"2016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053569"},{"key":"ref8","first-page":"5286","article-title":"Provable defenses against adversarial examples via the convex outer adversarial polytope","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Wong","year":"2018"},{"article-title":"Certified defenses against adversarial examples","year":"2018","author":"Raghunathan","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref11","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. 3rd Int. Conf. Learn. Representations","author":"Goodfellow","year":"2015"},{"key":"ref12","first-page":"1633","article-title":"On adaptive attacks to adversarial example defenses","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Tramr","year":"2020"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref14","first-page":"274","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Athalye","year":"2018"},{"key":"ref15","first-page":"7472","article-title":"Theoretically principled trade-off between robustness and accuracy","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Zhang"},{"key":"ref16","first-page":"11192","article-title":"Unlabeled data improves adversarial robustness","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Carmon","year":"2019"},{"key":"ref17","first-page":"831","article-title":"Adversarial examples from computational constraints","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Bubeck","year":"2019"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177699803"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1971.1054590"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2693198"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2021.3061298"},{"key":"ref22","first-page":"7496","article-title":"Lower bounds on adversarial robustness from optimal transport","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Bhagoji","year":"2019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3863-6"},{"key":"ref24","first-page":"10900","article-title":"Semidefinite relaxations for certifying robustness to adversarial examples","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Raghunathan","year":"2018"},{"key":"ref25","first-page":"8410","article-title":"Scaling provable adversarial defenses","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Wong","year":"2018"},{"key":"ref26","first-page":"2266","article-title":"Formal guarantees on the robustness of a classifier against adversarial manipulation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Hein","year":"2017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437638"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.2974676"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.3045206"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.3021525"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2022.3205449"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1137\/21M1426286"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2021.3100107"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053020"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177731721"}],"container-title":["IEEE Transactions on Signal Processing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/78\/9675017\/9855383-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/78\/9675017\/09855383.pdf?arnumber=9855383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T05:03:28Z","timestamp":1709355808000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9855383\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/tsp.2022.3198169","relation":{},"ISSN":["1053-587X","1941-0476"],"issn-type":[{"type":"print","value":"1053-587X"},{"type":"electronic","value":"1941-0476"}],"subject":[],"published":{"date-parts":[[2022]]}}}