{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T21:55:03Z","timestamp":1775080503648,"version":"3.50.1"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/vizsec.2017.8062202","type":"proceedings-article","created":{"date-parts":[[2017,10,9]],"date-time":"2017-10-09T21:25:33Z","timestamp":1507584333000},"page":"1-4","source":"Crossref","is-referenced-by-count":28,"title":["Adversarial-Playground: A visualization suite showing how adversarial examples fool deep learning"],"prefix":"10.1109","author":[{"given":"Andrew P.","family":"Norton","sequence":"first","affiliation":[]},{"given":"Yanjun","family":"Qi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","author":"goodfellow","year":"2014","journal-title":"Explaining and Harnessing Adversarial Examples"},{"key":"ref3","article-title":"Cleverhans v0.1: an adversarial machine learning library","author":"goodfellow","year":"2016","journal-title":"CoRR abs\/1610 00768"},{"key":"ref10","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"CoRR abs\/1312 6199"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref11","article-title":"Understanding neural networks through deep visualization","author":"yosinski","year":"2015","journal-title":"CoRR abs\/1506 06579"},{"key":"ref5","first-page":"1097","article-title":"ImageNet Classification with Deep Convolutional Neural Networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref8","article-title":"The limitations of deep learning in adversarial settings","author":"papernot","year":"2015","journal-title":"CoRR abs\/1511 07528"},{"key":"ref7","year":"2015","journal-title":"Microsoft Corporation Microsoft Malware Competition Challenge"},{"key":"ref2","article-title":"Towards evaluating the robustness of neural networks","author":"carlini","year":"2016","journal-title":"CoRR abs\/1608 04644"},{"key":"ref9","article-title":"Deep Face Recognition","author":"parkhi","year":"2015","journal-title":"British Machine Vision Conference"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"}],"event":{"name":"2017 IEEE Symposium on Visualization for Cyber Security (VizSec)","location":"Phoenix, AZ, USA","start":{"date-parts":[[2017,10,2]]},"end":{"date-parts":[[2017,10,2]]}},"container-title":["2017 IEEE Symposium on Visualization for Cyber Security (VizSec)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8052583\/8062166\/08062202.pdf?arnumber=8062202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T19:59:17Z","timestamp":1512071957000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8062202\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/vizsec.2017.8062202","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}