{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:07:35Z","timestamp":1730304455383,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/wcnc45663.2020.9120722","type":"proceedings-article","created":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T20:48:26Z","timestamp":1592599706000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Environmental Sensitivity Evaluation of Neural Networks in Unmanned Vehicle Perception Module"],"prefix":"10.1109","author":[{"given":"Yuru","family":"Li","sequence":"first","affiliation":[]},{"given":"Dongliang","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Liuqing","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Z-score Definition formula and calculation","year":"0","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2018.8689254"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2759508"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2838132"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.07.009"},{"key":"ref14","volume":"25","author":"nielsen","year":"2015","journal-title":"Neural Networks and Deep Learning"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2876865"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"ref17","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"arXiv preprint arXiv 1312 6199"},{"key":"ref18","article-title":"Evaluating the robustness of neural networks: An extreme value theory approach","author":"weng","year":"2018","journal-title":"arXiv preprint arXiv 1801 10578"},{"key":"ref19","first-page":"2266","article-title":"Formal guarantees on the robustness of a classifier against adversarial manipulation","author":"hein","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref28","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2014","journal-title":"arXiv preprint arXiv 1409 1556"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.2602005"},{"key":"ref27","first-page":"2579","article-title":"Visualizing data using t-sne","volume":"9","author":"maaten","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2015.2409883"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2017.53"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref5","article-title":"Cooperative intelligence for autonomous driving","author":"cheng","year":"2019","journal-title":"ZTE Communications"},{"journal-title":"5G Enabled Vehicular Communications and Networking","year":"2018","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2884200"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2266661"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2309639"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2822762"},{"key":"ref20","article-title":"Towards deep neural network architectures robust to adversarial examples","author":"gu","year":"2014","journal-title":"arXiv preprint arXiv 1412 5068"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00108"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2017.8078560"},{"key":"ref25","article-title":"UA-DETRAC: A new benchmark and protocol for multi-object detection and tracking","volume":"abs 1511 4136","author":"wen","year":"2015","journal-title":"CoRR Arxiv"}],"event":{"name":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2020,5,25]]},"location":"Seoul, Korea (South)","end":{"date-parts":[[2020,5,28]]}},"container-title":["2020 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9116580\/9120448\/09120722.pdf?arnumber=9120722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:11:20Z","timestamp":1656601880000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9120722\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/wcnc45663.2020.9120722","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}