{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:33:48Z","timestamp":1729643628482,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/wifs47025.2019.9034980","type":"proceedings-article","created":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T03:17:42Z","timestamp":1584415062000},"page":"1-2","source":"Crossref","is-referenced-by-count":0,"title":["Information Security Meets Adversarial Examples"],"prefix":"10.1109","author":[{"given":"Matthias","family":"Kirchner","sequence":"first","affiliation":[]},{"given":"Cecilia","family":"Pasquini","sequence":"additional","affiliation":[]},{"given":"Ilia","family":"Shumailov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2745572"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2018.8451503"},{"key":"ref30","article-title":"Cycle GAN-based attack on recaptured images to fool both human and machine","author":"zhao","year":"2018","journal-title":"Digital Forensics and Watermarking"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00041"},{"key":"ref11","article-title":"Are deep neural networks good for blind image watermarking&#x0192;","author":"vukoti?","year":"2018","journal-title":"IEEE International Workshop on Information Forensics and Security"},{"key":"ref12","article-title":"Sitatapatra: Blocking the Transfer of Adversarial Samples","volume":"abs 1901 8121","author":"shumailov","year":"2019","journal-title":"CoRR"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553164"},{"key":"ref14","article-title":"Hiding images in plain sight: Deep steganography","author":"baluja","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2891237"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3206004.3206012"},{"key":"ref18","article-title":"CNN-based steganalysis and parametric adversarial embedding: a game-theoretic framework","volume":"abs 1906 697","author":"shi","year":"2019","journal-title":"CoRR"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3335203.3335737"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2018-34"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"key":"ref27","article-title":"Source generator attribution via inversion","author":"albright","year":"2019","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"ref6","article-title":"SoK: Security and privacy in machine learning","author":"papernot","year":"2018","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00021"},{"key":"ref5","article-title":"To compress or not to compress: Understanding the interactions between adversarial attacks and neural network compression","author":"zhao","year":"2018","journal-title":"The Conference on Systems and Machine Learning"},{"article-title":"Intriguing properties of neural networks","year":"2013","author":"szegedy","key":"ref8"},{"key":"ref7","article-title":"Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information","volume":"abs 1909 2918","author":"zhao","year":"2019","journal-title":"CoRR"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1109\/ICASSP.2013.6639361","article-title":"Coping with the enemy: Advances in adversary-aware signal processing","author":"barni","year":"2013","journal-title":"IEEE International Conference on Acoustics Speech and Signal Processing"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0757-7_12"},{"key":"ref22","article-title":"On the transferability of adversarial examples against CNN-based image forensics","author":"barni","year":"2019","journal-title":"IEEE International Conference on Acoustics Speech and Signal Processing"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.04.007"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3335203.3335724"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR.2019.00103"},{"key":"ref25","article-title":"Attributing fake images to GANs: Analyzing fingerprints in generated images","author":"yu","year":"2019","journal-title":"International Conference on Computer Vision"}],"event":{"name":"2019 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2019,12,9]]},"location":"Delft, Netherlands","end":{"date-parts":[[2019,12,12]]}},"container-title":["2019 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9034067\/9034979\/09034980.pdf?arnumber=9034980","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T18:27:25Z","timestamp":1695925645000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9034980\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/wifs47025.2019.9034980","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}