{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T16:22:28Z","timestamp":1771950148553,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T00:00:00Z","timestamp":1497830400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,19]]},"DOI":"10.1145\/3095713.3095753","type":"proceedings-article","created":{"date-parts":[[2017,8,28]],"date-time":"2017-08-28T12:45:27Z","timestamp":1503924327000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Detecting adversarial example attacks to deep neural networks"],"prefix":"10.1145","author":[{"given":"Fabio","family":"Carrara","sequence":"first","affiliation":[{"name":"ISTI-CNR, Pisa, Italy"}]},{"given":"Fabrizio","family":"Falchi","sequence":"additional","affiliation":[{"name":"ISTI-CNR, Pisa, Italy"}]},{"given":"Roberto","family":"Caldelli","sequence":"additional","affiliation":[{"name":"CNIT, MICC-University of Florence, Florence, Italy"}]},{"given":"Giuseppe","family":"Amato","sequence":"additional","affiliation":[{"name":"ISTI-CNR, Pisa, Italy"}]},{"given":"Roberta","family":"Fumarola","sequence":"additional","affiliation":[{"name":"University of Pisa, Pisa, Italy"}]},{"given":"Rudy","family":"Becarelli","sequence":"additional","affiliation":[{"name":"MICC-University of Florence, Florence, Italy"}]}],"member":"320","published-online":{"date-parts":[[2017,6,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.10.055"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46759-7_15"},{"key":"e_1_3_2_1_3_1","first-page":"21","article-title":"Visual recognition of ancient inscriptions using convolutional neural network and fisher vector","volume":"9","author":"Amato Giuseppe","year":"2016","unstructured":"Giuseppe Amato , Fabrizio Falchi , and Lucia Vadicamo . 2016 . Visual recognition of ancient inscriptions using convolutional neural network and fisher vector . Journal on Computing and Cultural Heritage (JOCCH) 9 , 4 (2016), 21 . Giuseppe Amato, Fabrizio Falchi, and Lucia Vadicamo. 2016. Visual recognition of ancient inscriptions using convolutional neural network and fisher vector. Journal on Computing and Cultural Heritage (JOCCH) 9, 4 (2016), 21.","journal-title":"Journal on Computing and Cultural Heritage (JOCCH)"},{"key":"e_1_3_2_1_4_1","volume-title":"Hierarchical Boundary-Aware Neural Encoder for Video Captioning. arXiv preprint arXiv:1611.09312","author":"Baraldi Lorenzo","year":"2016","unstructured":"Lorenzo Baraldi , Costantino Grana , and Rita Cucchiara . 2016. Hierarchical Boundary-Aware Neural Encoder for Video Captioning. arXiv preprint arXiv:1611.09312 ( 2016 ). Lorenzo Baraldi, Costantino Grana, and Rita Cucchiara. 2016. Hierarchical Boundary-Aware Neural Encoder for Video Captioning. arXiv preprint arXiv:1611.09312 (2016)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930786"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"e_1_3_2_1_7_1","volume-title":"Picture it in your mind: Generating high level visual representations from textual descriptions. arXiv preprint arXiv:1606.07287","author":"Carrara Fabio","year":"2016","unstructured":"Fabio Carrara , Andrea Esuli , Tiziano Fagni , Fabrizio Falchi , and Alejandro Moreo Fern\u00e1ndez . 2016. Picture it in your mind: Generating high level visual representations from textual descriptions. arXiv preprint arXiv:1606.07287 ( 2016 ). Fabio Carrara, Andrea Esuli, Tiziano Fagni, Fabrizio Falchi, and Alejandro Moreo Fern\u00e1ndez. 2016. Picture it in your mind: Generating high level visual representations from textual descriptions. arXiv preprint arXiv:1606.07287 (2016)."},{"key":"e_1_3_2_1_8_1","volume-title":"A practical guide to cnns and fisher vectors for image instance retrieval. arXiv preprint arXiv:1508.02496","author":"Chandrasekhar Vijay","year":"2015","unstructured":"Vijay Chandrasekhar , Jie Lin , Olivier Mor\u00e8re , Hanlin Goh , and Antoine Veillard . 2015. A practical guide to cnns and fisher vectors for image instance retrieval. arXiv preprint arXiv:1508.02496 ( 2015 ). Vijay Chandrasekhar, Jie Lin, Olivier Mor\u00e8re, Hanlin Goh, and Antoine Veillard. 2015. A practical guide to cnns and fisher vectors for image instance retrieval. arXiv preprint arXiv:1508.02496 (2015)."},{"key":"e_1_3_2_1_9_1","first-page":"647","article-title":"DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition","volume":"32","author":"Donahue Jeff","year":"2014","unstructured":"Jeff Donahue , Yangqing Jia , Oriol Vinyals , Judy Hoffman , Ning Zhang , Eric Tzeng , and Trevor Darrell . 2014 . DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition .. In Icml , Vol. 32. 647 -- 655 . Jeff Donahue, Yangqing Jia, Oriol Vinyals, Judy Hoffman, Ning Zhang, Eric Tzeng, and Trevor Darrell. 2014. DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition.. In Icml, Vol. 32. 647--655.","journal-title":"Icml"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2439281"},{"key":"e_1_3_2_1_11_1","volume-title":"Word2VisualVec: Cross-media retrieval by visual feature prediction. arXiv preprint arXiv:1604.06838","author":"Dong Jianfeng","year":"2016","unstructured":"Jianfeng Dong , Xirong Li , and Cees GM Snoek . 2016. Word2VisualVec: Cross-media retrieval by visual feature prediction. arXiv preprint arXiv:1604.06838 ( 2016 ). Jianfeng Dong, Xirong Li, and Cees GM Snoek. 2016. Word2VisualVec: Cross-media retrieval by visual feature prediction. arXiv preprint arXiv:1604.06838 (2016)."},{"key":"e_1_3_2_1_12_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy . 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 ( 2014 ). Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46466-4_15"},{"key":"e_1_3_2_1_14_1","volume-title":"Towards deep neural network architectures robust to adversarial examples. arXiv preprint arXiv:1412.5068","author":"Gu Shixiang","year":"2014","unstructured":"Shixiang Gu and Luca Rigazio . 2014. Towards deep neural network architectures robust to adversarial examples. arXiv preprint arXiv:1412.5068 ( 2014 ). Shixiang Gu and Luca Rigazio. 2014. Towards deep neural network architectures robust to adversarial examples. arXiv preprint arXiv:1412.5068 (2014)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_16_1","volume-title":"Caffe: Convolutional Architecture for Fast Feature Embedding. arXiv preprint arXiv:1408.5093","author":"Jia Yangqing","year":"2014","unstructured":"Yangqing Jia , Evan Shelhamer , Jeff Donahue , Sergey Karayev , Jonathan Long , Ross Girshick , Sergio Guadarrama , and Trevor Darrell . 2014 . Caffe: Convolutional Architecture for Fast Feature Embedding. arXiv preprint arXiv:1408.5093 (2014). Yangqing Jia, Evan Shelhamer, Jeff Donahue, Sergey Karayev, Jonathan Long, Ross Girshick, Sergio Guadarrama, and Trevor Darrell. 2014. Caffe: Convolutional Architecture for Fast Feature Embedding. arXiv preprint arXiv:1408.5093 (2014)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994577"},{"key":"e_1_3_2_1_18_1","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105.  Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105."},{"key":"e_1_3_2_1_19_1","volume-title":"Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533","author":"Kurakin Alexey","year":"2016","unstructured":"Alexey Kurakin , Ian Goodfellow , and Samy Bengio . 2016. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 ( 2016 ). Alexey Kurakin, Ian Goodfellow, and Samy Bengio. 2016. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 (2016)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906152"},{"key":"e_1_3_2_1_22_1","volume-title":"On Detecting Adversarial Perturbations. arXiv preprint arXiv:1702.04267","author":"Metzen Jan Hendrik","year":"2017","unstructured":"Jan Hendrik Metzen , Tim Genewein , Volker Fischer , and Bastian Bischoff . 2017. On Detecting Adversarial Perturbations. arXiv preprint arXiv:1702.04267 ( 2017 ). Jan Hendrik Metzen, Tim Genewein, Volker Fischer, and Bastian Bischoff. 2017. On Detecting Adversarial Perturbations. arXiv preprint arXiv:1702.04267 (2017)."},{"key":"e_1_3_2_1_23_1","volume-title":"Universal adversarial perturbations. arXiv preprint arXiv:1610.08401","author":"Moosavi-Dezfooli Seyed-Mohsen","year":"2016","unstructured":"Seyed-Mohsen Moosavi-Dezfooli , Alhussein Fawzi , Omar Fawzi , and Pascal Frossard . 2016. Universal adversarial perturbations. arXiv preprint arXiv:1610.08401 ( 2016 ). Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, Omar Fawzi, and Pascal Frossard. 2016. Universal adversarial perturbations. arXiv preprint arXiv:1610.08401 (2016)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"e_1_3_2_1_25_1","volume-title":"Practical black-box attacks against deep learning systems using adversarial examples. arXiv preprint arXiv:1602.02697","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick McDaniel , Ian Goodfellow , Somesh Jha , Z Berkay Celik , and Ananthram Swami . 2016. Practical black-box attacks against deep learning systems using adversarial examples. arXiv preprint arXiv:1602.02697 ( 2016 ). Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z Berkay Celik, and Ananthram Swami. 2016. Practical black-box attacks against deep learning systems using adversarial examples. arXiv preprint arXiv:1602.02697 (2016)."},{"key":"e_1_3_2_1_26_1","volume-title":"2016 IEEE European Symposium on. IEEE, 372--387","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick McDaniel , Somesh Jha , Matt Fredrikson , Z Berkay Celik , and Ananthram Swami . 2016 . The limitations of deep learning in adversarial settings. In Security and Privacy (EuroS&P) , 2016 IEEE European Symposium on. IEEE, 372--387 . Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z Berkay Celik, and Ananthram Swami. 2016. The limitations of deep learning in adversarial settings. In Security and Privacy (EuroS&P), 2016 IEEE European Symposium on. IEEE, 372--387."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2014.131"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_3_2_1_31_1","volume-title":"Overfeat: Integrated recognition, localization and detection using convolutional networks. arXiv preprint arXiv:1312.6229","author":"Sermanet Pierre","year":"2013","unstructured":"Pierre Sermanet , David Eigen , Xiang Zhang , Micha\u00ebl Mathieu , Rob Fergus , and Yann LeCun . 2013 . Overfeat: Integrated recognition, localization and detection using convolutional networks. arXiv preprint arXiv:1312.6229 (2013). Pierre Sermanet, David Eigen, Xiang Zhang, Micha\u00ebl Mathieu, Rob Fergus, and Yann LeCun. 2013. Overfeat: Integrated recognition, localization and detection using convolutional networks. arXiv preprint arXiv:1312.6229 (2013)."},{"key":"e_1_3_2_1_32_1","volume-title":"CNN Features Off-the-Shelf: An Astounding Baseline for Recognition. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops.","author":"Razavian Ali Sharif","year":"2014","unstructured":"Ali Sharif Razavian , Hossein Azizpour , Josephine Sullivan , and Stefan Carlsson . 2014 . CNN Features Off-the-Shelf: An Astounding Baseline for Recognition. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops. Ali Sharif Razavian, Hossein Azizpour, Josephine Sullivan, and Stefan Carlsson. 2014. CNN Features Off-the-Shelf: An Astounding Baseline for Recognition. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2014.131"},{"key":"e_1_3_2_1_34_1","unstructured":"K. Simonyan and A. Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. CoRR abs\/1409.1556 (2014).  K. Simonyan and A. Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. CoRR abs\/1409.1556 (2014)."},{"key":"e_1_3_2_1_35_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman . 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 ( 2014 ). Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"e_1_3_2_1_37_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 ( 2013 ). Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727230"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823908"},{"key":"e_1_3_2_1_40_1","volume-title":"Image Region Forgery Detection: A Deep Learning Approach. In Singapore Cyber-Security Conference (SG-CRC). 1--11","author":"Ying Z.","unstructured":"Z. Ying , J. Goha , L. Wina , and V. Thinga . 2016 . Image Region Forgery Detection: A Deep Learning Approach. In Singapore Cyber-Security Conference (SG-CRC). 1--11 . Z. Ying, J. Goha, L. Wina, and V. Thinga. 2016. Image Region Forgery Detection: A Deep Learning Approach. In Singapore Cyber-Security Conference (SG-CRC). 1--11."}],"event":{"name":"CBMI '17: International Workshop on Content-Based Multimedia Indexing","location":"Florence Italy","acronym":"CBMI '17"},"container-title":["Proceedings of the 15th International Workshop on Content-Based Multimedia Indexing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3095713.3095753","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3095713.3095753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:53Z","timestamp":1750217813000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3095713.3095753"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,19]]},"references-count":40,"alternative-id":["10.1145\/3095713.3095753","10.1145\/3095713"],"URL":"https:\/\/doi.org\/10.1145\/3095713.3095753","relation":{},"subject":[],"published":{"date-parts":[[2017,6,19]]},"assertion":[{"value":"2017-06-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}