{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T02:20:37Z","timestamp":1777602037810,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134635","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"262-277","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":72,"title":["Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning"],"prefix":"10.1145","author":[{"given":"Uyeong","family":"Jang","sequence":"first","affiliation":[{"name":"University of Wisconsin, Madison, Wisconsin"}]},{"given":"Xi","family":"Wu","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Somesh","family":"Jha","sequence":"additional","affiliation":[{"name":"University of Wisconsin, Madison, Wisconsin"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Conference on Computer Vision and Pattern Recognition (CVPR).","unstructured":"DeepFace : Closing the Gap to Human-Level Performance in Face Verification . In Conference on Computer Vision and Pattern Recognition (CVPR). DeepFace: Closing the Gap to Human-Level Performance in Face Verification. In Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_2_1","volume-title":"Predicting the sequence specificities of DNA-and RNA-binding proteins by deep learning. Nature biotechnology","author":"Alipanahi Babak","year":"2015","unstructured":"Babak Alipanahi , Andrew Delong , Matthew T Weirauch , and Brendan J Frey . 2015. Predicting the sequence specificities of DNA-and RNA-binding proteins by deep learning. Nature biotechnology ( 2015 ). Babak Alipanahi, Andrew Delong, Matthew T Weirauch, and Brendan J Frey. 2015. Predicting the sequence specificities of DNA-and RNA-binding proteins by deep learning. Nature biotechnology (2015)."},{"key":"e_1_3_2_1_3_1","unstructured":"M. Bojarski D. Del Testa D. Dworakowski B. Firner B. Flepp P. Goyal L. Jackel M. Monfort U. Muller J. Zhang X. Zhang J. Zhao and K. Zieba. 2016. End to End Learning for Self-Driving Cars. Technical Report.  M. Bojarski D. Del Testa D. Dworakowski B. Firner B. Flepp P. Goyal L. Jackel M. Monfort U. Muller J. Zhang X. Zhang J. Zhao and K. Zieba. 2016. End to End Learning for Self-Driving Cars. Technical Report."},{"key":"e_1_3_2_1_4_1","volume-title":"Davide Del Testa","author":"Bojarski Mariusz","year":"2016","unstructured":"Mariusz Bojarski , Davide Del Testa , Daniel Dworakowski, Bernhard Firner , Beat Flepp, Prasoon Goyal, Lawrence D. Jackel, Mathew Monfort, Urs Muller, Jiakai Zhang, Xin Zhang, Jake Zhao, and Karol Zieba. 2016 . End to End Learning for Self-Driving Cars. CoRR abs\/1604.07316 (2016). http:\/\/arxiv.org\/abs\/1604.07316. Mariusz Bojarski, Davide Del Testa, Daniel Dworakowski, Bernhard Firner, Beat Flepp, Prasoon Goyal, Lawrence D. Jackel, Mathew Monfort, Urs Muller, Jiakai Zhang, Xin Zhang, Jake Zhao, and Karol Zieba. 2016. End to End Learning for Self-Driving Cars. CoRR abs\/1604.07316 (2016). http:\/\/arxiv.org\/abs\/1604.07316."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"e_1_3_2_1_6_1","volume-title":"Towards Evaluating the Robustness of Neural Networks. In IEEE Symposium on Security and Privacy.","author":"Carlini Nicholas","year":"2017","unstructured":"Nicholas Carlini and David Wagner . 2017 . Towards Evaluating the Robustness of Neural Networks. In IEEE Symposium on Security and Privacy. Nicholas Carlini and David Wagner. 2017. Towards Evaluating the Robustness of Neural Networks. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2012.07.011"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"e_1_3_2_1_10_1","unstructured":"Nathan Eddy. 2016. AI Machine Learning Drive Autonomous Vehicle Development. http:\/\/www.informationweek.com\/big-data\/big-data-analytics\/ai-machine-learning-drive-autonomous-vehicle-development\/d\/d-id\/1325906. (2016).  Nathan Eddy. 2016. AI Machine Learning Drive Autonomous Vehicle Development. http:\/\/www.informationweek.com\/big-data\/big-data-analytics\/ai-machine-learning-drive-autonomous-vehicle-development\/d\/d-id\/1325906. (2016)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Leslie Hogben (Editor). 2013. Handbook of Linear Algebra. Chapman and Hall\/CRC.  Leslie Hogben (Editor). 2013. Handbook of Linear Algebra. Chapman and Hall\/CRC.","DOI":"10.1201\/b16113"},{"key":"e_1_3_2_1_12_1","volume-title":"Explaining and Harnessing Adversarial Examples. CoRR","author":"Goodfellow Ian J.","year":"2014","unstructured":"Ian J. Goodfellow , Jonathon Shlens , and Christian Szegedy . 2014. Explaining and Harnessing Adversarial Examples. CoRR ( 2014 ). Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and Harnessing Adversarial Examples. CoRR (2014)."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 2015 International Conference on Learning Representations. Computational and Biological Learning Society.","author":"Goodfellow Ian J","year":"2015","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy . 2015 . Explaining and Harnessing Adversarial Examples . In Proceedings of the 2015 International Conference on Learning Representations. Computational and Biological Learning Society. Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In Proceedings of the 2015 International Conference on Learning Representations. Computational and Biological Learning Society."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"X. Huang M. Kwiatkowska S. Wang and M. Wu. 2017. Safety Verification of Deep Neural Networks.  X. Huang M. Kwiatkowska S. Wang and M. Wu. 2017. Safety Verification of Deep Neural Networks.","DOI":"10.1007\/978-3-319-63387-9_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMoa0809329"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. 35th Digital Avionics Systems Conf. (DASC).","author":"Julian K.","unstructured":"K. Julian , J. Lopez , J. Brush , M. Owen , and M. Kochenderfer . 2016. Policy Compression for Aircraft Collision Avoidance Systems . In Proc. 35th Digital Avionics Systems Conf. (DASC). K. Julian, J. Lopez, J. Brush, M. Owen, and M. Kochenderfer. 2016. Policy Compression for Aircraft Collision Avoidance Systems. In Proc. 35th Digital Avionics Systems Conf. (DASC)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Guy Katz Clark Barrett David Dill Kyle Julian and Mykel Kochenderfer. 2017. An Efficient SMT Solver for Verifying Deep Neural Networks.  Guy Katz Clark Barrett David Dill Kyle Julian and Mykel Kochenderfer. 2017. An Efficient SMT Solver for Verifying Deep Neural Networks.","DOI":"10.1007\/978-3-319-63387-9_5"},{"key":"e_1_3_2_1_20_1","unstructured":"Eric Knorr. 2015. How PayPal beats the bad guys with machine learning. http:\/\/www.infoworld.com\/article\/2907877\/machine-learning\/how-paypal-reduces-fraud-with-machine-learning.html. (2015).  Eric Knorr. 2015. How PayPal beats the bad guys with machine learning. http:\/\/www.infoworld.com\/article\/2907877\/machine-learning\/how-paypal-reduces-fraud-with-machine-learning.html. (2015)."},{"key":"e_1_3_2_1_21_1","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105.   Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105."},{"key":"e_1_3_2_1_22_1","unstructured":"A. Kurakin I. J. Goodfellow and S. Bengio. 2016. Adversarial Examples in the Physical world. (2016).  A. Kurakin I. J. Goodfellow and S. Bengio. 2016. Adversarial Examples in the Physical world. (2016)."},{"key":"e_1_3_2_1_23_1","volume-title":"DeepFool: a simple and accurate method to fool deep neural networks. CoRR","author":"Moosavi-Dezfooli Seyed-Mohsen","year":"2015","unstructured":"Seyed-Mohsen Moosavi-Dezfooli , Alhussein Fawzi , and Pascal Frossard . 2015. DeepFool: a simple and accurate method to fool deep neural networks. CoRR ( 2015 ). Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, and Pascal Frossard. 2015. DeepFool: a simple and accurate method to fool deep neural networks. CoRR (2015)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"e_1_3_2_1_25_1","volume-title":"Numerical Optimization","author":"Nocedal Jorge","unstructured":"Jorge Nocedal and Stephen Wright . 2006. Numerical Optimization . Springer . Jorge Nocedal and Stephen Wright. 2006. Numerical Optimization. Springer."},{"key":"e_1_3_2_1_26_1","unstructured":"NVIDIA. 2015. NVIDIA Tegra Drive PX: Self-Driving Car Computer. (2015). http:\/\/www.nvidia.com\/object\/drive-px.html  NVIDIA. 2015. NVIDIA Tegra Drive PX: Self-Driving Car Computer. (2015). http:\/\/www.nvidia.com\/object\/drive-px.html"},{"key":"e_1_3_2_1_27_1","volume-title":"cleverhans v1.0.0: an adversarial machine learning library. arXiv preprint arXiv:1610.00768","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Ian Goodfellow , Ryan Sheatsley , Reuben Feinman , and Patrick McDaniel . 2016. cleverhans v1.0.0: an adversarial machine learning library. arXiv preprint arXiv:1610.00768 ( 2016 ). Nicolas Papernot, Ian Goodfellow, Ryan Sheatsley, Reuben Feinman, and Patrick McDaniel. 2016. cleverhans v1.0.0: an adversarial machine learning library. arXiv preprint arXiv:1610.00768 (2016)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_2_1_30_1","first-page":"307","volume-title":"Numerical mathematics","author":"Quarteroni Alfio","unstructured":"Alfio Quarteroni , Riccardo Sacco , and Fausto Saleri . 2000. Numerical mathematics . p. 307 . Alfio Quarteroni, Riccardo Sacco, and Fausto Saleri. 2000. Numerical mathematics. p.307."},{"key":"e_1_3_2_1_31_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Richard Shin Eui Chul","year":"2015","unstructured":"Eui Chul Richard Shin , Dawn Song , and Reza Moazzezi . 2015 . Recognizing functions in binaries with neural networks . In 24th USENIX Security Symposium (USENIX Security 15) . 611--626. Eui Chul Richard Shin, Dawn Song, and Reza Moazzezi. 2015. Recognizing functions in binaries with neural networks. In 24th USENIX Security Symposium (USENIX Security 15). 611--626."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2012.02.016"},{"key":"e_1_3_2_1_33_1","volume-title":"Intriguing properties of neural networks. CoRR abs\/1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian J. Goodfellow , and Rob Fergus . 2013. Intriguing properties of neural networks. CoRR abs\/1312.6199 ( 2013 ). Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian J. Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. CoRR abs\/1312.6199 (2013)."}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","location":"Orlando FL USA","acronym":"ACSAC 2017"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134635","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134635"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":33,"alternative-id":["10.1145\/3134600.3134635","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134635","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}