{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:39Z","timestamp":1750221159566,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2016R1A4A1011761"],"award-info":[{"award-number":["2016R1A4A1011761"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100011512","name":"National Research Foundation","doi-asserted-by":"publisher","award":["2017R1A2B4006026"],"award-info":[{"award-number":["2017R1A2B4006026"]}],"id":[{"id":"10.13039\/100011512","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Institute for Information & communications Technology Promotion","award":["No. 2016-0-00173"],"award-info":[{"award-number":["No. 2016-0-00173"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3201583","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"805-807","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["POSTER"],"prefix":"10.1145","author":[{"given":"Hyun","family":"Kwon","sequence":"first","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, Rebublic of Korea"}]},{"given":"Hyunsoo","family":"Yoon","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, Rebublic of Korea"}]},{"given":"Daeseon","family":"Choi","sequence":"additional","affiliation":[{"name":"Kongju National University, Gongju-si, Rebublic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"ICLR","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . Intriguing properties of neural networks . ICLR , 2014 . Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. Intriguing properties of neural networks. ICLR, 2014."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_3_1","first-page":"372","volume-title":"2016 IEEE European Symposium on","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick McDaniel , Somesh Jha , Matt Fredrikson , Z Berkay Celik , and Ananthram Swami . The limitations of deep learning in adversarial settings. In Security and Privacy (EuroS&P) , 2016 IEEE European Symposium on , pages 372 -- 387 . IEEE, 2016 . Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z Berkay Celik, and Ananthram Swami. The limitations of deep learning in adversarial settings. In Security and Privacy (EuroS&P), 2016 IEEE European Symposium on, pages 372--387. IEEE, 2016."},{"key":"e_1_3_2_1_4_1","volume-title":"ICLR","author":"Goodfellow Ian J","year":"2015","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy . Explaining and harnessing adversarial examples . ICLR , 2015 . Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. Explaining and harnessing adversarial examples. ICLR, 2015."},{"key":"e_1_3_2_1_5_1","volume-title":"Ae-gan: adversarial eliminating with gan. arXiv preprint arXiv:1707.05474","author":"Shen Shiwei","year":"2017","unstructured":"Shiwei Shen , Guoqing Jin , Ke Gao , and Yongdong Zhang . Ae-gan: adversarial eliminating with gan. arXiv preprint arXiv:1707.05474 , 2017 . Shiwei Shen, Guoqing Jin, Ke Gao, and Yongdong Zhang. Ae-gan: adversarial eliminating with gan. arXiv preprint arXiv:1707.05474, 2017."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Incheon Republic of Korea","acronym":"ASIA CCS '18"},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3201583","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3201583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3201583"}},"subtitle":["Zero-Day Evasion Attack Analysis on Race between Attack and Defense"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":6,"alternative-id":["10.1145\/3196494.3201583","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3201583","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}