{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:16Z","timestamp":1750221076917,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T00:00:00Z","timestamp":1541376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"AFRL","award":["FA8750-18-2-0057"],"award-info":[{"award-number":["FA8750-18-2-0057"]}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1717657"],"award-info":[{"award-number":["1717657"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,5]]},"DOI":"10.1145\/3240765.3240851","type":"proceedings-article","created":{"date-parts":[[2018,11,6]],"date-time":"2018-11-06T13:36:57Z","timestamp":1541511417000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["SPN dash"],"prefix":"10.1145","author":[{"given":"Kent W.","family":"Nixon","sequence":"first","affiliation":[{"name":"Duke University"}]},{"given":"Jiachen","family":"Mao","sequence":"additional","affiliation":[{"name":"Duke University"}]},{"given":"Juncheng","family":"Shen","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"given":"Huanrui","family":"Yang","sequence":"additional","affiliation":[{"name":"Duke University"}]},{"given":"Hai (Helen)","family":"Li","sequence":"additional","affiliation":[{"name":"Duke University"}]},{"given":"Yiran","family":"Chen","sequence":"additional","affiliation":[{"name":"Duke University"}]}],"member":"320","published-online":{"date-parts":[[2018,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Bixby Vision | Apps - The Official Samsung Galaxy Site. samsung.com\/global\/galaxy\/apps\/bixby\/vision\/"},{"key":"e_1_3_2_1_2_1","unstructured":"H. Bojinov et al. 2014. Mobile Device Identification via Sensor Fingerprinting. CoRR abs\/1408.1416 (2014). arxiv.org\/abs\/1408.1416"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916285"},{"key":"e_1_3_2_1_4_1","volume-title":"Google Lens: Everything to know about the Pixel 2's AR feature. cnet.com\/how-to\/google-lens-everything-to-know-about-the-pixel-2-ar-feature\/","author":"Cipriani J.","year":"2017","unstructured":"J. Cipriani. 2017. Google Lens: Everything to know about the Pixel 2's AR feature. cnet.com\/how-to\/google-lens-everything-to-know-about-the-pixel-2-ar-feature\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"J. Rosales Corripio et al. 2013. Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform. 1.16--1.16 pages. digital-library.theiet. org\/content\/conferences\/10.1049\/ic.2013.0267","DOI":"10.1049\/ic.2013.0267"},{"volume-title":"Photonics West '98 Elec Img","author":"El Gamal A.","key":"e_1_3_2_1_6_1","unstructured":"A. El Gamal et al. {n. d.}. Modeling and Estimation of FPN Components in CMOS Image Sensors. In Photonics West '98 Elec Img, Vol. 3301. SPIE, 10."},{"key":"e_1_3_2_1_7_1","unstructured":"I. Evtimov et al. 2017. Robust Physical-World Attacks on Machine Learning Models. CoRR abs\/1707.08945 (2017). arxiv.org\/abs\/1707.08945"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1364\/AO.45.002422"},{"key":"e_1_3_2_1_9_1","volume-title":"Media Forensics and Security","volume":"7254","author":"Goljan M.","unstructured":"M. Goljan, J. Fridrich, and T. Filler. 2009. Large scale test of sensor fingerprint camera identification. In Media Forensics and Security, Vol. 7254. International Society for Optics and Photonics, 72540I."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","unstructured":"I. Goodfellow et al. 2014. Generative Adversarial Nets. 2672--2680 pages. papers. nips.cc\/paper\/5423-generative-adversarial-nets","DOI":"10.5555\/2969033.2969125"},{"key":"e_1_3_2_1_11_1","unstructured":"I. Goodfellow J. Shlens and C. Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_12_1","unstructured":"J. Hendrik Metzen et al. 2017. On Detecting Adversarial Perturbations. adsabs.harvard.edu\/abs\/2017arXiv170204267H"},{"key":"e_1_3_2_1_13_1","volume-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861","author":"Howard A.","year":"2017","unstructured":"A. Howard et al. 2017. Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861 (2017)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3390\/s130912605"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1088\/0957-0233\/19\/4\/045207"},{"key":"e_1_3_2_1_16_1","volume-title":"Caffe: Convolutional Architecture for Fast Feature Embedding. arXiv preprint arXiv:1408.5093","author":"Jia Y.","year":"2014","unstructured":"Y. Jia et al. 2014. Caffe: Convolutional Architecture for Fast Feature Embedding. arXiv preprint arXiv:1408.5093 (2014)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","unstructured":"A. Krizhevsky I. Sutskever and G. E. Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In Advances in Neural Information Processing Systems 25 F. Pereira C. J. C. Burges L. Bottou and K. Q. Weinberger (Eds.). Curran Associates Inc. 1097--1105. papers.nips.cc\/paper\/4824-imagenet-classification-with-deep-convolutional-neural-networks.pdf","DOI":"10.5555\/2999134.2999257"},{"key":"e_1_3_2_1_18_1","unstructured":"A. Kurakin I. Goodfellow and S. Bengio. 2016. Adversarial Examples in the Physical World. Computing Research Repository abs\/1607.02533 (2016). arxiv.org\/abs\/1607.02533"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2046268"},{"key":"e_1_3_2_1_20_1","unstructured":"X. Li and F. Li. 2016. Adversarial Examples Detection in Deep Networks with Convolutional Filter Statistics. Computing Research Repository abs\/1612.07767 (2016). arxiv.org\/abs\/1612.07767"},{"key":"e_1_3_2_1_21_1","unstructured":"Y. Liu et al. 2016. Delving into transferable adversarial examples and black-box attacks. arXiv preprint arXiv:1611.02770 (2016)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873602"},{"key":"e_1_3_2_1_23_1","unstructured":"Y. Luo et al. 2015. Foveation-Based Mechanisms Alleviate Adversarial Examples. Computing Research Repository abs\/1511.06292 (2015). arxiv.org\/abs\/1511.06292"},{"key":"e_1_3_2_1_24_1","unstructured":"J. Metzen T. Genewein V. Fischer and B. Bischof. 2017. On detecting adversarial perturbations. arXiv preprint arXiv:1702.04267 (2017)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","unstructured":"N. Papernot et al. 2017. Practical Black-Box Attacks against Machine Learning. 506--519 pages. 10.1145\/3052973.3053009","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_2_1_26_1","first-page":"941","article-title":"Analysis of Active Pixel Sensor Readout Circuit","volume":"50","author":"Salama K.","year":"2003","unstructured":"K. Salama and A. El Gamal. 2003. Analysis of Active Pixel Sensor Readout Circuit. IEEE Trans on Circ and Sys I-Fundamental Theory and Applications 50, 7 (2003), 941--944.","journal-title":"IEEE Trans on Circ and Sys I-Fundamental Theory and Applications"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"e_1_3_2_1_28_1","unstructured":"C. Song et al. 2017. A Multi-strength Adversarial Training Method to Mitigate Adversarial Attacks. Computing Research Repository abs\/1705.09764 (2017). arxiv.org\/abs\/1705.09764"}],"event":{"name":"ICCAD '18: IEEE\/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN","sponsor":["IEEE-EDS Electronic Devices Society","IEEE CAS","IEEE CEDA"],"location":"San Diego California","acronym":"ICCAD '18"},"container-title":["Proceedings of the International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240765.3240851","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3240765.3240851","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3240765.3240851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:33Z","timestamp":1750208253000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240765.3240851"}},"subtitle":["fast detection of adversarial attacks on mobile via sensor pattern noise fingerprinting"],"short-title":[],"issued":{"date-parts":[[2018,11,5]]},"references-count":28,"alternative-id":["10.1145\/3240765.3240851","10.1145\/3240765"],"URL":"https:\/\/doi.org\/10.1145\/3240765.3240851","relation":{},"subject":[],"published":{"date-parts":[[2018,11,5]]},"assertion":[{"value":"2018-11-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}