{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T19:07:52Z","timestamp":1761419272995,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T00:00:00Z","timestamp":1548028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,21]]},"DOI":"10.1145\/3287624.3288750","type":"proceedings-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T21:45:18Z","timestamp":1547847918000},"page":"499-505","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["ADMM attack"],"prefix":"10.1145","author":[{"given":"Pu","family":"Zhao","sequence":"first","affiliation":[{"name":"Northeastern University"}]},{"given":"Kaidi","family":"Xu","sequence":"additional","affiliation":[{"name":"Northeastern University"}]},{"given":"Sijia","family":"Liu","sequence":"additional","affiliation":[{"name":"IBM Research AI"}]},{"given":"Yanzhi","family":"Wang","sequence":"additional","affiliation":[{"name":"Northeastern University"}]},{"given":"Xue","family":"Lin","sequence":"additional","affiliation":[{"name":"Northeastern University"}]}],"member":"320","published-online":{"date-parts":[[2019,1,21]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"248","volume-title":"CVPR 2009. IEEE Conference on","author":"Deng J.","year":"2009","unstructured":"J. Deng , W. Dong , R. Socher , L.-J. Li , K. Li , and L. FeiFei , \" Imagenet: A large-scale hierarchical image database,\" in Computer Vision and Pattern Recognition, 2009 . CVPR 2009. IEEE Conference on , pp. 248 -- 255 , IEEE, 2009 . J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. FeiFei, \"Imagenet: A large-scale hierarchical image database,\" in Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on, pp. 248--255, IEEE, 2009."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/CVPR.2014.220"},{"key":"e_1_3_2_1_3_1","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He K.","year":"2016","unstructured":"K. He , X. Zhang , S. Ren , and J. Sun , \" Deep residual learning for image recognition ,\" in Proceedings of the IEEE conference on computer vision and pattern recognition , pp. 770 -- 778 , 2016 . K. He, X. Zhang, S. Ren, and J. Sun, \"Deep residual learning for image recognition,\" in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770--778, 2016.","journal-title":"Proceedings of the IEEE conference on computer vision and pattern recognition"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/MSP.2012.2205597"},{"volume-title":"J. Schrittwieser, I. Antonoglou, V. Panneershelvam, M. Lanctot, et al., \"Mastering the game of go with deep neural networks and tree search,\" nature","author":"Silver D.","unstructured":"D. Silver , A. Huang , C. J. Maddison , A. Guez , L. Sifre , G. Van Den Driessche , J. Schrittwieser, I. Antonoglou, V. Panneershelvam, M. Lanctot, et al., \"Mastering the game of go with deep neural networks and tree search,\" nature , vol. 529 , no. 7587, pp. 484--489, 2016. D. Silver, A. Huang, C. J. Maddison, A. Guez, L. Sifre, G. Van Den Driessche, J. Schrittwieser, I. Antonoglou, V. Panneershelvam, M. Lanctot, et al., \"Mastering the game of go with deep neural networks and tree search,\" nature, vol. 529, no. 7587, pp. 484--489, 2016.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","volume-title":"Explaining and harnessing adversarial examples,\" 2015 ICLR","author":"Goodfellow I.","year":"2015","unstructured":"I. Goodfellow , J. Shlens , and C. Szegedy , \" Explaining and harnessing adversarial examples,\" 2015 ICLR , vol. arXiv preprint arXiv: 1412 .6572, 2015 . I. Goodfellow, J. Shlens, and C. Szegedy, \"Explaining and harnessing adversarial examples,\" 2015 ICLR, vol. arXiv preprint arXiv:1412.6572, 2015."},{"key":"e_1_3_2_1_7_1","volume-title":"Intriguing properties of neural networks,\" arXiv preprint arXiv:1312.6199","author":"Szegedy C.","year":"2013","unstructured":"C. Szegedy , W. Zaremba , I. Sutskever , J. Bruna , D. Erhan , I. Goodfellow , and R. Fergus , \" Intriguing properties of neural networks,\" arXiv preprint arXiv:1312.6199 , 2013 . C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus, \"Intriguing properties of neural networks,\" arXiv preprint arXiv:1312.6199, 2013."},{"key":"e_1_3_2_1_8_1","volume-title":"Adversarial examples in the physical world,\" arXiv preprint arXiv:1607.02533","author":"Kurakin A.","year":"2016","unstructured":"A. Kurakin , I. Goodfellow , and S. Bengio , \" Adversarial examples in the physical world,\" arXiv preprint arXiv:1607.02533 , 2016 . A. Kurakin, I. Goodfellow, and S. Bengio, \"Adversarial examples in the physical world,\" arXiv preprint arXiv:1607.02533, 2016."},{"unstructured":"C. Guo M. Rana M. Ciss\u00e9 and L. van der Maaten \"Countering adversarial images using input transformations \" arXiv preprint arXiv:1711.00117 2017.  C. Guo M. Rana M. Ciss\u00e9 and L. van der Maaten \"Countering adversarial images using input transformations \" arXiv preprint arXiv:1711.00117 2017.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","volume-title":"A study of the effect of jpg compression on adversarial images,\" arXiv preprint arXiv:1608.00853","author":"Dziugaite G. K.","year":"2016","unstructured":"G. K. Dziugaite , Z. Ghahramani , and D. M. Roy , \" A study of the effect of jpg compression on adversarial images,\" arXiv preprint arXiv:1608.00853 , 2016 . G. K. Dziugaite, Z. Ghahramani, and D. M. Roy, \"A study of the effect of jpg compression on adversarial images,\" arXiv preprint arXiv:1608.00853, 2016."},{"key":"e_1_3_2_1_11_1","volume-title":"Mitigating adversarial effects through randomization,\" arXiv preprint arXiv:1711.01991","author":"Xie C.","year":"2017","unstructured":"C. Xie , J. Wang , Z. Zhang , Z. Ren , and A. Yuille , \" Mitigating adversarial effects through randomization,\" arXiv preprint arXiv:1711.01991 , 2017 . C. Xie, J. Wang, Z. Zhang, Z. Ren, and A. Yuille, \"Mitigating adversarial effects through randomization,\" arXiv preprint arXiv:1711.01991, 2017."},{"key":"e_1_3_2_1_12_1","first-page":"582","volume-title":"2016 IEEE Symposium on","author":"Papernot N.","year":"2016","unstructured":"N. Papernot , P. McDaniel , X. Wu , S. Jha , and A. Swami , \" Distillation as a defense to adversarial perturbations against deep neural networks,\" in Security and Privacy (SP) , 2016 IEEE Symposium on , pp. 582 -- 597 , IEEE, 2016 . N. Papernot, P. McDaniel, X. Wu, S. Jha, and A. Swami, \"Distillation as a defense to adversarial perturbations against deep neural networks,\" in Security and Privacy (SP), 2016 IEEE Symposium on, pp. 582--597, IEEE, 2016."},{"key":"e_1_3_2_1_13_1","volume-title":"Stochastic activation pruning for robust adversarial defense,\" arXiv preprint arXiv:1803.01442","author":"Dhillon G. S.","year":"2018","unstructured":"G. S. Dhillon , K. Azizzadenesheli , Z. C. Lipton , J. Bernstein , J. Kossaifi , A. Khanna , and A. Anandkumar , \" Stochastic activation pruning for robust adversarial defense,\" arXiv preprint arXiv:1803.01442 , 2018 . G. S. Dhillon, K. Azizzadenesheli, Z. C. Lipton, J. Bernstein, J. Kossaifi, A. Khanna, and A. Anandkumar, \"Stochastic activation pruning for robust adversarial defense,\" arXiv preprint arXiv:1803.01442, 2018."},{"key":"e_1_3_2_1_14_1","volume-title":"Sept.","author":"Wang S.","year":"2018","unstructured":"S. Wang , X. Wang , P. Zhao , W. Wen , D. Kaeli , P. Chin , and X. Lin , \" Defensive Dropout for Hardening Deep Neural Networks under Adversarial Attacks,\" ArXiv e-prints , Sept. 2018 . S. Wang, X. Wang, P. Zhao, W. Wen, D. Kaeli, P. Chin, and X. Lin, \"Defensive Dropout for Hardening Deep Neural Networks under Adversarial Attacks,\" ArXiv e-prints, Sept. 2018."},{"key":"e_1_3_2_1_15_1","volume-title":"Detecting adversarial samples from artifacts,\" arXiv preprint arXiv:1703.00410","author":"Feinman R.","year":"2017","unstructured":"R. Feinman , R. R. Curtin , S. Shintre , and A. B. Gardner , \" Detecting adversarial samples from artifacts,\" arXiv preprint arXiv:1703.00410 , 2017 . R. Feinman, R. R. Curtin, S. Shintre, and A. B. Gardner, \"Detecting adversarial samples from artifacts,\" arXiv preprint arXiv:1703.00410, 2017."},{"key":"e_1_3_2_1_16_1","first-page":"39","volume-title":"2017 IEEE Symposium on","author":"Carlini N.","year":"2017","unstructured":"N. Carlini and D. Wagner , \" Towards evaluating the robustness of neural networks,\" in Security and Privacy (SP) , 2017 IEEE Symposium on , pp. 39 -- 57 , IEEE, 2017 . N. Carlini and D. Wagner, \"Towards evaluating the robustness of neural networks,\" in Security and Privacy (SP), 2017 IEEE Symposium on, pp. 39--57, IEEE, 2017."},{"key":"e_1_3_2_1_17_1","first-page":"03193","article-title":"An admm-based universal framework for adversarial attacks on deep neural networks","volume":"1804","author":"Zhao P.","year":"2018","unstructured":"P. Zhao , S. Liu , Y. Wang , and X. Lin , \" An admm-based universal framework for adversarial attacks on deep neural networks ,\" CoRR , vol. abs\/ 1804 . 03193 , 2018 . P. Zhao, S. Liu, Y. Wang, and X. Lin, \"An admm-based universal framework for adversarial attacks on deep neural networks,\" CoRR, vol. abs\/1804.03193, 2018.","journal-title":"CoRR"},{"key":"e_1_3_2_1_18_1","volume-title":"elastic-net attacks to deep neural networks via adversarial examples,\" arXiv preprint arXiv:1709.04114","author":"Chen P.-Y.","year":"2017","unstructured":"P.-Y. Chen , Y. Sharma , H. Zhang , J. Yi , and C.-J. Hsieh , \"Ead : elastic-net attacks to deep neural networks via adversarial examples,\" arXiv preprint arXiv:1709.04114 , 2017 . P.-Y. Chen, Y. Sharma, H. Zhang, J. Yi, and C.-J. Hsieh, \"Ead: elastic-net attacks to deep neural networks via adversarial examples,\" arXiv preprint arXiv:1709.04114, 2017."},{"key":"e_1_3_2_1_19_1","volume-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples,\" arXiv preprint arXiv:1802.00420","author":"Athalye A.","year":"2018","unstructured":"A. Athalye , N. Carlini , and D. Wagner , \" Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples,\" arXiv preprint arXiv:1802.00420 , 2018 . A. Athalye, N. Carlini, and D. Wagner, \"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples,\" arXiv preprint arXiv:1802.00420, 2018."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1561\/2200000016"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1007\/s10107-016-1034-2"},{"key":"e_1_3_2_1_22_1","first-page":"2816","volume-title":"Bregman alternating direction method of multipliers,\" in Advances in Neural Information Processing Systems 27","author":"Wang H.","year":"2014","unstructured":"H. Wang and A. Banerjee , \" Bregman alternating direction method of multipliers,\" in Advances in Neural Information Processing Systems 27 (Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger, eds.), pp. 2816 -- 2824 , Curran Associates, Inc. , 2014 . H. Wang and A. Banerjee, \"Bregman alternating direction method of multipliers,\" in Advances in Neural Information Processing Systems 27 (Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger, eds.), pp. 2816--2824, Curran Associates, Inc., 2014."},{"key":"e_1_3_2_1_23_1","first-page":"372","volume-title":"2016 IEEE European Symposium on","author":"Papernot N.","year":"2016","unstructured":"N. Papernot , P. McDaniel , S. Jha , M. Fredrikson , Z. B. Celik , and A. Swami , \" The limitations of deep learning in adversarial settings,\" in Security and Privacy (EuroS&P) , 2016 IEEE European Symposium on , pp. 372 -- 387 , IEEE, 2016 . N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z. B. Celik, and A. Swami, \"The limitations of deep learning in adversarial settings,\" in Security and Privacy (EuroS&P), 2016 IEEE European Symposium on, pp. 372--387, IEEE, 2016."},{"key":"e_1_3_2_1_24_1","volume-title":"Explaining and harnessing adversarial examples,\" arXiv preprint arXiv:1412.6572","author":"Goodfellow I. J.","year":"2014","unstructured":"I. J. Goodfellow , J. Shlens , and C. Szegedy , \" Explaining and harnessing adversarial examples,\" arXiv preprint arXiv:1412.6572 , 2014 . I. J. Goodfellow, J. Shlens, and C. Szegedy, \"Explaining and harnessing adversarial examples,\" arXiv preprint arXiv:1412.6572, 2014."},{"key":"e_1_3_2_1_25_1","volume-title":"Attacks and defenses,\" 2018 ICLR","author":"Tram\u00e8r F.","year":"2018","unstructured":"F. Tram\u00e8r , A. Kurakin , N. Papernot , I. Goodfellow , D. Boneh , and P. McDaniel , \" Ensemble adversarial training : Attacks and defenses,\" 2018 ICLR , vol. arXiv preprint arXiv: 1705 .07204, 2018 . F. Tram\u00e8r, A. Kurakin, N. Papernot, I. Goodfellow, D. Boneh, and P. McDaniel, \"Ensemble adversarial training: Attacks and defenses,\" 2018 ICLR, vol. arXiv preprint arXiv:1705.07204, 2018."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1561\/2400000003"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1016\/S0893-6080(98)00116-6"},{"key":"e_1_3_2_1_28_1","volume-title":"Adam: A method for stochastic optimization,\" 2015 ICLR","author":"Kingma D. P.","year":"2015","unstructured":"D. P. Kingma and J. Ba , \" Adam: A method for stochastic optimization,\" 2015 ICLR , vol. arXiv preprint arXiv: 1412 .6980, 2015 . D. P. Kingma and J. Ba, \"Adam: A method for stochastic optimization,\" 2015 ICLR, vol. arXiv preprint arXiv:1412.6980, 2015."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_30_1","volume-title":"Department of Computer Science","author":"Krizhevsky A.","year":"2009","unstructured":"A. Krizhevsky and G. Hinton , \" Learning multiple layers of features from tiny images,\" Master's thesis , Department of Computer Science , University of Toronto , 2009 . A. Krizhevsky and G. Hinton, \"Learning multiple layers of features from tiny images,\" Master's thesis, Department of Computer Science, University of Toronto, 2009."},{"key":"e_1_3_2_1_31_1","first-page":"2818","volume-title":"Rethinking the inception architecture for computer vision,\" 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Szegedy C.","year":"2016","unstructured":"C. Szegedy , V. Vanhoucke , S. Ioffe , J. Shlens , and Z. Wojna , \" Rethinking the inception architecture for computer vision,\" 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , pp. 2818 -- 2826 , 2016 . C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna, \"Rethinking the inception architecture for computer vision,\" 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2818--2826, 2016."},{"key":"e_1_3_2_1_32_1","volume-title":"an adversarial machine learning library,\" arXiv preprint arXiv:1610.00768","author":"Papernot N.","year":"2016","unstructured":"N. Papernot , I. Goodfellow , R. Sheatsley , R. Feinman , and P. McDaniel , \"cleverhans v1.0.0 : an adversarial machine learning library,\" arXiv preprint arXiv:1610.00768 , 2016 . N. Papernot, I. Goodfellow, R. Sheatsley, R. Feinman, and P. McDaniel, \"cleverhans v1.0.0: an adversarial machine learning library,\" arXiv preprint arXiv:1610.00768, 2016."}],"event":{"sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEICE ESS Institute of Electronics, Information and Communication Engineers, Engineering Sciences Society","IEEE CAS","IEEE CEDA","IPSJ SIG-SLDM Information Processing Society of Japan, SIG System LSI Design Methodology"],"acronym":"ASPDAC '19","name":"ASPDAC '19: 24th Asia and South Pacific Design Automation Conference","location":"Tokyo Japan"},"container-title":["Proceedings of the 24th Asia and South Pacific Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287624.3288750","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287624.3288750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:54Z","timestamp":1750208274000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287624.3288750"}},"subtitle":["an enhanced adversarial attack for deep neural networks with undetectable distortions"],"short-title":[],"issued":{"date-parts":[[2019,1,21]]},"references-count":32,"alternative-id":["10.1145\/3287624.3288750","10.1145\/3287624"],"URL":"https:\/\/doi.org\/10.1145\/3287624.3288750","relation":{},"subject":[],"published":{"date-parts":[[2019,1,21]]},"assertion":[{"value":"2019-01-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}