{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:30Z","timestamp":1750221090158,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T00:00:00Z","timestamp":1548028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,21]]},"DOI":"10.1145\/3287624.3288751","type":"proceedings-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T21:45:18Z","timestamp":1547847918000},"page":"506-511","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A system-level perspective to understand the vulnerability of deep learning systems"],"prefix":"10.1145","author":[{"given":"Tao","family":"Liu","sequence":"first","affiliation":[{"name":"Florida International University"}]},{"given":"Nuo","family":"Xu","sequence":"additional","affiliation":[{"name":"Florida International University"}]},{"given":"Qi","family":"Liu","sequence":"additional","affiliation":[{"name":"Florida International University"}]},{"given":"Yanzhi","family":"Wang","sequence":"additional","affiliation":[{"name":"Northeastern University"}]},{"given":"Wujie","family":"Wen","sequence":"additional","affiliation":[{"name":"Florida International University"}]}],"member":"320","published-online":{"date-parts":[[2019,1,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485970"},{"volume-title":"Deep learning","author":"Goodfellow Ian","key":"e_1_3_2_1_2_1","unstructured":"Ian Goodfellow , Yoshua Bengio , Aaron Courville , and Yoshua Bengio . 2016. Deep learning . Vol. 1 . MIT press Cambridge . Ian Goodfellow, Yoshua Bengio, Aaron Courville, and Yoshua Bengio. 2016. Deep learning. Vol. 1. MIT press Cambridge."},{"key":"e_1_3_2_1_3_1","volume-title":"d.}. Explaining and harnessing adversarial examples","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy . {n. d.}. Explaining and harnessing adversarial examples ( 2014 ). arXiv preprint arXiv:1412.6572 ({n. d.}). Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. {n. d.}. Explaining and harnessing adversarial examples (2014). arXiv preprint arXiv:1412.6572 ({n. d.})."},{"key":"e_1_3_2_1_4_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy . 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 ( 2014 ). Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_5_1","volume-title":"Symbolic Execution for Deep Neural Networks. arXiv preprint arXiv:1807.10439","author":"Gopinath Divya","year":"2018","unstructured":"Divya Gopinath , Kaiyuan Wang , Mengshi Zhang , Corina S Pasareanu , and Sarfraz Khurshid . 2018. Symbolic Execution for Deep Neural Networks. arXiv preprint arXiv:1807.10439 ( 2018 ). Divya Gopinath, Kaiyuan Wang, Mengshi Zhang, Corina S Pasareanu, and Sarfraz Khurshid. 2018. Symbolic Execution for Deep Neural Networks. arXiv preprint arXiv:1807.10439 (2018)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Geoffrey Hinton Li Deng Dong Yu George E Dahl Abdel-rahman Mohamed Navdeep Jaitly Andrew Senior Vincent Vanhoucke Patrick Nguyen Tara N Sainath etal 2012. Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups. IEEE Signal processing magazine 29 6 (2012) 82--97.  Geoffrey Hinton Li Deng Dong Yu George E Dahl Abdel-rahman Mohamed Navdeep Jaitly Andrew Senior Vincent Vanhoucke Patrick Nguyen Tara N Sainath et al. 2012. Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups. IEEE Signal processing magazine 29 6 (2012) 82--97.","DOI":"10.1109\/MSP.2012.2205597"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.527"},{"key":"e_1_3_2_1_8_1","volume-title":"DeepLocker - Concealing Targeted Attacks with AI Locksmithing. In Blackhat USA","author":"Kirat Dhilung","year":"2018","unstructured":"Dhilung Kirat , Jiyong Jang , and Marc Stoecklin . 2018 . DeepLocker - Concealing Targeted Attacks with AI Locksmithing. In Blackhat USA 2018. Blackhat. Dhilung Kirat, Jiyong Jang, and Marc Stoecklin. 2018. DeepLocker - Concealing Targeted Attacks with AI Locksmithing. In Blackhat USA 2018. Blackhat."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2009.07.007"},{"key":"e_1_3_2_1_10_1","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105.   Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105."},{"key":"e_1_3_2_1_11_1","volume-title":"Deep learning. nature 521, 7553","author":"LeCun Yann","year":"2015","unstructured":"Yann LeCun , Yoshua Bengio , and Geoffrey Hinton . 2015. Deep learning. nature 521, 7553 ( 2015 ), 436. Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. nature 521, 7553 (2015), 436."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/3201607.3201772"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383920"},{"key":"e_1_3_2_1_14_1","volume-title":"Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples. arXiv preprint arXiv:1803.05787","author":"Liu Zihao","year":"2018","unstructured":"Zihao Liu , Qi Liu , Tao Liu , Yanzhi Wang , and Wujie Wen . 2018 . Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples. arXiv preprint arXiv:1803.05787 (2018). Zihao Liu, Qi Liu, Tao Liu, Yanzhi Wang, and Wujie Wen. 2018. Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples. arXiv preprint arXiv:1803.05787 (2018)."},{"key":"e_1_3_2_1_15_1","unstructured":"Microsoft. {n. d.}. Profiling Overview. https:\/\/docs.microsoft.com\/en-us\/dotnet\/framework\/unmanaged-api\/profiling\/profiling-overview#supported-features\/.  Microsoft. {n. d.}. Profiling Overview. https:\/\/docs.microsoft.com\/en-us\/dotnet\/framework\/unmanaged-api\/profiling\/profiling-overview#supported-features\/."},{"key":"e_1_3_2_1_16_1","volume-title":"ACSAC","author":"Moser Andreas","year":"2007","unstructured":"Andreas Moser , Christopher Kruegel , and Engin Kirda . 2007 . Limits of static analysis for malware detection. In Computer security applications conference, 2007 . ACSAC 2007. Twenty-third annual. IEEE, 421--430. Andreas Moser, Christopher Kruegel, and Engin Kirda. 2007. Limits of static analysis for malware detection. In Computer security applications conference, 2007. ACSAC 2007. Twenty-third annual. IEEE, 421--430."},{"key":"e_1_3_2_1_17_1","volume-title":"Practical black-box attacks against deep learning systems using adversarial examples. arXiv preprint","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick McDaniel , Ian Goodfellow , Somesh Jha , Z Berkay Celik , and Ananthram Swami . 2016. Practical black-box attacks against deep learning systems using adversarial examples. arXiv preprint ( 2016 ). Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z Berkay Celik, and Ananthram Swami. 2016. Practical black-box attacks against deep learning systems using adversarial examples. arXiv preprint (2016)."},{"key":"e_1_3_2_1_18_1","volume-title":"2016 IEEE European Symposium on. IEEE, 372--387","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick McDaniel , Somesh Jha , Matt Fredrikson , Z Berkay Celik , and Ananthram Swami . 2016 . The limitations of deep learning in adversarial settings. In Security and Privacy (EuroS&P) , 2016 IEEE European Symposium on. IEEE, 372--387 . Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z Berkay Celik, and Ananthram Swami. 2016. The limitations of deep learning in adversarial settings. In Security and Privacy (EuroS&P), 2016 IEEE European Symposium on. IEEE, 372--387."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134077"},{"key":"e_1_3_2_1_21_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 ( 2013 ). Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)."},{"key":"e_1_3_2_1_22_1","volume-title":"Generative Poisoning Attack Method Against Neural Networks. arXiv preprint arXiv:1703.01340","author":"Yang Chaofei","year":"2017","unstructured":"Chaofei Yang , Qing Wu , Hai Li , and Yiran Chen . 2017. Generative Poisoning Attack Method Against Neural Networks. arXiv preprint arXiv:1703.01340 ( 2017 ). Chaofei Yang, Qing Wu, Hai Li, and Yiran Chen. 2017. Generative Poisoning Attack Method Against Neural Networks. arXiv preprint arXiv:1703.01340 (2017)."}],"event":{"name":"ASPDAC '19: 24th Asia and South Pacific Design Automation Conference","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEICE ESS Institute of Electronics, Information and Communication Engineers, Engineering Sciences Society","IEEE CAS","IEEE CEDA","IPSJ SIG-SLDM Information Processing Society of Japan, SIG System LSI Design Methodology"],"location":"Tokyo Japan","acronym":"ASPDAC '19"},"container-title":["Proceedings of the 24th Asia and South Pacific Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287624.3288751","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287624.3288751","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:54Z","timestamp":1750208274000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287624.3288751"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,21]]},"references-count":22,"alternative-id":["10.1145\/3287624.3288751","10.1145\/3287624"],"URL":"https:\/\/doi.org\/10.1145\/3287624.3288751","relation":{},"subject":[],"published":{"date-parts":[[2019,1,21]]},"assertion":[{"value":"2019-01-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}