{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:38Z","timestamp":1750220438364,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC","award":["61632015, 61690203, 61532007"],"award-info":[{"award-number":["61632015, 61690203, 61532007"]}]},{"name":"National Key R&D Program of China","award":["2017YFB1001802"],"award-info":[{"award-number":["2017YFB1001802"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3418903","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:39:02Z","timestamp":1611790742000},"page":"1260-1261","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Styx"],"prefix":"10.1145","author":[{"given":"Meixi","family":"Liu","sequence":"first","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Weijiang","family":"Hong","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Weiyu","family":"Pan","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Chendong","family":"Feng","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Zhenbang","family":"Chen","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Ji","family":"Wang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2613","volume-title":"NeurIPS 2016","author":"Bastani Osbert","year":"2016","unstructured":"Osbert Bastani, Yani Ioannou, Leonidas Lampropoulos, Dimitrios Vytiniotis, Aditya V. Nori, and Antonio Criminisi. [n.d.]. Measuring Neural Net Robustness with Constraints. In NeurIPS 2016, pp.2613--2621, 2016."},{"key":"e_1_3_2_1_2_1","volume-title":"Explaining and Harnessing Adversarial Examples. CoRR abs\/1412.6572","author":"Goodfellow Ian J.","year":"2014","unstructured":"Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and Harnessing Adversarial Examples. CoRR abs\/1412.6572 (2014)."},{"key":"e_1_3_2_1_3_1","volume-title":"Dimakis","author":"Ilyas Andrew","year":"2017","unstructured":"Andrew Ilyas, Ajil Jalal, Eirini Asteri, Constantinos Daskalakis, and Alexandros G. Dimakis. 2017. The Robust Manifold Defense: Adversarial Training using Generative Models. CoRR abs\/1712.09196 (2017)."},{"key":"e_1_3_2_1_4_1","volume-title":"Kochenderfer","author":"Katz Guy","year":"2017","unstructured":"Guy Katz, Clark W. Barrett, David L. Dill, Kyle Julian, and Mykel J. Kochenderfer. 2017. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks. In CAV."},{"key":"e_1_3_2_1_5_1","volume-title":"End-To-End Ego Lane Estimation Based on Sequential Transfer Learning for Self-Driving Cars. In CVPR","author":"Kim Jiman","year":"2017","unstructured":"Jiman Kim and Chanjong Park. 2017. End-To-End Ego Lane Estimation Based on Sequential Transfer Learning for Self-Driving Cars. In CVPR 2017. 1194--1202."},{"key":"e_1_3_2_1_6_1","volume-title":"Adversarial examples in the physical world. CoRR abs\/1607.02533","author":"Kurakin Alexey","year":"2016","unstructured":"Alexey Kurakin, Ian J. Goodfellow, and Samy Bengio. 2016. Adversarial examples in the physical world. CoRR abs\/1607.02533 (2016)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/3238147.3238202"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_9_1","volume-title":"Biologically inspired protection of deep networks from adversarial attacks. CoRR abs\/1703.09202","author":"Nayebi Aran","year":"2017","unstructured":"Aran Nayebi and Surya Ganguli. 2017. Biologically inspired protection of deep networks from adversarial attacks. CoRR abs\/1703.09202 (2017)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/SP.2016.41"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/3132747.3132785"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1038\/323533a0"},{"key":"e_1_3_2_1_13_1","volume-title":"AE-GAN: adversarial eliminating with GAN. CoRR abs\/1707.05474","author":"Shen Shiwei","year":"2017","unstructured":"Shiwei Shen, Guoqing Jin, Ke Gao, and Yongdong Zhang. 2017. AE-GAN: adversarial eliminating with GAN. CoRR abs\/1707.05474 (2017)."},{"key":"e_1_3_2_1_14_1","volume-title":"Testing Deep Neural Networks. CoRR abs\/1803.04792","author":"Sun Youcheng","year":"2018","unstructured":"Youcheng Sun, Xiaowei Huang, and Daniel Kroening. 2018. Testing Deep Neural Networks. CoRR abs\/1803.04792 (2018)."},{"key":"e_1_3_2_1_15_1","volume-title":"Intriguing properties of neural networks. CoRR abs\/1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian J. Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. CoRR abs\/1312.6199 (2013)."}],"event":{"sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"acronym":"ASE '20","name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia"},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3418903","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3418903","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:23Z","timestamp":1750193243000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3418903"}},"subtitle":["a data-oriented mutation framework to improve the robustness of DNN"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":15,"alternative-id":["10.1145\/3324884.3418903","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3418903","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}