{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:44Z","timestamp":1750220864053,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:00:00Z","timestamp":1576800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation of China","award":["61902421"],"award-info":[{"award-number":["61902421"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,20]]},"DOI":"10.1145\/3377170.3377220","type":"proceedings-article","created":{"date-parts":[[2020,3,20]],"date-time":"2020-03-20T11:16:22Z","timestamp":1584702982000},"page":"248-252","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on the Influence of Kmeans Cluster Preprocessing on Adversarial Images"],"prefix":"10.1145","author":[{"given":"Guilin","family":"Chen","sequence":"first","affiliation":[{"name":"The 63rd-research institute, National University of Defense Technology, China"}]},{"given":"Guanwu","family":"Wang","sequence":"additional","affiliation":[{"name":"The 63rd-research institute, National University of Defense Technology, China"}]},{"given":"Jian","family":"Ju","sequence":"additional","affiliation":[{"name":"The 63rd-research institute, National University of Defense Technology, China"}]},{"given":"Xianglin","family":"Wei","sequence":"additional","affiliation":[{"name":"The 63rd-research institute, National University of Defense Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2020,3,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"ImageNet classification with deep convolutional neural networks[C]\/\/ International Conference on Neural Information Processing Systems","author":"Krizhevsky A","year":"2012","unstructured":"Krizhevsky A , Sutskever I , Hinton G E . ImageNet classification with deep convolutional neural networks[C]\/\/ International Conference on Neural Information Processing Systems . Curran Associates Inc . 2012 : 1097--1105. Krizhevsky A, Sutskever I, Hinton G E. ImageNet classification with deep convolutional neural networks[C]\/\/ International Conference on Neural Information Processing Systems. Curran Associates Inc. 2012:1097--1105."},{"key":"e_1_3_2_1_2_1","volume-title":"Going Deeper with Convolutions[J]","author":"Szegedy C","year":"2014","unstructured":"Szegedy C , Liu W , Jia Y , Going Deeper with Convolutions[J] . 2014 . Szegedy C, Liu W, Jia Y, et al. Going Deeper with Convolutions[J]. 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"Computer Science","author":"Simonyan K","year":"2014","unstructured":"Simonyan K , Zisserman A. Very Deep Convolutional Networks for Large-Scale Image Recognition[J] . Computer Science , 2014 . Simonyan K, Zisserman A. Very Deep Convolutional Networks for Large-Scale Image Recognition[J]. Computer Science, 2014."},{"key":"e_1_3_2_1_4_1","volume-title":"Deep Residual Learning for Image Recognition[J]","author":"He K","year":"2015","unstructured":"He K , Zhang X , Ren S , Deep Residual Learning for Image Recognition[J] . 2015 . He K, Zhang X, Ren S, et al. Deep Residual Learning for Image Recognition[J]. 2015."},{"key":"e_1_3_2_1_5_1","first-page":"2012","author":"Deng A.","year":"2012","unstructured":"J. Deng , A. Berg , S. Satheesh , H. Su , A. Khosla , and L. Fei-Fei. ILSVRC- 2012 , 2012 . URL http:\/\/www.image-net.org\/challenges\/LSVRC\/2012\/. J. Deng, A. Berg, S. Satheesh, H. Su, A. Khosla, and L. Fei-Fei. ILSVRC-2012, 2012. URL http:\/\/www.image-net.org\/challenges\/LSVRC\/2012\/.","journal-title":"Fei-Fei. ILSVRC-"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.4451204"},{"key":"e_1_3_2_1_7_1","volume-title":"A Discriminative Feature Learning Approach for Deep Face Recognition[C]\/\/ European Conference on Computer Vision","author":"Wen Y","year":"2016","unstructured":"Wen Y , Zhang K , Li Z , A Discriminative Feature Learning Approach for Deep Face Recognition[C]\/\/ European Conference on Computer Vision . Springer , Cham , 2016 . Wen Y, Zhang K, Li Z, et al. A Discriminative Feature Learning Approach for Deep Face Recognition[C]\/\/ European Conference on Computer Vision. Springer, Cham, 2016."},{"key":"e_1_3_2_1_8_1","volume-title":"Intriguing properties of neural networks, arXiv preprint arXiv:1312.6199","author":"Szegedy W.","year":"2014","unstructured":"C. Szegedy , W. Zaremba , I. Sutskever , J. Bruna , D. Erhan , I. Goodfellow , R. Fergus , Intriguing properties of neural networks, arXiv preprint arXiv:1312.6199 , 2014 . C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, R. Fergus, Intriguing properties of neural networks, arXiv preprint arXiv:1312.6199, 2014."},{"key":"e_1_3_2_1_9_1","volume-title":"Explaining and Harnessing Adversarial Examples, arXiv preprint arXiv:1412.6572","author":"Goodfellow J.","year":"2015","unstructured":"I. J. Goodfellow , J. Shlens , C. Szegedy , Explaining and Harnessing Adversarial Examples, arXiv preprint arXiv:1412.6572 , 2015 . I. J. Goodfellow, J. Shlens, C. Szegedy, Explaining and Harnessing Adversarial Examples, arXiv preprint arXiv:1412.6572, 2015."},{"key":"e_1_3_2_1_10_1","volume-title":"Adversarial examples in the physical world, arXiv preprint arXiv:1607.02533","author":"Kurakin I.","year":"2016","unstructured":"A. Kurakin , I. Goodfellow , S. Bengio , Adversarial examples in the physical world, arXiv preprint arXiv:1607.02533 , 2016 . A. Kurakin, I. Goodfellow, S. Bengio, Adversarial examples in the physical world, arXiv preprint arXiv:1607.02533, 2016."},{"key":"e_1_3_2_1_11_1","volume-title":"Towards Evaluating the Robustness of Neural Networks, arXiv preprint arXiv:1608.04644","author":"Carlini D.","year":"2016","unstructured":"N. Carlini , D. Wagner , Towards Evaluating the Robustness of Neural Networks, arXiv preprint arXiv:1608.04644 , 2016 . N. Carlini, D. Wagner, Towards Evaluating the Robustness of Neural Networks, arXiv preprint arXiv:1608.04644, 2016."},{"key":"e_1_3_2_1_12_1","volume-title":"A study of the effect of JPG compression on adversarial images, arXiv preprint arXiv:1608.00853","author":"Dziugaite Z.","year":"2016","unstructured":"G. K. Dziugaite , Z. Ghahramani , and D. M. Roy , A study of the effect of JPG compression on adversarial images, arXiv preprint arXiv:1608.00853 , 2016 . G. K. Dziugaite, Z. Ghahramani, and D. M. Roy, A study of the effect of JPG compression on adversarial images, arXiv preprint arXiv:1608.00853, 2016."},{"key":"e_1_3_2_1_13_1","volume-title":"Enhancing Robustness of Machine Learning Systems via Data Transformations, arXiv preprint arXiv:1704.02654","author":"Bhagoji D.","year":"2017","unstructured":"A. N. Bhagoji , D. Cullina , C. Sitawarin , P. Mittal , Enhancing Robustness of Machine Learning Systems via Data Transformations, arXiv preprint arXiv:1704.02654 , 2017 . A. N. Bhagoji, D. Cullina, C. Sitawarin, P. Mittal, Enhancing Robustness of Machine Learning Systems via Data Transformations, arXiv preprint arXiv:1704.02654, 2017."},{"key":"e_1_3_2_1_14_1","volume-title":"Adversarial Examples for Semantic Segmentation and Object Detection, arXiv preprint arXiv:1703.08603","author":"Xie J.","year":"2017","unstructured":"C. Xie , J. Wang , Z. Zhang , Y. Zhou , L. Xie , and A. Yuille , Adversarial Examples for Semantic Segmentation and Object Detection, arXiv preprint arXiv:1703.08603 , 2017 . C. Xie, J. Wang, Z. Zhang, Y. Zhou, L. Xie, and A. Yuille, Adversarial Examples for Semantic Segmentation and Object Detection, arXiv preprint arXiv:1703.08603, 2017."},{"key":"e_1_3_2_1_15_1","volume-title":"Towards Deep Neural Network Architectures Robust to Adversarial Examples, arXiv preprint arXiv:1412.5068","author":"Gu L.","year":"2015","unstructured":"S. Gu , L. Rigazio , Towards Deep Neural Network Architectures Robust to Adversarial Examples, arXiv preprint arXiv:1412.5068 , 2015 . S. Gu, L. Rigazio, Towards Deep Neural Network Architectures Robust to Adversarial Examples, arXiv preprint arXiv:1412.5068, 2015."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"e_1_3_2_1_17_1","volume-title":"Defense against Universal Adversarial Perturbations, arXiv preprint arXiv:1711.05929","author":"Akhtar J.","year":"2017","unstructured":"N. Akhtar , J. Liu , A. Mian , Defense against Universal Adversarial Perturbations, arXiv preprint arXiv:1711.05929 , 2017 . N. Akhtar, J. Liu, A. Mian, Defense against Universal Adversarial Perturbations, arXiv preprint arXiv:1711.05929, 2017."},{"key":"e_1_3_2_1_18_1","volume-title":"Generative Adversarial Trainer: Defense to Adversarial Perturbations with GAN, arXiv preprint arXiv:1705.03387","author":"Lee S.","year":"2017","unstructured":"H. Lee , S. Han , J. Lee , Generative Adversarial Trainer: Defense to Adversarial Perturbations with GAN, arXiv preprint arXiv:1705.03387 , 2017 . H. Lee, S. Han, J. Lee, Generative Adversarial Trainer: Defense to Adversarial Perturbations with GAN, arXiv preprint arXiv:1705.03387, 2017."},{"volume-title":"Berkeley Symposium on Mathematical Statistics and Probability. 1966: 281--297","author":"Macqueen J.","key":"e_1_3_2_1_19_1","unstructured":"Macqueen J. Some Methods for Classification and Analysis of MultiVariate Observations[C]\/\/ Proc. of , Berkeley Symposium on Mathematical Statistics and Probability. 1966: 281--297 . Macqueen J. Some Methods for Classification and Analysis of MultiVariate Observations[C]\/\/ Proc. of, Berkeley Symposium on Mathematical Statistics and Probability. 1966:281--297."}],"event":{"name":"ICIT 2019: IoT and Smart City","sponsor":["Shanghai Jiao Tong University Shanghai Jiao Tong University","The Hong Kong Polytechnic The Hong Kong Polytechnic University","University of Malaya University of Malaya"],"location":"Shanghai China","acronym":"ICIT 2019"},"container-title":["Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377170.3377220","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377170.3377220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:39Z","timestamp":1750202619000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377170.3377220"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,20]]},"references-count":19,"alternative-id":["10.1145\/3377170.3377220","10.1145\/3377170"],"URL":"https:\/\/doi.org\/10.1145\/3377170.3377220","relation":{},"subject":[],"published":{"date-parts":[[2019,12,20]]},"assertion":[{"value":"2020-03-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}