{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:55Z","timestamp":1750220755035,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T00:00:00Z","timestamp":1594166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002241","name":"Japan Science and Technology Agency","doi-asserted-by":"publisher","award":["JP-50166 and JP-50243"],"award-info":[{"award-number":["JP-50166 and JP-50243"]}],"id":[{"id":"10.13039\/501100002241","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,8]]},"DOI":"10.1145\/3377929.3389962","type":"proceedings-article","created":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T15:26:55Z","timestamp":1598455615000},"page":"135-136","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Towards evolving robust neural architectures to defend from adversarial attacks"],"prefix":"10.1145","author":[{"given":"Shashank","family":"Kotyan","sequence":"first","affiliation":[{"name":"Kyushu University, Japan"}]},{"given":"Danilo Vasconcellos","family":"Vargas","sequence":"additional","affiliation":[{"name":"Kyushu University, Japan"}]}],"member":"320","published-online":{"date-parts":[[2020,7,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Anish Athalye Nicholas Carlini and David Wagner. 2018. Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. In Icml.  Anish Athalye Nicholas Carlini and David Wagner. 2018. Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. In Icml."},{"volume-title":"SMASH: one-shot model architecture search through hypernetworks. arXiv preprint arXiv:1708.05344","year":"2017","author":"Brock Andrew","key":"e_1_3_2_1_2_1"},{"volume-title":"Thermometer encoding: One hot way to resist adversarial examples. Iclr","year":"2018","author":"Buckman Jacob","key":"e_1_3_2_1_3_1"},{"volume-title":"Path-level network transformation for efficient architecture search. arXiv preprint arXiv:1806.02639","year":"2018","author":"Cai Han","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3205651.3208782"},{"volume-title":"Explaining and Harnessing Adversarial Examples. arXiv preprint arXiv:1412.6572","year":"2014","author":"Goodfellow Ian J","key":"e_1_3_2_1_6_1"},{"volume-title":"Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533","year":"2016","author":"Kurakin Alexey","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321707.3321721"},{"key":"e_1_3_2_1_9_1","unstructured":"Aleksander Madry Aleksandar Makelov Ludwig Schmidt Dimitris Tsipras and Adrian Vladu. 2018. Towards deep learning models resistant to adversarial attacks. In Iclr.  Aleksander Madry Aleksandar Makelov Ludwig Schmidt Dimitris Tsipras and Adrian Vladu. 2018. Towards deep learning models resistant to adversarial attacks. In Iclr."},{"volume-title":"Deeparchitect: Automatically designing and training deep architectures. arXiv preprint arXiv 1704.08792","year":"2017","author":"Negrinho Renato","key":"e_1_3_2_1_10_1"},{"volume-title":"International Conference on Machine Learning. arXiv preprint arXiv:1802","year":"2018","author":"Pham Hieu","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"volume-title":"Szegedy","year":"2014","author":"Christian","key":"e_1_3_2_1_13_1"},{"volume-title":"Robustness Assessment for Adversarial Machine Learning: Problems, Solutions and a Survey of Current Neural Networks and Defenses. arXiv preprint arXiv:1906.06026","year":"2019","author":"Vargas Danilo Vasconcellos","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2551748"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321707.3321735"}],"event":{"name":"GECCO '20: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"location":"Canc\u00fan Mexico","acronym":"GECCO '20"},"container-title":["Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377929.3389962","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377929.3389962","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377929.3389962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:39:00Z","timestamp":1750199940000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377929.3389962"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,8]]},"references-count":16,"alternative-id":["10.1145\/3377929.3389962","10.1145\/3377929"],"URL":"https:\/\/doi.org\/10.1145\/3377929.3389962","relation":{},"subject":[],"published":{"date-parts":[[2020,7,8]]},"assertion":[{"value":"2020-07-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}