{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:33:12Z","timestamp":1770748392131,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,25]],"date-time":"2020-06-25T00:00:00Z","timestamp":1593043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"SFTI","award":["RTVU1701"],"award-info":[{"award-number":["RTVU1701"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,25]]},"DOI":"10.1145\/3377930.3390164","type":"proceedings-article","created":{"date-parts":[[2020,6,29]],"date-time":"2020-06-29T19:29:12Z","timestamp":1593458952000},"page":"395-403","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Lateralized learning for robustness against adversarial attacks in a visual classification system"],"prefix":"10.1145","author":[{"given":"Abubakar","family":"Siddique","sequence":"first","affiliation":[{"name":"Victoria University of Wellington, New Zealand"}]},{"given":"Will N.","family":"Browne","sequence":"additional","affiliation":[{"name":"Victoria University of Wellington, New Zealand"}]},{"given":"Gina M.","family":"Grimshaw","sequence":"additional","affiliation":[{"name":"Victoria University of Wellington, New Zealand"}]}],"member":"320","published-online":{"date-parts":[[2020,6,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00357"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1038\/nn.4058"},{"key":"e_1_3_2_1_4_1","unstructured":"Marie T Banich and Rebecca Compton. 2010. Cognitive Neuroscience. Nelson Education.  Marie T Banich and Rebecca Compton. 2010. Cognitive Neuroscience. Nelson Education."},{"key":"e_1_3_2_1_5_1","volume-title":"Representation learning: A review and new perspectives","author":"Bengio Yoshua","year":"2013"},{"key":"e_1_3_2_1_6_1","volume-title":"Accuracy-based learning classifier systems: models, analysis and applications to classification tasks. Evolutionary computation 11, 3","author":"Bernad\u00f3-Mansilla Ester","year":"2003"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2018.8362326"},{"key":"e_1_3_2_1_8_1","volume-title":"Davide Del Testa","author":"Bojarski Mariusz","year":"2016"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2012.10.019"},{"key":"e_1_3_2_1_10_1","volume-title":"Implementation of Papers on Adversarial Examples. https:\/\/github.com\/sarathknv\/adversarial-examples-pytorch\/tree\/master. [Online","author":"Chandra Sarath","year":"2020"},{"key":"e_1_3_2_1_11_1","volume-title":"International workshops on electrical and computer engineering subfields. 884--888","author":"Chen Junkai","year":"2014"},{"key":"e_1_3_2_1_12_1","volume-title":"Histograms of oriented gradients for human detection. In 2005 IEEE computer society conference on computer vision and pattern recognition (CVPR'05)","author":"Dalal Navneet"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Li Deng Dong Yu etal 2014. Deep learning: methods and applications. Foundations and Trends\u00ae in Signal Processing 7 3--4 (2014) 197--387.  Li Deng Dong Yu et al. 2014. Deep learning: methods and applications. Foundations and Trends \u00ae in Signal Processing 7 3--4 (2014) 197--387.","DOI":"10.1561\/2000000039"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bbr.2005.03.012"},{"key":"e_1_3_2_1_15_1","volume-title":"A study of the effect of jpg compression on adversarial images. arXiv preprint arXiv:1608.00853","author":"Dziugaite Gintare Karolina","year":"2016"},{"key":"e_1_3_2_1_16_1","volume-title":"chaos and integration: hemispheric interaction and individual differences in metaphor comprehension. Frontiers in Human Neuroscience 8","author":"Faust Miriam","year":"2014"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuropsychologia.2015.10.024"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2015.09.055"},{"key":"e_1_3_2_1_19_1","volume-title":"Learning disabilities and brain function: A neuropsychological approach","author":"Gaddes William H"},{"key":"e_1_3_2_1_20_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jneuroling.2008.10.005"},{"key":"e_1_3_2_1_22_1","volume-title":"Towards deep neural network architectures robust to adversarial examples. arXiv preprint arXiv:1412.5068","author":"Gu Shixiang","year":"2014"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_24_1","volume-title":"Neurobiology of Language","author":"Hickok Gregory"},{"key":"e_1_3_2_1_25_1","volume-title":"Cognitive systems based on adaptive algorithms Reprinted in: Evolutionary computation. The fossil record","author":"Holland JH","year":"1998"},{"key":"e_1_3_2_1_26_1","volume-title":"SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and &lt","author":"Iandola Forrest N","year":"2016"},{"key":"e_1_3_2_1_27_1","volume-title":"kaggleCats. https:\/\/www.kaggle.com\/crawford\/cat-dataset. [Online","year":"2020"},{"key":"e_1_3_2_1_28_1","volume-title":"Acm Multimedia","volume":"4","author":"Ke Yan","year":"2004"},{"key":"e_1_3_2_1_29_1","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105.  Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105."},{"key":"e_1_3_2_1_30_1","volume-title":"Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533","author":"Kurakin Alexey","year":"2016"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33718-5_13"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/850924.851523"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_1_34_1","volume-title":"Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083","author":"Madry Aleksander","year":"2017"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-014-0007-7"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1038\/nn.3213"},{"key":"e_1_3_2_1_39_1","volume-title":"http:\/\/dlib.net\/files\/data\/. [Online","author":"Library","year":"2020"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/0028-3932(86)90021-7"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8721.00061"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(91)90012-D"},{"key":"e_1_3_2_1_44_1","first-page":"S420","article-title":"Advantages of having a lateralized brain","volume":"271","author":"Rogers Lesley J","year":"2004","journal-title":"Proceedings of the Royal Society of London B: Biological Sciences"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11504"},{"key":"e_1_3_2_1_46_1","volume-title":"Thirty-Second AAAI Conference on Artificial Intelligence.","author":"Sankaranarayanan Swami","year":"2018"},{"key":"e_1_3_2_1_47_1","volume-title":"Deep learning in neural networks: An overview. Neural networks 61","author":"Schmidhuber J\u00fcrgen","year":"2015"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2016.7744060"},{"key":"e_1_3_2_1_49_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1523\/JNEUROSCI.4544-08.2008"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/1644490.1644491"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.2466\/pms.108.1.219-228"}],"event":{"name":"GECCO '20: Genetic and Evolutionary Computation Conference","location":"Canc\u00fan Mexico","acronym":"GECCO '20","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"]},"container-title":["Proceedings of the 2020 Genetic and Evolutionary Computation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377930.3390164","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377930.3390164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:07Z","timestamp":1750200067000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377930.3390164"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,25]]},"references-count":53,"alternative-id":["10.1145\/3377930.3390164","10.1145\/3377930"],"URL":"https:\/\/doi.org\/10.1145\/3377930.3390164","relation":{},"subject":[],"published":{"date-parts":[[2020,6,25]]},"assertion":[{"value":"2020-06-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}