{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:39Z","timestamp":1750220199884,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,13]],"date-time":"2022-05-13T00:00:00Z","timestamp":1652400000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,13]]},"DOI":"10.1145\/3545729.3545736","type":"proceedings-article","created":{"date-parts":[[2022,10,13]],"date-time":"2022-10-13T16:13:55Z","timestamp":1665677635000},"page":"24-27","source":"Crossref","is-referenced-by-count":1,"title":["A New Poisoning Attacks on Deep Neural Networks"],"prefix":"10.1145","author":[{"given":"Jung-Shian","family":"Li","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering\/Institute of Computer and Communication Engineering, National Cheng Kung University, Taiwan"}]},{"given":"Yen-Chu","family":"Peng","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering\/Institute of Computer and Communication Engineering, National Cheng Kung University, Taiwan"}]},{"given":"I-Hsien","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering\/Institute of Computer and Communication Engineering, National Cheng Kung University, Taiwan"}]},{"given":"Chuan-Gang","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of multimedia and game development, Chia-Nan University of Pharmacy and Science, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2022,10,13]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"International conference on learning representations (ICLR \u201815)","author":"Simonyan K.","unstructured":"K. Simonyan and A. Zisserman , 2015. Very deep convolutional networks for large-scale image recognition . In International conference on learning representations (ICLR \u201815) , Computational and Biological Learning Society, San Diego, CA, USA , 1 - 14 . K. Simonyan and A. Zisserman, 2015. Very deep convolutional networks for large-scale image recognition. In International conference on learning representations (ICLR \u201815), Computational and Biological Learning Society, San Diego, CA, USA , 1-14."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"volume-title":"Proceedings of the IEEE; 86(11)","author":"LeCun Y.","key":"e_1_3_2_1_3_1","unstructured":"Y. LeCun , L. Bottou , Y. Bengio and P. Haffner . Gradient-based learning applied to document recognition . In Proceedings of the IEEE; 86(11) : 2278 - 2324. https:\/\/ doi.org\/10.1109\/5.726791 Y. LeCun, L. Bottou, Y. Bengio and P. Haffner. Gradient-based learning applied to document recognition. In Proceedings of the IEEE; 86(11): 2278 - 2324. https:\/\/ doi.org\/10.1109\/5.726791"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition Boston, IEEE, MA, USA, 1-9. https:\/\/doi.org\/10","author":"Szegedy C.","year":"2015","unstructured":"C. Szegedy , W. Liu , Y. Jia , P. Sermanet , S. Reed , D. Anguelov , D. Erha , V. Vanhoucke and A. Rabinovich , 2015. Going deeper with convolutions (CVPR \u201815) . in Proceedings of the IEEE conference on computer vision and pattern recognition Boston, IEEE, MA, USA, 1-9. https:\/\/doi.org\/10 .1109\/CVPR. 2015 .7298594 C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erha, V. Vanhoucke and A. Rabinovich, 2015. Going deeper with convolutions (CVPR \u201815). in Proceedings of the IEEE conference on computer vision and pattern recognition Boston, IEEE, MA, USA, 1-9. https:\/\/doi.org\/10.1109\/CVPR.2015.7298594"},{"key":"e_1_3_2_1_5_1","first-page":"770","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition(CVPR \u201816)","author":"He K.","year":"2016","unstructured":"K. He , X. Zhang , S. Ren and J. Sun , 2105. Deep Residual Learning for Image Recognition . In Proceedings of the IEEE conference on computer vision and pattern recognition(CVPR \u201816) , IEEE, Las Vegas, NV, USA , 770 - 778 . https:\/\/doi.org\/10.1109\/CVPR. 2016 .90 K. He, X. Zhang, S. Ren and J. Sun, 2105. Deep Residual Learning for Image Recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition(CVPR \u201816), IEEE, Las Vegas, NV, USA, 770-778. https:\/\/doi.org\/10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_6_1","first-page":"1689","volume-title":"International Conference on Machine Learning(ICML \u201815)","author":"Xiao H.","year":"1804","unstructured":"H. Xiao , B. Biggio , G. Brown , G. Fumera , C. Eckert and F. Roli , 2015. Is feature selection secure against training data poisoning? . In International Conference on Machine Learning(ICML \u201815) , Lille, France , 1689 - 1698 . https:\/\/doi.org\/10.48550\/arXiv. 1804 .07933 H. Xiao, B. Biggio, G. Brown, G. Fumera, C. Eckert and F. Roli, 2015. Is feature selection secure against training data poisoning?. In International Conference on Machine Learning(ICML \u201815), Lille, France, 1689-1698. https:\/\/doi.org\/10.48550\/arXiv.1804.07933"},{"key":"e_1_3_2_1_7_1","unstructured":"A. Shafahi W. R. Huang M. Najibi O. Suciu C. Studer T. Dumitras and T. Goldstein 2018. Poison frogs! targeted clean-label poisoning attacks on neural networks In processdings of the 32nd International conference on Neural Information Processing Systems (NIPS \u201918) ACM Montr\u00e9al Canada 6106-6116.  A. Shafahi W. R. Huang M. Najibi O. Suciu C. Studer T. Dumitras and T. Goldstein 2018. Poison frogs! targeted clean-label poisoning attacks on neural networks In processdings of the 32nd International conference on Neural Information Processing Systems (NIPS \u201918) ACM Montr\u00e9al Canada 6106-6116."},{"key":"e_1_3_2_1_8_1","first-page":"1807","volume-title":"International Conference on Machine Learning, Edinburgh(ICML \u201912)","author":"Biggio B.","unstructured":"B. Biggio , B. Nelson and P. Laskov , 2012. Poisoning attacks against support vector machines . In International Conference on Machine Learning, Edinburgh(ICML \u201912) , ACM, Scotland, UK , 1807 - 1814 . B. Biggio, B. Nelson and P. Laskov, 2012. Poisoning attacks against support vector machines. In International Conference on Machine Learning, Edinburgh(ICML \u201912), ACM, Scotland, UK, 1807-1814."},{"key":"e_1_3_2_1_9_1","first-page":"2871","volume-title":"AAAI Conference on Artificial Intelligence (AAAI \u201915)","author":"Mei S.","unstructured":"S. Mei and X. Zhu , 2015. Using machine teaching to identify optimal training-set attacks on machine learners . In AAAI Conference on Artificial Intelligence (AAAI \u201915) , ACM, Austin, Texas, USA , 2871 - 2877 . S. Mei and X. Zhu, 2015. Using machine teaching to identify optimal training-set attacks on machine learners. In AAAI Conference on Artificial Intelligence (AAAI \u201915), ACM, Austin, Texas, USA, 2871-2877."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905915"}],"event":{"name":"ICMHI 2022: 2022 6th International Conference on Medical and Health Informatics","acronym":"ICMHI 2022","location":"Virtual Event Japan"},"container-title":["2022 6th International Conference on Medical and Health Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545729.3545736","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545729.3545736","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:45Z","timestamp":1750186965000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545729.3545736"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,13]]},"references-count":10,"alternative-id":["10.1145\/3545729.3545736","10.1145\/3545729"],"URL":"https:\/\/doi.org\/10.1145\/3545729.3545736","relation":{},"subject":[],"published":{"date-parts":[[2022,5,13]]}}}