{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:26Z","timestamp":1750220006982,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","award":["2019R1A2C1088802"],"award-info":[{"award-number":["2019R1A2C1088802"]}],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]},{"name":"IITP","award":["2018-0-00513"],"award-info":[{"award-number":["2018-0-00513"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3563550","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"3439-3441","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Poster"],"prefix":"10.1145","author":[{"given":"Leo Hyun","family":"Park","sequence":"first","affiliation":[{"name":"Yonsei University, Seoul, Republic of Korea"}]},{"given":"Jaewoo","family":"Park","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Republic of Korea"}]},{"given":"Soochang","family":"Chung","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Republic of Korea"}]},{"given":"Jaeuk","family":"Kim","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Republic of Korea"}]},{"given":"Myung Gyo","family":"Oh","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Republic of Korea"}]},{"given":"Taekyoung","family":"Kwon","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"arXiv preprint arXiv:1711.08478","author":"Carlini Nicholas","year":"2017","unstructured":"Nicholas Carlini and David Wagner . 2017. Magnet and\" efficient defenses against adversarial attacks\" are not robust to adversarial examples. arXiv preprint arXiv:1711.08478 ( 2017 ). Nicholas Carlini and David Wagner. 2017. Magnet and\" efficient defenses against adversarial attacks\" are not robust to adversarial examples. arXiv preprint arXiv:1711.08478 (2017)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"volume-title":"Proc. the ICML. 6471--6482","author":"Zhong","key":"e_1_3_2_2_3_1","unstructured":"Zhong Li et al. 2021. Testing DNN-based Autonomous Driving Systems under Critical Environmental Conditions . In Proc. the ICML. 6471--6482 . Zhong Li et al. 2021. Testing DNN-based Autonomous Driving Systems under Critical Environmental Conditions. In Proc. the ICML. 6471--6482."},{"volume-title":"Proc. the ACM\/IEEE ASE. 120--131","author":"Lei","key":"e_1_3_2_2_4_1","unstructured":"Lei Ma et al. 2018. Deepgauge: Multi-granularity testing criteria for deep learning systems . In Proc. the ACM\/IEEE ASE. 120--131 . Lei Ma et al. 2018. Deepgauge: Multi-granularity testing criteria for deep learning systems. In Proc. the ACM\/IEEE ASE. 120--131."},{"volume-title":"Proc. the ACM CCS. 135--147","author":"Dongyu","key":"e_1_3_2_2_5_1","unstructured":"Dongyu Meng et al. 2017. Magnet: a Two-Pronged Defense against Adversarial Examples . In Proc. the ACM CCS. 135--147 . Dongyu Meng et al. 2017. Magnet: a Two-Pronged Defense against Adversarial Examples. In Proc. the ACM CCS. 135--147."},{"volume-title":"Proc. the ICML.","author":"Weili","key":"e_1_3_2_2_6_1","unstructured":"Weili Nie et al. 2022. Diffusion Models for Adversarial Purification . In Proc. the ICML. Weili Nie et al. 2022. Diffusion Models for Adversarial Purification. In Proc. the ICML."},{"volume-title":"Proc. the SOSP. 1--18","author":"Kexin","key":"e_1_3_2_2_7_1","unstructured":"Kexin Pei et al. 2017. Deepxplore: Automated whitebox testing of deep learning systems . In Proc. the SOSP. 1--18 . Kexin Pei et al. 2017. Deepxplore: Automated whitebox testing of deep learning systems. In Proc. the SOSP. 1--18."},{"volume-title":"Proc. the ACM ISSTA. 146--157","author":"Xiaofei","key":"e_1_3_2_2_8_1","unstructured":"Xiaofei Xie et al. 2019. Deephunter: a coverage-guided fuzz testing framework for deep neural networks . In Proc. the ACM ISSTA. 146--157 . Xiaofei Xie et al. 2019. Deephunter: a coverage-guided fuzz testing framework for deep neural networks. In Proc. the ACM ISSTA. 146--157."},{"volume-title":"Proc. the ACM FSE. 775--787","author":"Shenao","key":"e_1_3_2_2_9_1","unstructured":"Shenao Yan et al. 2020. Correlations between deep neural network model coverage criteria and model quality . In Proc. the ACM FSE. 775--787 . Shenao Yan et al. 2020. Correlations between deep neural network model coverage criteria and model quality. In Proc. the ACM FSE. 775--787."}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3563550","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3563550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:06Z","timestamp":1750182666000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3563550"}},"subtitle":["Adversarial Defense with Deep Learning Coverage on MagNet's Purification"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":9,"alternative-id":["10.1145\/3548606.3563550","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3563550","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}