{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T10:53:58Z","timestamp":1778151238128,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T00:00:00Z","timestamp":1678406400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft mbH","award":["88652"],"award-info":[{"award-number":["88652"]}]},{"name":"Fonds zur F\u00f6rderung der wissenschaftlichen Forschung (FWF)","award":["I 4057-N31"],"award-info":[{"award-number":["I 4057-N31"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,10]]},"DOI":"10.1145\/3589883.3589891","type":"proceedings-article","created":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T19:50:36Z","timestamp":1687895436000},"page":"54-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["On the Effect of Adversarial Training Against Invariance-based Adversarial Examples"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-5698-3148","authenticated-orcid":false,"given":"Roland","family":"Rauter","sequence":"first","affiliation":[{"name":"MCI The Entrepreneurial School, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6967-8800","authenticated-orcid":false,"given":"Martin","family":"Nocker","sequence":"additional","affiliation":[{"name":"MCI The Entrepreneurial School, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3562-5265","authenticated-orcid":false,"given":"Florian","family":"Merkle","sequence":"additional","affiliation":[{"name":"MCI The Entrepreneurial School, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8710-9188","authenticated-orcid":false,"given":"Pascal","family":"Sch\u00f6ttle","sequence":"additional","affiliation":[{"name":"MCI The Entrepreneurial School, Austria"}]}],"member":"320","published-online":{"date-parts":[[2023,6,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Deep learning applications for cyber security","author":"Alazab Mamoun","unstructured":"Mamoun Alazab and MingJian Tang. 2019. Deep learning applications for cyber security. Springer."},{"key":"e_1_3_2_1_2_1","volume-title":"Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In 2018 IEEE Security and Privacy Workshops (SPW). IEEE, 1\u20137.","author":"Carlini Nicholas","year":"2018","unstructured":"Nicholas Carlini and David Wagner. 2018. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In 2018 IEEE Security and Privacy Workshops (SPW). IEEE, 1\u20137."},{"key":"e_1_3_2_1_3_1","volume-title":"Adversarial Classification. In Proceedings of the tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 99\u2013108","author":"Dalvi Nilesh","year":"2004","unstructured":"Nilesh Dalvi, Pedro Domingos, Sumit Sanghai, and Deepak Verma. 2004. Adversarial Classification. In Proceedings of the tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 99\u2013108."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"e_1_3_2_1_5_1","unstructured":"Ian\u00a0J. Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. arxiv:1412.6572\u00a0[stat.ML]"},{"key":"e_1_3_2_1_6_1","first-page":"2","article-title":"Neural networks for machine learning lecture 6a overview of mini-batch gradient descent","volume":"14","author":"Hinton Geoffrey","year":"2012","unstructured":"Geoffrey Hinton, Nitish Srivastava, and Kevin Swersky. 2012. Neural networks for machine learning lecture 6a overview of mini-batch gradient descent. Cited on 14, 8 (2012), 2.","journal-title":"Cited on"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1186\/s11782-020-00082-6"},{"key":"e_1_3_2_1_8_1","unstructured":"J\u00f6rn-Henrik Jacobsen Jens Behrmann Richard Zemel and Matthias Bethge. 2020. Excessive Invariance Causes Adversarial Vulnerability. arxiv:1811.00401\u00a0[cs.LG]"},{"key":"e_1_3_2_1_9_1","unstructured":"J\u00f6rn-Henrik Jacobsen Jens Behrmannn Nicholas Carlini Florian Tram\u00e8r and Nicolas Papernot. 2019. Exploiting Excessive Invariance Caused by Norm-Bounded Adversarial Robustness. arxiv:1903.10484\u00a0[cs.LG]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2788044"},{"key":"e_1_3_2_1_11_1","unstructured":"Yann LeCun Corinna Cortes and Chris Burges. 2010. MNIST handwritten digit database. http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"key":"e_1_3_2_1_12_1","volume-title":"International Conference on Learning Representations.","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_13_1","unstructured":"Jan\u00a0Hendrik Metzen Tim Genewein Volker Fischer and Bastian Bischoff. 2017. On Detecting Adversarial Perturbations. arxiv:1702.04267\u00a0[stat.ML]"},{"key":"e_1_3_2_1_14_1","unstructured":"Tianyu Pang Chao Du Yinpeng Dong and Jun Zhu. 2018. Towards Robust Detection of Adversarial Examples. arxiv:1706.00633\u00a0[cs.LG]"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.02607"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90370-1_9"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"e_1_3_2_1_18_1","volume-title":"International Conference on Learning Representations.","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/3524938.3525824"}],"event":{"name":"ICMLT 2023: 2023 8th International Conference on Machine Learning Technologies","location":"Stockholm Sweden","acronym":"ICMLT 2023"},"container-title":["Proceedings of the 2023 8th International Conference on Machine Learning Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589883.3589891","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589883.3589891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T07:04:31Z","timestamp":1755846271000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589883.3589891"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,10]]},"references-count":19,"alternative-id":["10.1145\/3589883.3589891","10.1145\/3589883"],"URL":"https:\/\/doi.org\/10.1145\/3589883.3589891","relation":{},"subject":[],"published":{"date-parts":[[2023,3,10]]},"assertion":[{"value":"2023-06-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}