{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:15:35Z","timestamp":1775322935592,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,24]],"date-time":"2023-03-24T00:00:00Z","timestamp":1679616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"JSPS KAKENHI","award":["JP19K11976"],"award-info":[{"award-number":["JP19K11976"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,24]]},"DOI":"10.1145\/3592307.3592342","type":"proceedings-article","created":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T13:30:46Z","timestamp":1692019846000},"page":"220-225","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Explainable AI based Adversarial Examples and its Evaluation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-2114-2966","authenticated-orcid":false,"given":"Ryo","family":"Kumagai","sequence":"first","affiliation":[{"name":"Graduate School of Science and Technology, Meijo University, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8861-2346","authenticated-orcid":false,"given":"Shu","family":"Takemoto","sequence":"additional","affiliation":[{"name":"Graduate School of Science and Technology, Meijo University, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1369-8500","authenticated-orcid":false,"given":"Yusuke","family":"Nozaki","sequence":"additional","affiliation":[{"name":"Faculty of Information Engineering, Meijo University, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9399-1902","authenticated-orcid":false,"given":"Masaya","family":"Yoshikawa","sequence":"additional","affiliation":[{"name":"Faculty of Information Engineering, Meijo University, Japan"}]}],"member":"320","published-online":{"date-parts":[[2023,8,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","unstructured":"Alejandro B. Arrieta Natalia Diaz-Rodriguez Javier D. Ser Adrien Bennetot Siham Tabik Alberto Barbado Salvador Garcia Sergio Gil-Lopez Daniel Molina Richard Benjamins Raja Chatila Francisco Herrera. 2019. Explainable Artificial Intelligence (XAI): Concepts Taxonomies Opportunities and Challenges toward Responsible AI. arXiv. https:\/\/doi.org\/10.48550\/arXiv.1910.10045","DOI":"10.48550\/arXiv.1910.10045"},{"key":"e_1_3_2_1_2_1","volume-title":"International Conference on Learning Representations","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, Rob Fergus. 2014. Intriguing properties of neural networks. International Conference on Learning Representations 2014."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Anirban Chakraborty Manaar Alam Vishal Dey Anupam Chattopadhyay Debdeep Mukhopadhyay 2018 Adversarial Attacks and Defences: A Survey arXiv https:\/\/doi.org\/10.48550\/arXiv.1810.00069","DOI":"10.48550\/arXiv.1810.00069"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.319"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_1_7_1","volume-title":"NIPS'17: Proceedings of the 31st International Conference on Neural Information Processing Systems. 4768-4777","author":"Lundberg Scott M.","year":"2017","unstructured":"Scott M. Lundberg, Su-In Lee. 2017. A unified approach to interpreting model predictions. NIPS'17: Proceedings of the 31st International Conference on Neural Information Processing Systems. 4768-4777. https:\/\/dl.acm.org\/doi\/10.5555\/3295222.3295230"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Min Lin Qiang Chen Shuicheng Yan. 2013. Network in Network. arXiv. https:\/\/doi.org\/10.48550\/arXiv.1312.4400","DOI":"10.48550\/arXiv.1312.4400"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"e_1_3_2_1_10_1","volume-title":"Explaining and Harnessing Adversarial Examples. International Conference on Learning Representations 2015","author":"Goodfellow Ian J.","year":"2015","unstructured":"Ian J. Goodfellow, Jonathon Shlens, Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. International Conference on Learning Representations 2015"},{"key":"e_1_3_2_1_11_1","volume-title":"The Limitations of Deep Learning in Adversarial Settings. 2016 IEEE European Symposium on Security and Privacy (EuroS&P). 372-387","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami. 2016. The Limitations of Deep Learning in Adversarial Settings. 2016 IEEE European Symposium on Security and Privacy (EuroS&P). 372-387. https:\/\/doi.ieeecomputersociety.org\/10.1109\/EuroSP.2016.36"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"}],"event":{"name":"ICECC 2023: 2023 The 6th International Conference on Electronics, Communications and Control Engineering","location":"Fukuoka Japan","acronym":"ICECC 2023"},"container-title":["Proceedings of the 2023 6th International Conference on Electronics, Communications and Control Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3592307.3592342","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3592307.3592342","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T09:32:55Z","timestamp":1755855175000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3592307.3592342"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,24]]},"references-count":14,"alternative-id":["10.1145\/3592307.3592342","10.1145\/3592307"],"URL":"https:\/\/doi.org\/10.1145\/3592307.3592342","relation":{},"subject":[],"published":{"date-parts":[[2023,3,24]]},"assertion":[{"value":"2023-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}