{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:10:06Z","timestamp":1756487406746,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T00:00:00Z","timestamp":1706227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"a special project of Science and Technology Innovation Strategy and Soft Science Research in Anhui Province in 2022","award":["202206f01050041"],"award-info":[{"award-number":["202206f01050041"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,1,26]]},"DOI":"10.1145\/3640824.3640859","type":"proceedings-article","created":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T12:05:28Z","timestamp":1709899528000},"page":"220-224","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["DeepHashDetection: Adversarial Example Detection Basedon Similarity Image Retrieval"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9045-3410","authenticated-orcid":false,"given":"Cheng","family":"Kong","sequence":"first","affiliation":[{"name":"Anhui University of Science and Technolog, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3368-7835","authenticated-orcid":false,"given":"Deli","family":"Yao","sequence":"additional","affiliation":[{"name":"Anhui University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2024,3,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585591"},{"key":"e_1_3_2_1_2_1","volume-title":"Selective and Features based Adversarial Example Detection. arXiv preprint arXiv:2103.05354","author":"Aldahdooh Ahmed","year":"2021","unstructured":"Ahmed Aldahdooh, Wassim Hamidouche, and Olivier D\u00e9forges. 2021. Selective and Features based Adversarial Example Detection. arXiv preprint arXiv:2103.05354 (2021)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2022.107584"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00391"},{"key":"e_1_3_2_1_5_1","volume-title":"Detecting adversarial samples from artifacts. arXiv preprint arXiv:1703.00410","author":"Feinman Reuben","year":"2017","unstructured":"Reuben Feinman, Ryan\u00a0R Curtin, Saurabh Shintre, and Andrew\u00a0B Gardner. 2017. Detecting adversarial samples from artifacts. arXiv preprint arXiv:1703.00410 (2017)."},{"key":"e_1_3_2_1_6_1","volume-title":"On the (statistical) detection of adversarial examples. arXiv preprint arXiv:1702.06280","author":"Grosse Kathrin","year":"2017","unstructured":"Kathrin Grosse, Praveen Manoharan, Nicolas Papernot, Michael Backes, and Patrick McDaniel. 2017. On the (statistical) detection of adversarial examples. arXiv preprint arXiv:1702.06280 (2017)."},{"key":"e_1_3_2_1_7_1","volume-title":"Electronics & Mobile Communication Conference (UEMCON). IEEE, 0309\u20130315","author":"Gupta Kishor\u00a0Datta","year":"2020","unstructured":"Kishor\u00a0Datta Gupta, Dipankar Dasgupta, and Zahid Akhtar. 2020. Adversarial Input Detection Using Image Processing Techniques (IPT). In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 0309\u20130315."},{"key":"e_1_3_2_1_8_1","volume-title":"Natural language processing: State of the art, current trends and challenges. Multimedia tools and applications 82, 3","author":"Khurana Diksha","year":"2023","unstructured":"Diksha Khurana, Aditya Koli, Kiran Khatter, and Sukhdev Singh. 2023. Natural language processing: State of the art, current trends and challenges. Multimedia tools and applications 82, 3 (2023), 3713\u20133744."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi15040138"},{"key":"e_1_3_2_1_10_1","volume-title":"On the limitation of local intrinsic dimensionality for characterizing the subspaces of adversarial examples. arXiv preprint arXiv:1803.09638","author":"Lu Pei-Hsuan","year":"2018","unstructured":"Pei-Hsuan Lu, Pin-Yu Chen, and Chia-Mu Yu. 2018. On the limitation of local intrinsic dimensionality for characterizing the subspaces of adversarial examples. arXiv preprint arXiv:1803.09638 (2018)."},{"volume-title":"NIC: Detecting Adversarial Samples with Neural Network Invariant Checking. In Network and Distributed System Security Symposium.","author":"Ma S.","key":"e_1_3_2_1_11_1","unstructured":"S. Ma, Y. Liu, G. Tao, W.\u00a0C. Lee, and X. Zhang. 2019. NIC: Detecting Adversarial Samples with Neural Network Invariant Checking. In Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_12_1","volume-title":"Characterizing adversarial subspaces using local intrinsic dimensionality. arXiv preprint arXiv:1801.02613","author":"Ma Xingjun","year":"2018","unstructured":"Xingjun Ma, Bo Li, Yisen Wang, Sarah\u00a0M Erfani, Sudanthi Wijewickrema, Grant Schoenebeck, Dawn Song, Michael\u00a0E Houle, and James Bailey. 2018. Characterizing adversarial subspaces using local intrinsic dimensionality. arXiv preprint arXiv:1801.02613 (2018)."},{"key":"e_1_3_2_1_13_1","unstructured":"A. Madry A. Makelov L. Schmidt D. Tsipras and A. Vladu. 2017. Towards Deep Learning Models Resistant to Adversarial Attacks. (2017)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9052933"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3361566"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00021"},{"key":"e_1_3_2_1_18_1","volume-title":"International Journal of Computer Vision","author":"Wang Shijie","year":"2023","unstructured":"Shijie Wang, Zhihui Wang, Haojie Li, Jianlong Chang, Wanli Ouyang, and Qi Tian. 2023. Accurate Fine-Grained Object Recognition with Structure-Driven Relation Graph Networks. International Journal of Computer Vision (2023), 1\u201324."},{"key":"e_1_3_2_1_19_1","volume-title":"Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155","author":"Xu Weilin","year":"2017","unstructured":"Weilin Xu, David Evans, and Yanjun Qi. 2017. Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155 (2017)."}],"event":{"name":"CCEAI 2024: 2024 8th International Conference on Control Engineering and Artificial Intelligence","acronym":"CCEAI 2024","location":"Shanghai China"},"container-title":["2024 8th International Conference on Control Engineering and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640824.3640859","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3640824.3640859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T16:47:11Z","timestamp":1756486031000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640824.3640859"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,26]]},"references-count":19,"alternative-id":["10.1145\/3640824.3640859","10.1145\/3640824"],"URL":"https:\/\/doi.org\/10.1145\/3640824.3640859","relation":{},"subject":[],"published":{"date-parts":[[2024,1,26]]},"assertion":[{"value":"2024-03-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}