{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T21:28:27Z","timestamp":1760909307868,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T00:00:00Z","timestamp":1735948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,1,4]]},"DOI":"10.1145\/3700838.3703675","type":"proceedings-article","created":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T12:58:12Z","timestamp":1735822692000},"page":"420-425","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Adversarial Samples using Kernel Density Feature Extractor in Medical Image"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-0290-0977","authenticated-orcid":false,"given":"Suman","family":"Das","sequence":"first","affiliation":[{"name":"Computer Science and Engineer, NIT Sikkim, Ravangla, Sikkim, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9644-8982","authenticated-orcid":false,"given":"Pankaj Kumar","family":"Keserwani","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, NIT Sikkim, Ravangla, Sikkim, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4707-0693","authenticated-orcid":false,"given":"Mahesh Chandra","family":"Govil","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, NIT Sikkim, Ravangla, Sikkim, India"}]}],"member":"320","published-online":{"date-parts":[[2025,1,4]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","unstructured":"Erikson Aguiar Karem Marcomini Felipe Quirino Marco Gutierrez Caetano Jr and Agma Traina. 2022. Evaluation of the impact of physical adversarial attacks on deep learning models for classifying covid cases. 122. 10.1117\/12.2611199","DOI":"10.1117\/12.2611199"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"Ruoxi Chen Jinyin Chen Haibin Zheng Qi Xuan Zhaoyan Ming Wenrong Jiang and Chen Cui. 2022. Salient feature extractor for adversarial defense on deep neural networks. Information Sciences 600 (2022) 118\u2013143.","DOI":"10.1016\/j.ins.2022.03.056"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Yashar Deldjoo Tommaso\u00a0Di Noia and Felice\u00a0Antonio Merra. 2021. A survey on adversarial recommender systems: from attack\/defense strategies to generative adversarial networks. ACM Computing Surveys (CSUR) 54 2 (2021) 1\u201338.","DOI":"10.1145\/3439729"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9052913"},{"key":"e_1_3_3_2_6_2","unstructured":"Reuben Feinman Ryan\u00a0R. Curtin Saurabh Shintre and Andrew\u00a0B. Gardner. 2017. Detecting Adversarial Samples from Artifacts. ArXiv abs\/1703.00410 (2017). https:\/\/api.semanticscholar.org\/CorpusID:5157373"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Samuel\u00a0G Finlayson John\u00a0D Bowers Joichi Ito Jonathan\u00a0L Zittrain Andrew\u00a0L Beam and Isaac\u00a0S Kohane. 2019. Adversarial attacks on medical machine learning. Science 363 6433 (March 2019) 1287\u20131289.","DOI":"10.1126\/science.aaw4399"},{"key":"e_1_3_3_2_8_2","unstructured":"Ian\u00a0J. Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. arxiv:https:\/\/arXiv.org\/abs\/1412.6572\u00a0[stat.ML]"},{"key":"e_1_3_3_2_9_2","unstructured":"Kathrin Grosse Praveen Manoharan Nicolas Papernot Michael Backes and Patrick McDaniel. 2017. On the (Statistical) Detection of Adversarial Examples. ArXiv abs\/1702.06280 (2017). https:\/\/api.semanticscholar.org\/CorpusID:16863734"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Hokuto Hirano Akinori Minagi and Kazuhiro Takemoto. 2021. Universal adversarial attacks on deep neural networks for medical image classification. BMC medical imaging 21 (2021) 1\u201313.","DOI":"10.1186\/s12880-020-00530-y"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9206959"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.615"},{"key":"e_1_3_3_2_13_2","first-page":"7","volume-title":"28th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, ESANN 2020, Bruges, Belgium, October 2-4, 2020","author":"Lust Julia","year":"2020","unstructured":"Julia Lust and Alexandru\u00a0Paul Condurache. 2020. GraN: An Efficient Gradient-Norm Based Detector for Adversarial and Misclassified Examples. In 28th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, ESANN 2020, Bruges, Belgium, October 2-4, 2020. 7\u201312. https:\/\/www.esann.org\/sites\/default\/files\/proceedings\/2020\/ES2020-159.pdf"},{"key":"e_1_3_3_2_14_2","volume-title":"International Conference on Learning Representations","author":"Ma Xingjun","year":"2018","unstructured":"Xingjun Ma, Bo Li, Yisen Wang, Sarah\u00a0M. Erfani, Sudanthi Wijewickrema, Grant Schoenebeck, Michael\u00a0E. Houle, Dawn Song, and James Bailey. 2018. Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=B1gJ1L2aW"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","unstructured":"Xingjun Ma Yuhao Niu Lin Gu Yisen Wang Yitian Zhao James Bailey and Feng Lu. 2021. Understanding adversarial attacks on deep learning based medical image analysis systems. Pattern Recognition 110 (2021) 107332. 10.1016\/j.patcog.2020.107332","DOI":"10.1016\/j.patcog.2020.107332"},{"key":"e_1_3_3_2_16_2","unstructured":"Jiawei Mao Xuesong Yin Yuanqi Chang and Qi Huang. 2021. Weakly-supervised Generative Adversarial Networks for medical image classification. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2111.14605 (2021)."},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","unstructured":"Biprodip Pal Debashis Gupta Md. Rashed-Al-Mahfuz Salem\u00a0A. Alyami and Mohammad\u00a0Ali Moni. 2021. Vulnerability in Deep Transfer Learning Models to Adversarial Fast Gradient Sign Attack for COVID-19 Prediction from Chest Radiography Images. Applied Sciences 11 9 (2021). 10.3390\/app11094233","DOI":"10.3390\/app11094233"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00928-1_56"},{"key":"e_1_3_3_2_19_2","unstructured":"Stefanos Pertigkiozoglou and Petros Maragos. 2018. Detecting Adversarial Examples in Convolutional Neural Networks. ArXiv abs\/1812.03303 (2018). https:\/\/api.semanticscholar.org\/CorpusID:54461830"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","unstructured":"Murali\u00a0Krishna Puttagunta S. Ravi and C Nelson Kennedy\u00a0Babu. 2023. Adversarial examples: attacks and defences on medical deep learning systems. Multimedia Tools Appl. 82 22 (2023) 33773\u201333809. 10.1007\/s11042-023-14702-9","DOI":"10.1007\/s11042-023-14702-9"},{"key":"e_1_3_3_2_21_2","volume-title":"Advances in Neural Information Processing Systems","author":"Shafahi Ali","year":"2019","unstructured":"Ali Shafahi, Mahyar Najibi, Mohammad\u00a0Amin Ghiasi, Zheng Xu, John Dickerson, Christoph Studer, Larry\u00a0S Davis, Gavin Taylor, and Tom Goldstein. 2019. Adversarial training for free!. In Advances in Neural Information Processing Systems , H.\u00a0Wallach, H.\u00a0Larochelle, A.\u00a0Beygelzimer, F.\u00a0d'Alch\u00e9-Buc, E.\u00a0Fox, and R.\u00a0Garnett (Eds.), Vol.\u00a032. Curran Associates, Inc.https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2019\/file\/7503cfacd12053d309b6bed5c89de212-Paper.pdf"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","unstructured":"Min-Jen Tsai Ping-Yi Lin and Ming-En Lee. 2023. Adversarial Attacks on Medical Image Classification. Cancers 15 17 (2023). 10.3390\/cancers15174228","DOI":"10.3390\/cancers15174228"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","unstructured":"Shigeng Zhang Shuxin Chen Xuan Liu Chengyao Hua Weiping Wang Kai Chen Jian Zhang and Jianxin Wang. 2022. Detecting Adversarial Samples for Deep Learning Models: A Comparative Study. IEEE Transactions on Network Science and Engineering 9 1 (2022) 231\u2013244. 10.1109\/TNSE.2021.3057071","DOI":"10.1109\/TNSE.2021.3057071"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437529"}],"event":{"name":"ICDCN 2025: 26th International Conference on Distributed Computing and Networking","acronym":"ICDCN 2025","location":"Hyderabad India"},"container-title":["Proceedings of the 26th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700838.3703675","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3700838.3703675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:22Z","timestamp":1750295422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700838.3703675"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,4]]},"references-count":23,"alternative-id":["10.1145\/3700838.3703675","10.1145\/3700838"],"URL":"https:\/\/doi.org\/10.1145\/3700838.3703675","relation":{},"subject":[],"published":{"date-parts":[[2025,1,4]]},"assertion":[{"value":"2025-01-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}