{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T05:43:03Z","timestamp":1768714983421,"version":"3.49.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.23919\/date.2019.8715141","type":"proceedings-article","created":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T17:29:07Z","timestamp":1558027747000},"page":"902-907","source":"Crossref","is-referenced-by-count":28,"title":["FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning"],"prefix":"10.23919","author":[{"given":"Faiq","family":"Khalid","sequence":"first","affiliation":[]},{"given":"Muhammad Abdullah","family":"Hanif","sequence":"additional","affiliation":[]},{"given":"Semeen","family":"Rehman","sequence":"additional","affiliation":[]},{"given":"Junaid","family":"Qadir","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Shafique","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref32","first-page":"2574","article-title":"Deepfbol: a simple and accurate method to fool deep neural networks","author":"moosavi-dezfooli","year":"2016","journal-title":"CVPR"},{"key":"ref31","article-title":"One pixel attack for fooling deep neural networks","author":"su","year":"2017"},{"key":"ref30","article-title":"Adversarial examples in the physical world","author":"kurakin","year":"2016"},{"key":"ref36","article-title":"Ensemble adversarial training: Attacks and defenses","author":"tramer","year":"2017"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"ref10","article-title":"Feature squeezing: Detecting adversarial examples in deep neural networks","author":"xu","year":"2017"},{"key":"ref11","article-title":"CleverHans v2. 0.0: an adversarial machine learning library","author":"papernot","year":"2016"},{"key":"ref12","article-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models","author":"brendel","year":"2017"},{"key":"ref13","article-title":"PoTrojan: powerful neural-level Trojan designs in deep learning models","author":"zou","year":"2018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref16","first-page":"2628","article-title":"Data poisoning attacks on multi-task relationship learning","author":"zhao","year":"2018","journal-title":"AAAI"},{"key":"ref17","article-title":"Data poisoning attacks against online learning","author":"wang","year":"2018"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"ref19","article-title":"Poison frogs! targeted clean-label poisoning attacks on neural networks","author":"shafahi","year":"2018"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.58"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727230"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3134599"},{"key":"ref6","author":"j","year":"2018","journal-title":"Adversarial machine learning"},{"key":"ref29","first-page":"20","article-title":"Explaining and harnessing adversarial examples","volume":"1050","author":"goodfellow","year":"2015","journal-title":"Stat"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2200\/S00861ED1V01Y201806AIM039"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"ref7","first-page":"827","article-title":"An overview of next-generation architectures for machine learning: Roadmap, opportunities and challenges in the IoT era","author":"shaflque","year":"2018","journal-title":"DATE IEEE"},{"key":"ref2","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref20","article-title":"Hu-fii: Hardware and software collaborative attack framework against neural networks","author":"li","year":"2018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176321"},{"key":"ref21","first-page":"227","article-title":"SIN 2: Stealth infection on neural network&#x2014;a low-cost agile neural trojan attack methodology","author":"liu","year":"2018","journal-title":"HOST IEEE"},{"key":"ref24","article-title":"Places205-VGGNet Models for scene recognition","author":"wang","year":"2015"},{"key":"ref23","article-title":"Robust pre-processing: A robust defense method against adversary attack","author":"rakin","year":"2018"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2011.6033395"}],"event":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","location":"Florence, Italy","start":{"date-parts":[[2019,3,25]]},"end":{"date-parts":[[2019,3,29]]}},"container-title":["2019 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8704855\/8714721\/08715141.pdf?arnumber=8715141","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T19:50:16Z","timestamp":1559591416000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8715141\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":36,"URL":"https:\/\/doi.org\/10.23919\/date.2019.8715141","relation":{},"subject":[],"published":{"date-parts":[[2019,3]]}}}