{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:16:59Z","timestamp":1761621419080,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.23919\/eusipco.2018.8553164","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T00:36:41Z","timestamp":1543883801000},"page":"947-951","source":"Crossref","is-referenced-by-count":23,"title":["Detecting Adversarial Examples - a Lesson from Multimedia Security"],"prefix":"10.23919","author":[{"given":"Pascal","family":"Schottle","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Schlogl","sequence":"additional","affiliation":[]},{"given":"Cecilia","family":"Pasquini","sequence":"additional","affiliation":[]},{"given":"Rainer","family":"Bohme","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2008214"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-0757-7","author":"sencar","year":"2013","journal-title":"Digital Image Forensics There is More to a Picture than Meets the Eye"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77370-2_22"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903"},{"key":"ref15","article-title":"Forgotten siblings: Unifying attacks on machine learning and digital watermarking","author":"quiring","year":"2018","journal-title":"IEEE Symposium on Security and Privacy"},{"journal-title":"Explaining and Harnessing Adversarial Examples","year":"2014","author":"goodfellow","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2018.23198","article-title":"Feature squeezing: Detecting adversarial examples in deep neural networks","author":"xu","year":"2018","journal-title":"Symposium on Network and Distributed System Security"},{"journal-title":"The space of transferable adversarial examples","year":"2017","author":"tramer","key":"ref18"},{"key":"ref19","first-page":"86","article-title":"Univer-sal adversarial perturbations","author":"moosavi-dezfooli","year":"2017","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition IEEE"},{"journal-title":"Transferability in machine learning from phenomena to black-box attacks using adversarial samples","year":"2016","author":"papernot","key":"ref4"},{"key":"ref3","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref6","first-page":"1807","article-title":"Poisoning attacks against support vector machines","author":"biggio","year":"2012","journal-title":"The 29th International Conference on Machine Learning"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref7","first-page":"62","article-title":"Adversarial examples for malware detection","author":"grosse","year":"2017","journal-title":"European symposium on research in computer security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639361"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2718494"},{"key":"ref9","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2018","journal-title":"International Conference on Learning Representations"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1117\/12.766820","article-title":"Revisiting weighted stego-image steganaly-sis","volume":"6819","author":"ker","year":"2008","journal-title":"Security Forensics Steganography and Watermarking of Multimedia Contents X"},{"key":"ref22","article-title":"MNIST handwritten digit database","volume":"2","author":"lecun","year":"2010","journal-title":"AT&T Labs"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2174231"},{"key":"ref23","article-title":"SoK: Security and privacy in machine learning","author":"papernot","year":"2018","journal-title":"IEEE Symposium on Security and Privacy"}],"event":{"name":"2018 26th European Signal Processing Conference (EUSIPCO)","start":{"date-parts":[[2018,9,3]]},"location":"Rome","end":{"date-parts":[[2018,9,7]]}},"container-title":["2018 26th European Signal Processing Conference (EUSIPCO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8537458\/8552938\/08553164.pdf?arnumber=8553164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T04:27:07Z","timestamp":1643257627000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8553164\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.23919\/eusipco.2018.8553164","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}