{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:45:16Z","timestamp":1740102316914,"version":"3.37.3"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T00:00:00Z","timestamp":1693785600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T00:00:00Z","timestamp":1693785600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004955","name":"Austrian Research Promotion Agency (FFG)","doi-asserted-by":"publisher","award":["880598"],"award-info":[{"award-number":["880598"]}],"id":[{"id":"10.13039\/501100004955","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,4]]},"DOI":"10.23919\/eusipco58844.2023.10290092","type":"proceedings-article","created":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T17:55:44Z","timestamp":1698861344000},"page":"1365-1369","source":"Crossref","is-referenced-by-count":1,"title":["Test-Time Adversarial Detection and Robustness for Localizing Humans Using Ultra Wide Band Channel Impulse Responses"],"prefix":"10.23919","author":[{"given":"Abhiram","family":"Kolli","sequence":"first","affiliation":[{"name":"Institute of Computer Graphics and Vision, Graz University of Technology,Austria"}]},{"given":"Muhammad Jehanzeb","family":"Mirza","sequence":"additional","affiliation":[{"name":"Institute of Computer Graphics and Vision, Graz University of Technology,Austria"}]},{"given":"Horst","family":"Possegger","sequence":"additional","affiliation":[{"name":"Institute of Computer Graphics and Vision, Graz University of Technology,Austria"}]},{"given":"Horst","family":"Bischof","sequence":"additional","affiliation":[{"name":"Institute of Computer Graphics and Vision, Graz University of Technology,Austria"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467831"},{"key":"ref2","first-page":"1343","article-title":"Ghost peak: Practical distance reduction attacks against hrp uwb ranging","volume-title":"USENIX Security Symposium","author":"Leu"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528547"},{"key":"ref4","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv preprint"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/591"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref7","first-page":"8588","article-title":"A closer look at accuracy vs. robustness","volume":"33","author":"Yang","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref8","article-title":"Evaluating the adversarial robustness of adaptive test-time defenses","author":"Croce","year":"2022","journal-title":"arXiv preprint"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533949"},{"key":"ref10","article-title":"Fighting gradients with gradients: Dynamic defenses against adversarial attacks","author":"Wang","year":"2021","journal-title":"arXiv preprint"},{"key":"ref11","article-title":"Towards robust neural networks via close-loop control","author":"Chen","year":"2021","journal-title":"arXiv preprint"},{"key":"ref12","first-page":"14 925","article-title":"Stable neural ode with lyapunov-stable equilibrium points for defending against adversarial attacks","volume":"34","author":"Kang","year":"2021","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref13","article-title":"Attacking adversarial attacks as a defense","author":"Wu","year":"2021","journal-title":"arXiv preprint"},{"key":"ref14","article-title":"Pixeldefend: Leveraging generative models to understand and defend against adversarial examples","author":"Song","year":"2017","journal-title":"arXiv preprint"},{"key":"ref15","article-title":"Diffusion models for adversarial purification","author":"Nie","year":"2022","journal-title":"arXiv preprint"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00070"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126251"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i6.20545"},{"key":"ref19","article-title":"Explaining and har-nessing adversarial examples","volume":"abs\/1412.6572","author":"Goodfellow","year":"2014","journal-title":"Computing Research Repository"},{"key":"ref20","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv preprint"},{"key":"ref21","article-title":"Adversarial logit pairing","author":"Kannan","year":"2018","journal-title":"arXiv preprint"},{"key":"ref22","article-title":"Uncovering the limits of adversarial training against norm-bounded adversarial examples","author":"Gowal","year":"2020","journal-title":"arXiv preprint"},{"key":"ref23","article-title":"Adversarial training for free!","volume":"32","author":"Shafahi","year":"2019","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00034"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00033"},{"article-title":"Everything you always wanted to know about uwb radar\u2026: a practical introduction to the ultra wideband technology","volume-title":"Online Symposium for Electronics Engineers","author":"Staderini","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2019.12.012"}],"event":{"name":"2023 31st European Signal Processing Conference (EUSIPCO)","start":{"date-parts":[[2023,9,4]]},"location":"Helsinki, Finland","end":{"date-parts":[[2023,9,8]]}},"container-title":["2023 31st European Signal Processing Conference (EUSIPCO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10289698\/10289713\/10290092.pdf?arnumber=10290092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T09:57:09Z","timestamp":1710410229000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10290092\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,4]]},"references-count":27,"URL":"https:\/\/doi.org\/10.23919\/eusipco58844.2023.10290092","relation":{},"subject":[],"published":{"date-parts":[[2023,9,4]]}}}