{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:27:29Z","timestamp":1740101249149,"version":"3.37.3"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T00:00:00Z","timestamp":1670284800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T00:00:00Z","timestamp":1670284800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,6]]},"DOI":"10.1109\/cdc51059.2022.9992383","type":"proceedings-article","created":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T19:26:56Z","timestamp":1673378816000},"page":"6118-6125","source":"Crossref","is-referenced-by-count":1,"title":["Local Intrinsic Dimensionality Signals Adversarial Perturbations"],"prefix":"10.1109","author":[{"given":"Sandamal","family":"Weerasinghe","sequence":"first","affiliation":[{"name":"University of Melbourne,School of Computing and Information Systems,Australia"}]},{"given":"Tamas","family":"Abraham","sequence":"additional","affiliation":[{"name":"Defence Science and Technology Group,Australia"}]},{"given":"Tansu","family":"Alpcan","sequence":"additional","affiliation":[{"name":"University of Melbourne,Department of Electrical and Electronic Engineer-ing,Australia"}]},{"given":"Sarah M.","family":"Erfani","sequence":"additional","affiliation":[{"name":"University of Melbourne,School of Computing and Information Systems,Australia"}]},{"given":"Christopher","family":"Leckie","sequence":"additional","affiliation":[{"name":"University of Melbourne,School of Computing and Information Systems,Australia"}]},{"given":"Benjamin I. P.","family":"Rubinstein","sequence":"additional","affiliation":[{"name":"University of Melbourne,School of Computing and Information Systems,Australia"}]}],"member":"263","reference":[{"key":"ref1","first-page":"5286","article-title":"Provable defenses against adversarial examples via the convex outer adversarial polytope","volume-title":"International Conference on Machine Learning","author":"Wong"},{"key":"ref2","first-page":"1310","article-title":"Certified adversarial robustness via randomized smoothing","volume-title":"International Conference on Machine Learning","author":"Cohen"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00044"},{"key":"ref4","first-page":"11278","article-title":"Attacks which do not kill training make adversarial learning stronger","volume-title":"37th International Conference on Machine Learning","author":"Zhang"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"article-title":"Improving adversarial robustness requires revisiting misclassified examples","volume-title":"International Conference on Learning Representations","author":"Wang","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68474-1_5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02224-2_14"},{"key":"ref9","first-page":"3355","article-title":"Dimensionality-driven learning with noisy labels","volume-title":"35th International Conference on Machine Learning","volume":"80","author":"Ma"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/437"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2012.94"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68474-1_6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783405"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975673.21"},{"article-title":"Characterizing adversarial subspaces using local intrinsic dimensionality","volume-title":"6th International Conference on Learning Representations, ICLR 2018","author":"Ma","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3058771"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/437"},{"key":"ref18","first-page":"1","article-title":"Quality evaluation of gans using cross local intrinsic dimensionality","author":"Barua","year":"2019","journal-title":"CoRR"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3023274"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1214\/11-STS370"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/0470013850"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-012-5294-7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/509907.510013"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2013.139"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68474-1_5"},{"article-title":"Explaining and harnessing adversarial examples","volume-title":"International Conference on Learning Representations","author":"Goodfellow","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref28","first-page":"6640","article-title":"Adversarial robustness against the union of multiple perturbation models","volume-title":"International Conference on Machine Learning","author":"Maini"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1201\/9781315140919"},{"key":"ref30","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009","journal-title":"Tech. Rep."}],"event":{"name":"2022 IEEE 61st Conference on Decision and Control (CDC)","start":{"date-parts":[[2022,12,6]]},"location":"Cancun, Mexico","end":{"date-parts":[[2022,12,9]]}},"container-title":["2022 IEEE 61st Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9992315\/9992317\/09992383.pdf?arnumber=9992383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T01:29:14Z","timestamp":1710379754000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9992383\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/cdc51059.2022.9992383","relation":{},"subject":[],"published":{"date-parts":[[2022,12,6]]}}}