{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:34:18Z","timestamp":1730266458386,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,18]]},"DOI":"10.1109\/ijcnn52387.2021.9534346","type":"proceedings-article","created":{"date-parts":[[2021,9,21]],"date-time":"2021-09-21T16:40:52Z","timestamp":1632242452000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Random Projections for Improved Adversarial Robustness"],"prefix":"10.1109","author":[{"given":"Ginevra","family":"Carbone","sequence":"first","affiliation":[]},{"given":"Guido","family":"Sanguinetti","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Bortolussi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"volume":"47","journal-title":"High-Dimensional Probability An Introduction with Applications in Data Science","year":"2018","author":"vershynin","key":"ref38"},{"journal-title":"ArXiv Preprint","article-title":"Simple and scalable predictive uncertainty estimation using deep ensembles","year":"2016","author":"lakshminarayanan","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2019.12.012"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00191"},{"journal-title":"ArXiv Preprint","article-title":"Feature squeezing: Detecting adversarial examples in deep neural networks","year":"2017","author":"xu","key":"ref30"},{"journal-title":"Robustness of bayesian neural networks to gradient-based attacks","year":"2020","author":"carbone","key":"ref37"},{"journal-title":"ArXiv Preprint","article-title":"Sufficient conditions for idealised models to have no adversarial examples: a theoretical and empirical study with bayesian neural networks","year":"2018","author":"gal","key":"ref36"},{"journal-title":"ArXiv Preprint","article-title":"Bayesian adversarial spheres: Bayesian inference and adversarial examples in a noiseless setting","year":"2018","author":"bekasov","key":"ref35"},{"key":"ref34","first-page":"1050","article-title":"Dropout as a bayesian approximation: Representing model uncertainty in deep learning","author":"gal","year":"2016","journal-title":"International Conference on Machine Learning"},{"volume":"abs 1811 525","journal-title":"On the geometry of adversarial examples","year":"2018","author":"khoury","key":"ref10"},{"journal-title":"Technical Report","article-title":"An elementary proof of the johnson-lindenstrauss lemma","year":"1999","author":"dasgupta","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1998.682302"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(92)90242-F"},{"journal-title":"Improved robustness to adversarial examples using lipschitz regularization of the loss","year":"2019","author":"finlay","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1017\/S0305004100030401"},{"journal-title":"MNIST Handwritten Digit Database","year":"2010","author":"lecun","key":"ref16"},{"journal-title":"Cifar-10 (canadian institute for advanced research)","year":"0","author":"krizhevsky","key":"ref17"},{"key":"ref18","first-page":"2574","article-title":"Deepfool: a simple and accurate method to fool deep neural networks","author":"moosavi-dezfooli","year":"2016","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"journal-title":"Towards Evaluating the Robustness of Neural Networks","year":"2016","author":"carlini","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_23"},{"journal-title":"Robust physical-world attacks on machine learning models","year":"2017","author":"evtimov","key":"ref4"},{"journal-title":"ArXiv Preprint","article-title":"Mitigating adversarial effects through randomization","year":"2017","author":"xie","key":"ref27"},{"journal-title":"On evaluating adversarial robustness","year":"2019","author":"carlini","key":"ref3"},{"journal-title":"International Conference on Learning Representations","article-title":"Explaining and harnessing adversarial examples","year":"2015","author":"goodfellow","key":"ref6"},{"journal-title":"ArXiv Preprint","article-title":"Stochastic activation pruning for robust adversarial defense","year":"2018","author":"dhillon","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-017-5663-3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374452"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1214\/12-AOS994"},{"journal-title":"Adversarial examples in the physical world","year":"2016","author":"kurakin","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1031596100"},{"journal-title":"Intriguing properties of neural networks","year":"2014","author":"szegedy","key":"ref1"},{"journal-title":"TensorFlow Large-Scale Machine Learning on Heterogeneous Systems","year":"2015","author":"abadi","key":"ref20"},{"journal-title":"High Dimensional Spaces Deep Learning and Adversarial Examples","year":"2018","author":"dube","key":"ref22"},{"volume":"abs 1807 1069","journal-title":"Adversarial robustness toolbox v0 2 2","year":"2018","author":"nicolae","key":"ref21"},{"journal-title":"ArXiv Preprint","article-title":"Robust neural networks using randomized adversarial training","year":"2019","author":"araujo","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00068"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-014-5466-8"},{"journal-title":"ArXiv Preprint","article-title":"Random projections for adversarial attack detection","year":"2020","author":"drenkow","key":"ref25"}],"event":{"name":"2021 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2021,7,18]]},"location":"Shenzhen, China","end":{"date-parts":[[2021,7,22]]}},"container-title":["2021 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9533266\/9533267\/09534346.pdf?arnumber=9534346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:46:16Z","timestamp":1652183176000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9534346\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,18]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/ijcnn52387.2021.9534346","relation":{},"subject":[],"published":{"date-parts":[[2021,7,18]]}}}