{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:33:31Z","timestamp":1725676411135},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,29]]},"DOI":"10.1109\/milcom52596.2021.9652915","type":"proceedings-article","created":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T21:06:10Z","timestamp":1640898370000},"page":"993-998","source":"Crossref","is-referenced-by-count":0,"title":["Toward Effective Moving Target Defense Against Adversarial AI"],"prefix":"10.1109","author":[{"given":"Peter","family":"Martin","sequence":"first","affiliation":[]},{"given":"Jian","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Taejin","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Konrad","family":"Vesey","sequence":"additional","affiliation":[]},{"given":"Lloyd","family":"Greenwald","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2019.10.004"},{"key":"ref32","article-title":"On Adaptive Attacks to Adversarial Example Defenses","author":"tramer","year":"2020","journal-title":"arXiv preprint arXiv On Adaptive Attacks to Adversarial Example Defenses"},{"key":"ref31","article-title":"Synthesizing Robust Adversarial Examples","author":"athalye","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref30","article-title":"Towards Deep Learning Models Resistant to Adversarial Attacks","author":"madry","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref36","article-title":"Adversarial Robustness for Face Recognition: How to Introduce Ensemble Diversity among Feature Extractors?","author":"amada","year":"2021","journal-title":"AAAI SafeAI"},{"key":"ref35","article-title":"Similarity of Neural Network Representations Revisited","author":"kornblith","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref34","article-title":"Decision Boundary Analysis of Adversarial Examples","author":"he","year":"2018","journal-title":"International Conference on Learning Representations"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01258-8_10"},{"key":"ref11","article-title":"Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models","author":"brendel","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref12","article-title":"Delving into Transferable Adversarial Examples and Black-box Attacks","author":"liu","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2982955"},{"journal-title":"Keras","year":"2015","author":"chollet","key":"ref14"},{"journal-title":"Armor","year":"2020","key":"ref15"},{"journal-title":"Github","article-title":"Adversarial Robustness Toolbox","year":"2020","key":"ref16"},{"key":"ref17","article-title":"Practical Black-Box Attacks against Machine Learning","author":"papernot","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref18","article-title":"Improving Adversarial Robustness via Promoting Ensemble Diversity","author":"pang","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref19","article-title":"A study of the effect of JPG compression on adversarial images","author":"dziugaite","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9020807"},{"key":"ref27","article-title":"Densely Connected Convolutional Network","author":"huang","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref3","first-page":"226","article-title":"Deep learning for wireless communications","author":"erpek","year":"2020","journal-title":"Development and Analysis of Deep Learning Architectures Springer"},{"key":"ref6","article-title":"Ensemble Methods as a Defense to Adversarial Perturbations Against Deep Neural Networks","author":"strauss","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref29","article-title":"Adam: A Method for Stochastic Optimization","author":"kingma","year":"2014","journal-title":"ArXiv Preprint"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.29007\/3b2l"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3318216.3363338"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32430-8_28"},{"key":"ref2","article-title":"Explaining and Harnessing Adversarial Examples","author":"goodfellow","year":"2014","journal-title":"ArXiv Preprint"},{"key":"ref9","article-title":"Simple Black-box Adversarial Attacks","author":"guo","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref1","article-title":"Towards Evaluating the Robustness of Neural Networks","author":"carlini","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref20","article-title":"ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation","author":"yang","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60239-0_19"},{"key":"ref21","article-title":"Countering Adversarial Images using Input Transformations","author":"guo","year":"2017","journal-title":"ArXiv Preprint"},{"journal-title":"Learning multiple layers of features from tiny images","year":"2009","author":"krizhevsky","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref26","article-title":"Deep Residual Learning for Image Recognition","author":"he","year":"2015","journal-title":"ArXiv Preprint"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2675998"}],"event":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2021,11,29]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2021,12,2]]}},"container-title":["MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9652874\/9652880\/09652915.pdf?arnumber=9652915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T17:00:05Z","timestamp":1652202005000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9652915\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,29]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/milcom52596.2021.9652915","relation":{},"subject":[],"published":{"date-parts":[[2021,11,29]]}}}