{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T05:40:20Z","timestamp":1732686020194,"version":"3.28.2"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,1]]},"DOI":"10.1109\/qrs-c63300.2024.00043","type":"proceedings-article","created":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:28:50Z","timestamp":1730222930000},"page":"269-278","source":"Crossref","is-referenced-by-count":0,"title":["Generating Adversarial Examples Using Parameter-Free Penalty Method"],"prefix":"10.1109","author":[{"given":"Jiyuan","family":"Sun","sequence":"first","affiliation":[{"name":"Graduate School of Information Science and Electrical Engineering, Kyushu University,Fukuoka,Japan"}]},{"given":"Haibo","family":"Yu","sequence":"additional","affiliation":[{"name":"Kyushu Sangyo University,Faculty of Science and Engineering,Department of Information Science,Fukuoka,Japan"}]},{"given":"Jianjun","family":"Zhao","sequence":"additional","affiliation":[{"name":"Kyushu University,Faculty of Information Science and Electrical Engineering,Fukuoka,Japan"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Intriguing properties of neural networks","volume-title":"arXiv preprint","author":"Szegedy","year":"2013"},{"key":"ref2","article-title":"Ex-plaining and harnessing adversarial examples","volume":"abs\/1412.6572","author":"Goodfellow","year":"2014","journal-title":"CoRR"},{"key":"ref3","article-title":"Adversarial examples are not bugs, they are features","volume":"32","author":"Ilyas","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11302"},{"key":"ref6","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv preprint"},{"key":"ref7","article-title":"Ad-versarial machine learning at scale","author":"Kurakin","year":"2016","journal-title":"arXiv preprint"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref9","first-page":"4322","article-title":"Decoupling direction and norm for efficient gradient-based 12 adversarial attacks and defenses","volume-title":"Proceedings of the IEEE\/CVF Con-ference on Computer Vision and Pattern Recognition","author":"Rony","year":"2019"},{"key":"ref10","first-page":"20052","article-title":"Fast minimum-norm adversarial attacks through adaptive norm constraints","volume":"34","author":"Pintor","year":"2021","journal-title":"Advances in Neural Information Pro-cessing Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref12","first-page":"2196","article-title":"Minimally distorted adversarial examples with a fast adaptive boundary attack","volume-title":"In-ternational Conference on Machine Learning","author":"Croce"},{"volume-title":"Nonlin-ear programming: theory and algorithms","year":"2013","author":"Bazaraa","key":"ref13"},{"issue":"8","key":"ref14","first-page":"2","article-title":"Neural net-works for machine learning lecture 6a overview of mini-batch gradient descent","volume":"14","author":"Hinton","year":"2012","journal-title":"Cited on"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974997"},{"journal-title":"Learning multiple layers of features from tiny images","year":"2009","author":"Krizhevsky","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref18","article-title":"Robustbench: a standardized adversarial robustness benchmark","volume-title":"Thirty-fifth Conference on Neural Information Processing Systems Datasets and Benchmarks Track","author":"Croce","year":"2021"},{"key":"ref19","article-title":"Fast is better than free: Revisiting adversarial training","author":"Wong","year":"2020","journal-title":"arXiv preprint"},{"journal-title":"Better diffusion models further improve adversarial training","year":"2023","author":"Wang","key":"ref20"},{"key":"ref21","first-page":"3533","article-title":"Do adversarially robust imagenet models transfer better?","volume":"33","author":"Salman","year":"2020","journal-title":"Advances in Neural Information Pro-cessing Systems"},{"key":"ref22","article-title":"Torchattacks: A pytorch repository for adver-sarial attacks","author":"Kim","year":"2020","journal-title":"arXiv preprint"},{"journal-title":"Adversarial Library","author":"Rony","key":"ref23"}],"event":{"name":"2024 IEEE 24th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","start":{"date-parts":[[2024,7,1]]},"location":"Cambridge, United Kingdom","end":{"date-parts":[[2024,7,5]]}},"container-title":["2024 IEEE 24th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10726889\/10726891\/10726964.pdf?arnumber=10726964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T03:18:48Z","timestamp":1732677528000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10726964\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,1]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/qrs-c63300.2024.00043","relation":{},"subject":[],"published":{"date-parts":[[2024,7,1]]}}}