{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T05:58:17Z","timestamp":1725343097257},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3591197.3591305","type":"proceedings-article","created":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T14:58:49Z","timestamp":1686322729000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Multi-class Detection for Off The Shelf transfer-based Black Box Attacks"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8921-1562","authenticated-orcid":false,"given":"Niklas","family":"Bunzel","sequence":"first","affiliation":[{"name":"Fraunhofer SIT\/ ATHENE, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0009-0005-3212-7836","authenticated-orcid":false,"given":"Dominic","family":"B\u00f6ringer","sequence":"additional","affiliation":[{"name":"TU-Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"e_1_3_2_1_2_1","volume-title":"End to End Learning for Self-Driving Cars. ArXiv abs\/ 1604.07316","author":"Bojarski Mariusz","year":"2016","unstructured":"Mariusz Bojarski, David\u00a0W. del Testa, Daniel Dworakowski, Bernhard Firner, Beat Flepp, Prasoon Goyal, Lawrence\u00a0D. Jackel, Mathew Monfort, Urs Muller, Jiakai Zhang, Xin Zhang, Jake Zhao, and Karol Zieba. 2016. End to End Learning for Self-Driving Cars. ArXiv abs\/ 1604.07316 (2016)."},{"key":"e_1_3_2_1_3_1","volume-title":"Bringing Big Neural Networks to Self-Driving Cars, Smartphones, and Drones","author":"Bourzac Katherine","year":"2016","unstructured":"Katherine Bourzac. 2016. Bringing Big Neural Networks to Self-Driving Cars, Smartphones, and Drones. IEEE Spectrum (2016)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3033291"},{"key":"e_1_3_2_1_7_1","unstructured":"Alex Clark. 2015. Pillow (PIL Fork) Documentation. https:\/\/buildmedia.readthedocs.org\/media\/pdf\/pillow\/latest\/pillow.pdf"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_9_1","volume-title":"A study of the effect of JPG compression on adversarial images. ArXiv abs\/1608.00853","author":"Dziugaite G.","year":"2016","unstructured":"G. Dziugaite, Zoubin Ghahramani, and Daniel\u00a0M. Roy. 2016. A study of the effect of JPG compression on adversarial images. ArXiv abs\/1608.00853 (2016)."},{"key":"e_1_3_2_1_10_1","volume-title":"Detecting Adversarial Samples from Artifacts. ArXiv abs\/1703.00410","author":"Feinman Reuben","year":"2017","unstructured":"Reuben Feinman, Ryan\u00a0R. Curtin, S. Shintre, and Andrew\u00a0B. Gardner. 2017. Detecting Adversarial Samples from Artifacts. ArXiv abs\/1703.00410 (2017)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2015.2509024"},{"key":"e_1_3_2_1_12_1","volume-title":"Explaining and Harnessing Adversarial Examples. CoRR abs\/1412.6572","author":"Goodfellow I.","year":"2015","unstructured":"I. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. CoRR abs\/1412.6572 (2015)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0020"},{"key":"e_1_3_2_1_14_1","volume-title":"5th International Conference on Learning Representations, ICLR","author":"Hendrycks Dan","year":"2017","unstructured":"Dan Hendrycks and Kevin Gimpel. 2017. Early Methods for Detecting Adversarial Images. In 5th International Conference on Learning Representations, ICLR 2017, Toulon, France, April 24-26, 2017, Workshop Track Proceedings. OpenReview.net. https:\/\/openreview.net\/forum?id=B1dexpDug"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2019.00513"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5772\/5615"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06330-x"},{"key":"e_1_3_2_1_18_1","volume-title":"5th International Conference on Learning Representations, ICLR 2017, Toulon, France, April 24-26, 2017, Workshop Track Proceedings. OpenReview.net. https:\/\/openreview.net\/forum?id=HJGU3Rodl","author":"Kurakin Alexey","year":"2017","unstructured":"Alexey Kurakin, Ian\u00a0J. Goodfellow, and Samy Bengio. 2017. Adversarial examples in the physical world. In 5th International Conference on Learning Representations, ICLR 2017, Toulon, France, April 24-26, 2017, Workshop Track Proceedings. OpenReview.net. https:\/\/openreview.net\/forum?id=HJGU3Rodl"},{"key":"e_1_3_2_1_19_1","volume-title":"6th International Conference on Learning Representations, ICLR","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings. OpenReview.net. https:\/\/openreview.net\/forum?id=rJzIBfZAb"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"e_1_3_2_1_22_1","volume-title":"Adversarial Robustness Toolbox v1.2.0. CoRR","author":"Nicolae Maria-Irina","year":"1807","unstructured":"Maria-Irina Nicolae, Mathieu Sinn, Minh\u00a0Ngoc Tran, Beat Buesser, Ambrish Rawat, Martin Wistuba, Valentina Zantedeschi, Nathalie Baracaldo, Bryant Chen, Heiko Ludwig, Ian Molloy, and Ben Edwards. 2018. Adversarial Robustness Toolbox v1.2.0. CoRR 1807.01069 (2018). https:\/\/arxiv.org\/pdf\/1807.01069"},{"key":"e_1_3_2_1_23_1","volume-title":"The Limitations of Deep Learning in Adversarial Settings. 2016 IEEE European Symposium on Security and Privacy (EuroS&P)","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot, P. Mcdaniel, S. Jha, Matt Fredrikson, Z.\u00a0B. Celik, and A. Swami. 2016. The Limitations of Deep Learning in Adversarial Settings. 2016 IEEE European Symposium on Security and Privacy (EuroS&P) (2016), 372\u2013387."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178304"},{"key":"e_1_3_2_1_25_1","unstructured":"Kevin Roth Yannic Kilcher and Thomas Hofmann. 2019. The Odds are Odd: A Statistical Test for Detecting Adversarial Examples. In ICML."},{"key":"e_1_3_2_1_26_1","unstructured":"Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna D. Erhan I. Goodfellow and R. Fergus. 2014. Intriguing properties of neural networks. CoRR abs\/ 1312.6199 (2014)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/833"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"e_1_3_2_1_29_1","volume-title":"8th International Conference on Learning Representations, ICLR 2020","author":"Xiao Chang","year":"2020","unstructured":"Chang Xiao, Peilin Zhong, and Changxi Zheng. 2020. Enhancing Adversarial Defense by k-Winners-Take-All. In 8th International Conference on Learning Representations, ICLR 2020, Addis Ababa, Ethiopia, April 26-30, 2020. OpenReview.net. https:\/\/openreview.net\/forum?id=Skgvy64tvr"},{"key":"e_1_3_2_1_30_1","volume-title":"Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks. ArXiv abs\/1704.01155","author":"Xu Weilin","year":"2018","unstructured":"Weilin Xu, David Evans, and Yanjun Qi. 2018. Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks. ArXiv abs\/1704.01155 (2018)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2631434"}],"event":{"name":"ASIA CCS '23: ACM Asia Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 Secure and Trustworthy Deep Learning Systems Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3591197.3591305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T10:34:41Z","timestamp":1720607681000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3591197.3591305"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":31,"alternative-id":["10.1145\/3591197.3591305","10.1145\/3591197"],"URL":"https:\/\/doi.org\/10.1145\/3591197.3591305","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}