{"id":"https://openalex.org/W3097455612","doi":"https://doi.org/10.1109/tcad.2020.3033746","title":"Attack-Aware Detection and Defense to Resist Adversarial Examples","display_name":"Attack-Aware Detection and Defense to Resist Adversarial Examples","publication_year":2020,"publication_date":"2020-10-26","ids":{"openalex":"https://openalex.org/W3097455612","doi":"https://doi.org/10.1109/tcad.2020.3033746","mag":"3097455612"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2020.3033746","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101460603","display_name":"Wei Jiang","orcid":"https://orcid.org/0000-0001-6181-3900"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Jiang","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027441055","display_name":"Zhiyuan He","orcid":"https://orcid.org/0000-0002-8919-9997"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiyuan He","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082893987","display_name":"Jinyu Zhan","orcid":"https://orcid.org/0000-0002-0214-7124"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinyu Zhan","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080954955","display_name":"Pan Wei-jia","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weijia Pan","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.418,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.884152,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":92,"max":93},"biblio":{"volume":"40","issue":"10","first_page":"2194","last_page":"2198"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9923,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9684,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/grading","display_name":"Grading (engineering)","score":0.5407645}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.97321904},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.69727683},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.62880325},{"id":"https://openalex.org/C2777286243","wikidata":"https://www.wikidata.org/wiki/Q5591926","display_name":"Grading (engineering)","level":2,"score":0.5407645},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39594045},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17609197},{"id":"https://openalex.org/C147176958","wikidata":"https://www.wikidata.org/wiki/Q77590","display_name":"Civil engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2020.3033746","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":27,"referenced_works":["https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W2180612164","https://openalex.org/W2243397390","https://openalex.org/W2543927648","https://openalex.org/W2619203976","https://openalex.org/W2754049786","https://openalex.org/W2765233338","https://openalex.org/W2765384636","https://openalex.org/W2768346313","https://openalex.org/W2786118190","https://openalex.org/W2902543210","https://openalex.org/W2962759300","https://openalex.org/W2963001136","https://openalex.org/W2963207607","https://openalex.org/W2963249138","https://openalex.org/W2963389226","https://openalex.org/W2963542245","https://openalex.org/W2963744840","https://openalex.org/W2963857521","https://openalex.org/W2963920068","https://openalex.org/W2964082701","https://openalex.org/W2964153729","https://openalex.org/W2964253222","https://openalex.org/W3013779627","https://openalex.org/W3103557498","https://openalex.org/W4293846201"],"related_works":["https://openalex.org/W4304891817","https://openalex.org/W4295850094","https://openalex.org/W4280605518","https://openalex.org/W4205705013","https://openalex.org/W3209552014","https://openalex.org/W3198184493","https://openalex.org/W3156291593","https://openalex.org/W2903917280","https://openalex.org/W2901368259","https://openalex.org/W1858327386"],"abstract_inverted_index":{"This":[0],"article":[1],"approaches":[2],"to":[3,11,25,48,67,83],"design":[4],"an":[5],"attack-aware":[6],"detection":[7],"and":[8,32,35,64,80,106],"defense":[9,93,97,110],"framework":[10],"resist":[12],"adversarial":[13,30,44,50,69,104,116],"attacks":[14,31,51],"on":[15],"the":[16,27,40,76,92,109],"security-critical":[17],"artificial":[18],"intelligent":[19],"systems.":[20],"We":[21,89],"first":[22],"make":[23],"efforts":[24],"test":[26,91],"performances":[28,94],"of":[29,43,75,95,103,115],"present":[33],"classifying":[34],"grading":[36],"rule":[37],"(CGR)":[38],"for":[39,112],"fine-grained":[41],"grouping":[42],"example":[45],"attacks.":[46],"According":[47],"CGR,":[49],"can":[52,72],"be":[53,73,84],"divided":[54],"into":[55],"six":[56,101],"groups.":[57],"Then,":[58],"we":[59],"propose":[60],"a":[61],"feature":[62],"squeezing":[63],"CGR-based":[65],"detector":[66],"detect":[68],"attacks,":[70,105],"which":[71],"aware":[74],"detailed":[77],"attack":[78],"group":[79],"is":[81],"evaluated":[82],"effective":[85],"by":[86],"extensive":[87],"experiments.":[88],"also":[90],"typical":[96],"methods":[98],"against":[99],"these":[100],"groups":[102],"finally":[107],"give":[108],"recommendations":[111],"each":[113],"type":[114],"attack.":[117]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3097455612","counts_by_year":[{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":1}],"updated_date":"2025-01-17T16:46:30.783642","created_date":"2020-11-09"}