{"id":"https://openalex.org/W4320167910","doi":"https://doi.org/10.48550/arxiv.2210.02618","title":"Dynamic Stochastic Ensemble with Adversarial Robust Lottery Ticket Subnetworks","display_name":"Dynamic Stochastic Ensemble with Adversarial Robust Lottery Ticket Subnetworks","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4320167910","doi":"https://doi.org/10.48550/arxiv.2210.02618"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2210.02618","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},"type":"preprint","type_crossref":"posted-content","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/abs/2210.02618","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025104684","display_name":"Peng Qi","orcid":"https://orcid.org/0000-0003-0514-9464"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Peng, Qi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101413311","display_name":"Wenlin Liu","orcid":"https://orcid.org/0009-0003-8572-0508"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liu, Wenlin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061617562","display_name":"Ruoxi Qin","orcid":"https://orcid.org/0000-0003-0836-8179"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qin, Ruoxi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074132125","display_name":"Libin Hou","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hou, Libin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101590151","display_name":"Bin Yan","orcid":"https://orcid.org/0000-0001-9169-4615"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yan, Bin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5091588180","display_name":"Linyuan Wang","orcid":"https://orcid.org/0000-0003-1087-5911"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Linyuan","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.609064,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":60,"max":70},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9975,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9762,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transferability","display_name":"Transferability","score":0.540016},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.45800352}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8651155},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.72674257},{"id":"https://openalex.org/C61272859","wikidata":"https://www.wikidata.org/wiki/Q7834031","display_name":"Transferability","level":3,"score":0.540016},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.45800352},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4394344},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4197467},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33885035},{"id":"https://openalex.org/C140331021","wikidata":"https://www.wikidata.org/wiki/Q1868104","display_name":"Logit","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2210.02618","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/2210.02618","pdf_url":"http://arxiv.org/pdf/2210.02618","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://api.datacite.org/dois/10.48550/arxiv.2210.02618","pdf_url":null,"source":{"id":"https://openalex.org/S4393179698","display_name":"DataCite API","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210145204","host_organization_name":"DataCite","host_organization_lineage":["https://openalex.org/I4210145204"],"host_organization_lineage_names":["DataCite"],"type":"metadata"},"license":null,"license_id":null,"version":null}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2210.02618","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4392340763","https://openalex.org/W4377864639","https://openalex.org/W4288055406","https://openalex.org/W4226402597","https://openalex.org/W4200630034","https://openalex.org/W3137894200","https://openalex.org/W3132910851","https://openalex.org/W3092178728","https://openalex.org/W2997056298","https://openalex.org/W2950864148"],"abstract_inverted_index":{"Adversarial":[0],"attacks":[1,13],"are":[2],"considered":[3],"the":[4,18,24,36,43,55,62,70,89,97,134],"intrinsic":[5],"vulnerability":[6],"of":[7,49,76,136],"CNNs.":[8],"Defense":[9,31],"strategies":[10],"designed":[11],"for":[12],"have":[14],"been":[15],"stuck":[16],"in":[17,54],"adversarial":[19,63,72,98,128],"attack-defense":[20],"arms":[21],"race,":[22],"reflecting":[23],"imbalance":[25],"between":[26,65,74,101],"attack":[27],"and":[28,111,123],"defense.":[29],"Dynamic":[30],"Framework":[32],"(DDF)":[33],"recently":[34],"changed":[35],"passive":[37],"safety":[38],"status":[39],"quo":[40],"based":[41],"on":[42],"stochastic":[44,91],"ensemble":[45,92],"model.":[46],"The":[47,113],"diversity":[48,100],"subnetworks,":[50],"an":[51],"essential":[52],"concern":[53],"DDF,":[56],"can":[57],"be":[58],"effectively":[59],"evaluated":[60],"by":[61,69,127],"transferability":[64,73],"different":[66,108],"networks.":[67],"Inspired":[68],"poor":[71],"subnetworks":[75,105],"scratch":[77],"tickets":[78],"with":[79],"various":[80],"remaining":[81],"ratios,":[82],"we":[83],"propose":[84],"a":[85],"method":[86,119],"to":[87],"realize":[88],"dynamic":[90],"defense":[93],"strategy.":[94],"We":[95],"discover":[96],"transferable":[99,129],"robust":[102,122],"lottery":[103],"ticket":[104],"drawn":[106],"from":[107],"basic":[109],"structures":[110],"sparsity.":[112],"experimental":[114],"results":[115],"suggest":[116],"that":[117],"our":[118],"achieves":[120],"better":[121],"clean":[124],"recognition":[125],"accuracy":[126],"diversity,":[130],"which":[131],"would":[132],"decrease":[133],"reliability":[135],"attacks.":[137]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4320167910","counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-01-19T05:11:12.756553","created_date":"2023-02-13"}