{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:52:44Z","timestamp":1759092764175,"version":"3.37.3"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"US National Science Foundation","award":["CCF-1527388"],"award-info":[{"award-number":["CCF-1527388"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tifs.2022.3169922","type":"journal-article","created":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T20:40:31Z","timestamp":1650919231000},"page":"1757-1770","source":"Crossref","is-referenced-by-count":7,"title":["Fast Locally Optimal Detection of Targeted Universal Adversarial Perturbations"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4706-1065","authenticated-orcid":false,"given":"Amish","family":"Goel","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Illinois at Urbana&#x2013;Champaign, Champaign, IL, USA"}]},{"given":"Pierre","family":"Moulin","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Illinois at Urbana&#x2013;Champaign, Champaign, IL, USA"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"Intriguing properties of neural networks","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Szegedy"},{"key":"ref2","first-page":"1","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Goodfellow"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref4","first-page":"125","article-title":"Adversarial examples are not bugs, they are features","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Ilyas"},{"key":"ref5","first-page":"1","article-title":"ImageNet-trained CNNs are biased towards texture; increasing shape bias improves accuracy and robustness","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Geirhos"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref7","article-title":"Uncovering the limits of adversarial training against norm-bounded adversarial examples","author":"Gowal","year":"2020","journal-title":"arXiv:2010.03593"},{"key":"ref8","first-page":"7472","article-title":"Theoretically principled trade-off between robustness and accuracy","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zhang"},{"key":"ref9","first-page":"1310","article-title":"Certified adversarial robustness via randomized smoothing","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Cohen"},{"key":"ref10","first-page":"11292","article-title":"Provably robust deep learning via adversarially trained smoothed classifiers","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Salman"},{"key":"ref11","first-page":"5283","article-title":"Provable defenses against adversarial examples via the convex outer adversarial polytope","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Wong"},{"key":"ref12","article-title":"On the effectiveness of interval bound propagation for training verifiably robust models","author":"Gowal","year":"2018","journal-title":"arXiv:1810.12715"},{"key":"ref13","first-page":"1","article-title":"On detecting adversarial perturbations","volume-title":"Proc. ICLR","author":"Metzen"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.56"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEW.2017.8026257"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2018.8646479"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413866"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00095"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00357"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00015"},{"key":"ref22","first-page":"3896","article-title":"Adversarial camera stickers: A physical camera-based attack on deep learning systems","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Li"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3317611"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354222"},{"key":"ref25","article-title":"On the (statistical) detection of adversarial examples","author":"Grosse","year":"2017","journal-title":"arXiv:1702.06280"},{"key":"ref26","article-title":"Detecting adversarial samples from artifacts","author":"Feinman","year":"2017","journal-title":"arXiv:1703.00410"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698548"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/fi10030026"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00079"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00503"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6017"},{"key":"ref32","article-title":"Learning with a strong adversary","author":"Huang","year":"2015","journal-title":"arXiv:1511.03034"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"article-title":"Adversarial patch","volume-title":"Proc. Comput. Vis. Pattern Recognit.","author":"Brown","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00930"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00482"},{"key":"ref39","first-page":"6808","article-title":"Wasserstein adversarial examples via projected sinkhorn iterations","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Wong"},{"key":"ref40","first-page":"1","article-title":"Spatially transformed adversarial examples","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Xiao"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00487"},{"key":"ref42","first-page":"1","article-title":"Unrestricted adversarial examples via semantic manipulation","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Bhattad"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref44","first-page":"284","article-title":"Synthesizing robust adversarial examples","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Athalye"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref47","first-page":"1","article-title":"Delving into transferable adversarial examples and black-box attacks","volume-title":"Proc. ICLR","author":"Liu"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6154"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-69538-5_18"},{"key":"ref50","first-page":"3","article-title":"Fast feature fool: A data independent approach to universal adversarial perturbations","volume-title":"Proc. Brit. Mach. Vis. Conf.","author":"Mopuri"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00893"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68238-5_36"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1017\/9781107185920"},{"key":"ref54","first-page":"1","article-title":"Score function features for discriminative learning","volume-title":"Proc. ICLR Workshop","author":"Janzamin"},{"key":"ref55","first-page":"92","volume-title":"Local Asymptotic Normality","author":"van der Vaart","year":"1998"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511779398"},{"key":"ref57","first-page":"11895","article-title":"Generative modeling by estimating gradients of the data distribution","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Song"},{"article-title":"Learning multiple layers of features from tiny images","year":"2009","author":"Krizhevsky","key":"ref58"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2019.2918242"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/10206\/9652463\/9762886-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9652463\/09762886.pdf?arnumber=9762886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T20:24:23Z","timestamp":1705955063000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9762886\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":63,"URL":"https:\/\/doi.org\/10.1109\/tifs.2022.3169922","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2022]]}}}