{"id":"https://openalex.org/W2988043334","doi":"https://doi.org/10.1145/3356250.3360025","title":"Moving target defense for embedded deep visual sensing against adversarial examples","display_name":"Moving target defense for embedded deep visual sensing against adversarial examples","publication_year":2019,"publication_date":"2019-11-05","ids":{"openalex":"https://openalex.org/W2988043334","doi":"https://doi.org/10.1145/3356250.3360025","mag":"2988043334"},"language":"en","primary_location":{"id":"doi:10.1145/3356250.3360025","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3356250.3360025","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th Conference on Embedded Networked Sensor Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://dr.ntu.edu.sg/bitstream/10356/136723/1/main.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017671322","display_name":"Qun Song","orcid":"https://orcid.org/0000-0002-3611-9404"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Qun Song","raw_affiliation_strings":["Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050232781","display_name":"Zhenyu Yan","orcid":"https://orcid.org/0000-0002-4433-5211"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Zhenyu Yan","raw_affiliation_strings":["Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040651615","display_name":"Rui Tan","orcid":"https://orcid.org/0000-0001-8441-9973"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Rui Tan","raw_affiliation_strings":["Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5017671322"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":1.4448,"has_fulltext":true,"cited_by_count":28,"citation_normalized_percentile":{"value":0.87103648,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"124","last_page":"137"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.9327999949455261,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.9027210474014282},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7987800240516663},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6643096208572388},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.620396614074707},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6040146350860596},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5881928205490112},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.4885021448135376},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.4846392273902893},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4844093918800354},{"id":"https://openalex.org/keywords/transferability","display_name":"Transferability","score":0.4750904142856598},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4386006295681},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.11852985620498657},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.10911813378334045}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.9027210474014282},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7987800240516663},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6643096208572388},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.620396614074707},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6040146350860596},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5881928205490112},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.4885021448135376},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4846392273902893},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4844093918800354},{"id":"https://openalex.org/C61272859","wikidata":"https://www.wikidata.org/wiki/Q7834031","display_name":"Transferability","level":3,"score":0.4750904142856598},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4386006295681},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.11852985620498657},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10911813378334045},{"id":"https://openalex.org/C140331021","wikidata":"https://www.wikidata.org/wiki/Q1868104","display_name":"Logit","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3356250.3360025","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3356250.3360025","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th Conference on Embedded Networked Sensor Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/136723","is_oa":true,"landing_page_url":"https://hdl.handle.net/10356/136723","pdf_url":"https://dr.ntu.edu.sg/bitstream/10356/136723/1/main.pdf","source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"}],"best_oa_location":{"id":"pmh:oai:dr.ntu.edu.sg:10356/136723","is_oa":true,"landing_page_url":"https://hdl.handle.net/10356/136723","pdf_url":"https://dr.ntu.edu.sg/bitstream/10356/136723/1/main.pdf","source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6365412009","display_name":null,"funder_award_id":"Start-up Grant","funder_id":"https://openalex.org/F4320335158","funder_display_name":"Energy Research Institute, Nanyang Technological University"}],"funders":[{"id":"https://openalex.org/F4320335158","display_name":"Energy Research Institute, Nanyang Technological University","ror":"https://ror.org/02e7b5302"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2988043334.pdf","grobid_xml":"https://content.openalex.org/works/W2988043334.grobid-xml"},"referenced_works_count":59,"referenced_works":["https://openalex.org/W1534477342","https://openalex.org/W1972544340","https://openalex.org/W2067713319","https://openalex.org/W2106306039","https://openalex.org/W2109394932","https://openalex.org/W2117876524","https://openalex.org/W2123154179","https://openalex.org/W2180612164","https://openalex.org/W2197836422","https://openalex.org/W2217248474","https://openalex.org/W2243397390","https://openalex.org/W2282391807","https://openalex.org/W2408141691","https://openalex.org/W2460937040","https://openalex.org/W2494110282","https://openalex.org/W2543927648","https://openalex.org/W2561975083","https://openalex.org/W2602856279","https://openalex.org/W2603766943","https://openalex.org/W2604505099","https://openalex.org/W2611576673","https://openalex.org/W2727966874","https://openalex.org/W2738841453","https://openalex.org/W2759471388","https://openalex.org/W2765233338","https://openalex.org/W2765384636","https://openalex.org/W2786118190","https://openalex.org/W2787708942","https://openalex.org/W2788495578","https://openalex.org/W2798302089","https://openalex.org/W2894403074","https://openalex.org/W2909023102","https://openalex.org/W2912083425","https://openalex.org/W2913668833","https://openalex.org/W2919115771","https://openalex.org/W2950468330","https://openalex.org/W2950864148","https://openalex.org/W2952919291","https://openalex.org/W2962700793","https://openalex.org/W2963165448","https://openalex.org/W2963207607","https://openalex.org/W2963268689","https://openalex.org/W2963299894","https://openalex.org/W2963446712","https://openalex.org/W2963496101","https://openalex.org/W2963564844","https://openalex.org/W2963565751","https://openalex.org/W2963626025","https://openalex.org/W2963626858","https://openalex.org/W2963754293","https://openalex.org/W2963857521","https://openalex.org/W2964082701","https://openalex.org/W2964153729","https://openalex.org/W2964197269","https://openalex.org/W2965333252","https://openalex.org/W2988043334","https://openalex.org/W3103557498","https://openalex.org/W3105210478","https://openalex.org/W3106076771"],"related_works":["https://openalex.org/W4288055406","https://openalex.org/W3137894200","https://openalex.org/W3092178728","https://openalex.org/W3132910851","https://openalex.org/W4377864639","https://openalex.org/W2997056298","https://openalex.org/W2950864148","https://openalex.org/W2570685808","https://openalex.org/W4200630034","https://openalex.org/W4226402597"],"abstract_inverted_index":{"Deep":[0],"learning-based":[1],"visual":[2],"sensing":[3],"has":[4],"achieved":[5],"attractive":[6],"accuracy":[7],"but":[8],"is":[9,129],"shown":[10,54],"vulnerable":[11],"to":[12,29,33,109,161,171],"adversarial":[13,27,39,65,124,133],"example":[14],"attacks.":[15,151],"Specifically,":[16],"once":[17,90],"the":[18,21,31,47,71,75,91,94,97,102,132,147,163,191],"attackers":[19,92],"obtain":[20],"deep":[22,113],"model,":[23],"they":[24,79],"can":[25,87],"construct":[26],"examples":[28,40,66],"mislead":[30],"model":[32],"yield":[34],"wrong":[35],"classification":[36],"results.":[37],"Deployable":[38],"such":[41],"as":[42],"small":[43],"stickers":[44],"pasted":[45],"on":[46,70,131,175],"road":[48,180],"signs":[49],"and":[50,86,122,183],"lanes":[51],"have":[52],"been":[53],"effective":[55],"in":[56],"misleading":[57],"advanced":[58],"driver-assistance":[59],"systems.":[60],"Many":[61],"existing":[62],"countermeasures":[63],"against":[64],"build":[67],"their":[68],"security":[69],"attackers'":[72],"ignorance":[73],"of":[74,82,96,104,149,169,193],"defense":[76,107],"mechanisms.":[77],"Thus,":[78],"fall":[80],"short":[81],"following":[83],"Kerckhoffs's":[84],"principle":[85],"be":[88],"subverted":[89],"know":[93],"details":[95],"defense.":[98],"This":[99],"paper":[100],"applies":[101],"strategy":[103],"moving":[105],"target":[106],"(MTD)":[108],"generate":[110],"multiple":[111],"new":[112],"models":[114,144],"after":[115],"system":[116],"deployment,":[117],"that":[118],"will":[119],"collaboratively":[120],"detect":[121],"thwart":[123],"examples.":[125],"Our":[126],"MTD":[127],"design":[128],"based":[130,174],"examples'":[134],"minor":[135],"transferability":[136],"across":[137],"different":[138],"models.":[139],"The":[140],"post-deployment":[141],"dynamically":[142],"generated":[143],"significantly":[145],"increase":[146],"bar":[148],"successful":[150],"We":[152],"also":[153],"apply":[154],"serial":[155],"data":[156],"fusion":[157],"with":[158],"early":[159],"stopping":[160],"reduce":[162],"inference":[164],"time":[165],"by":[166],"a":[167,179],"factor":[168],"up":[170],"5.":[172],"Evaluation":[173],"four":[176],"datasets":[177],"including":[178],"sign":[181],"dataset":[182],"two":[184],"GPU-equipped":[185],"Jetson":[186],"embedded":[187],"computing":[188],"platforms":[189],"shows":[190],"effectiveness":[192],"our":[194],"approach.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
