{"id":"https://openalex.org/W2990270730","doi":"https://doi.org/10.1145/3359789.3359790","title":"STRIP","display_name":"STRIP","publication_year":2019,"publication_date":"2019-11-22","ids":{"openalex":"https://openalex.org/W2990270730","doi":"https://doi.org/10.1145/3359789.3359790","mag":"2990270730"},"language":"en","primary_location":{"id":"doi:10.1145/3359789.3359790","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3359789.3359790","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067969908","display_name":"Yansong Gao","orcid":"https://orcid.org/0000-0001-6029-5064"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yansong Gao","raw_affiliation_strings":["Nanjing University of Science and Technology, Sydney, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Nanjing University of Science and Technology, Sydney, Australia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003604105","display_name":"Change Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Change Xu","raw_affiliation_strings":["CSIRO, Sydney, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CSIRO, Sydney, Australia","institution_ids":["https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081805488","display_name":"Derui Wang","orcid":"https://orcid.org/0000-0003-1388-7715"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Derui Wang","raw_affiliation_strings":["Swinburne University of Technology and Data, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Swinburne University of Technology and Data, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043470959","display_name":"Shiping Chen","orcid":"https://orcid.org/0000-0002-4603-0024"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shiping Chen","raw_affiliation_strings":["CSIRO, Sydney, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CSIRO, Sydney, Australia","institution_ids":["https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048703299","display_name":"Damith C. Ranasinghe","orcid":"https://orcid.org/0000-0002-2008-9255"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Damith C. Ranasinghe","raw_affiliation_strings":["The University of Adelaide, SA, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The University of Adelaide, SA, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082256444","display_name":"\u202aSurya Nepal\u202c","orcid":"https://orcid.org/0000-0002-3289-6599"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Surya Nepal","raw_affiliation_strings":["CSIRO, Sydney, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CSIRO, Sydney, Australia","institution_ids":["https://openalex.org/I1292875679"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5067969908"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":35.8596,"has_fulltext":false,"cited_by_count":656,"citation_normalized_percentile":{"value":0.99790045,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"113","last_page":"125"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9775999784469604,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.9654452800750732},{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.8918155431747437},{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.7186327576637268},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7156178951263428},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6316473484039307},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6116508841514587},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5234824419021606},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.4870064854621887},{"id":"https://openalex.org/keywords/mnist-database","display_name":"MNIST database","score":0.48257604241371155},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.44921401143074036},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3470587134361267},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3218235373497009},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12068226933479309},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.0985947847366333}],"concepts":[{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.9654452800750732},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.8918155431747437},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.7186327576637268},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7156178951263428},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6316473484039307},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6116508841514587},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5234824419021606},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.4870064854621887},{"id":"https://openalex.org/C190502265","wikidata":"https://www.wikidata.org/wiki/Q17069496","display_name":"MNIST database","level":3,"score":0.48257604241371155},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.44921401143074036},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3470587134361267},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3218235373497009},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12068226933479309},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0985947847366333},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3359789.3359790","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3359789.3359790","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:researchbank.swinburne.edu.au:c0c54868-efd9-4a13-a80a-129dda7b8395/1","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.3/453736","pdf_url":null,"source":{"id":"https://openalex.org/S4306401157","display_name":"Swinburne Research Bank (Swinburne University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I57093077","host_organization_name":"Swinburne University of Technology","host_organization_lineage":["https://openalex.org/I57093077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ACSAC '19: Proceedings of the 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico, December 2019  (Dec 2019), pp. 113-125","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1832693441","https://openalex.org/W2067713319","https://openalex.org/W2095577883","https://openalex.org/W2112796928","https://openalex.org/W2193413348","https://openalex.org/W2194775991","https://openalex.org/W2350778671","https://openalex.org/W2535873859","https://openalex.org/W2560162835","https://openalex.org/W2610321374","https://openalex.org/W2753783305","https://openalex.org/W2765325683","https://openalex.org/W2798302089","https://openalex.org/W2806082141","https://openalex.org/W2807363941","https://openalex.org/W2890991187","https://openalex.org/W2897865027","https://openalex.org/W2899585792","https://openalex.org/W2902351501","https://openalex.org/W2909703150","https://openalex.org/W2919115771","https://openalex.org/W2934843808","https://openalex.org/W2942091739","https://openalex.org/W2964041528","https://openalex.org/W3103557498","https://openalex.org/W4252979261"],"related_works":["https://openalex.org/W3093748630","https://openalex.org/W3206218040","https://openalex.org/W4387022642","https://openalex.org/W3014697957","https://openalex.org/W4225614914","https://openalex.org/W4206776436","https://openalex.org/W4297632144","https://openalex.org/W3106646114","https://openalex.org/W4308244459","https://openalex.org/W4221166349"],"abstract_inverted_index":{"A":[0,127],"recent":[1],"trojan":[2,48,52,65,88,227],"attack":[3,89,228],"on":[4,94,165],"deep":[5],"neural":[6],"network":[7],"(DNN)":[8],"models":[9,74],"is":[10,54,67,160],"one":[11],"insidious":[12],"variant":[13],"of":[14,35,114,137,145,150,157,183,194,199,210,226],"data":[15],"poisoning":[16],"attacks.":[17,232],"Trojan":[18],"attacks":[19],"exploit":[20],"an":[21,177],"effective":[22],"backdoor":[23],"created":[24],"in":[25,33,76,130],"a":[26,55,68,121,138,146,151,188,224],"DNN":[27],"model":[28,38,140],"by":[29,60,105],"leveraging":[30],"the":[31,36,45,51,61,100,112,134,143],"difficulty":[32],"interpretability":[34],"learned":[37],"to":[39],"misclassify":[40],"any":[41],"inputs":[42,66,119],"signed":[43],"with":[44],"attacker's":[46],"chosen":[47],"trigger.":[49],"Since":[50],"trigger":[53],"secret":[56],"guarded":[57],"and":[58,92,110,141,168,173,203,215,230],"exploited":[59],"attacker,":[62],"detecting":[63],"such":[64],"challenge,":[69],"especially":[70],"at":[71],"run-time":[72,87],"when":[73],"are":[75],"active":[77],"operation.":[78],"This":[79],"work":[80],"builds":[81],"<u>STR</u>ong":[82],"<u>I</u>ntentional":[83],"<u>P</u>erturbation":[84],"(STRIP)":[85],"based":[86],"detection":[90],"system":[91],"focuses":[93],"vision":[95],"system.":[96],"We":[97,175,217],"intentionally":[98],"perturb":[99],"incoming":[101],"input,":[102],"for":[103,117,196,212],"instance":[104],"superimposing":[106],"various":[107],"image":[108],"patterns,":[109],"observe":[111],"randomness":[113],"predicted":[115,131],"classes":[116,132],"perturbed":[118],"from":[120],"given":[122,187],"deployed":[123],"model---malicious":[124],"or":[125],"benign.":[126],"low":[128],"entropy":[129],"violates":[133],"input-dependence":[135],"property":[136],"benign":[139],"implies":[142],"presence":[144],"malicious":[147],"input---a":[148],"characteristic":[149],"trojaned":[152],"input.":[153],"The":[154],"high":[155],"efficacy":[156],"our":[158],"method":[159],"validated":[161],"through":[162],"case":[163],"studies":[164],"three":[166],"popular":[167],"contrasting":[169],"datasets:":[170],"MNIST,":[171],"CIFAR10":[172,202],"GTSRB.":[174],"achieve":[176],"overall":[178],"false":[179,190],"acceptance":[180],"rate":[181,192],"(FAR)":[182],"less":[184],"than":[185],"1%,":[186,195],"preset":[189],"rejection":[191],"(FRR)":[193],"different":[197],"types":[198],"triggers.":[200],"Using":[201],"GTSRB,":[204],"we":[205],"have":[206,218],"empirically":[207],"achieved":[208],"result":[209],"0%":[211],"both":[213],"FRR":[214],"FAR.":[216],"also":[219],"evaluated":[220],"STRIP":[221],"robustness":[222],"against":[223],"number":[225],"variants":[229],"adaptive":[231]},"counts_by_year":[{"year":2026,"cited_by_count":23},{"year":2025,"cited_by_count":146},{"year":2024,"cited_by_count":139},{"year":2023,"cited_by_count":100},{"year":2022,"cited_by_count":72},{"year":2021,"cited_by_count":104},{"year":2020,"cited_by_count":61},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":1}],"updated_date":"2026-05-01T08:36:08.643496","created_date":"2019-12-05T00:00:00"}
