{"id":"https://openalex.org/W2902352539","doi":"https://doi.org/10.1145/3374664.3375736","title":"Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples","display_name":"Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples","publication_year":2020,"publication_date":"2020-03-13","ids":{"openalex":"https://openalex.org/W2902352539","doi":"https://doi.org/10.1145/3374664.3375736","mag":"2902352539"},"language":"en","primary_location":{"id":"doi:10.1145/3374664.3375736","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374664.3375736","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1812.01804","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Huangyi Ge","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Huangyi Ge","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Sze Yiu Chau","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sze Yiu Chau","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Bruno Ribeiro","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bruno Ribeiro","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":null,"display_name":"Ninghui Li","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ninghui Li","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00461004,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"80","issue":null,"first_page":"85","last_page":"96"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9567000269889832,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11307","display_name":"Domain Adaptation and Few-Shot Learning","score":0.9289000034332275,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.932200014591217},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6466000080108643},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5526999831199646},{"id":"https://openalex.org/keywords/random-noise","display_name":"Random noise","score":0.5267000198364258},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.4740000069141388},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41519999504089355}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.932200014591217},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7116000056266785},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6466000080108643},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5821999907493591},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5526999831199646},{"id":"https://openalex.org/C2986577269","wikidata":"https://www.wikidata.org/wiki/Q11306265","display_name":"Random noise","level":2,"score":0.5267000198364258},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.4740000069141388},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4544999897480011},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41519999504089355},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.3199999928474426},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.3163999915122986},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2939999997615814},{"id":"https://openalex.org/C2776145597","wikidata":"https://www.wikidata.org/wiki/Q25339462","display_name":"Dropout (neural networks)","level":2,"score":0.28769999742507935}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3374664.3375736","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374664.3375736","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1812.01804","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1812.01804","pdf_url":"https://arxiv.org/pdf/1812.01804","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1812.01804","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1812.01804","pdf_url":"https://arxiv.org/pdf/1812.01804","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W114517082","https://openalex.org/W1535091708","https://openalex.org/W2025768430","https://openalex.org/W2034368206","https://openalex.org/W2145094598","https://openalex.org/W2225156818","https://openalex.org/W2243397390","https://openalex.org/W2618043096","https://openalex.org/W2738001131","https://openalex.org/W2892090366","https://openalex.org/W2906186365","https://openalex.org/W2963564844","https://openalex.org/W2963612069","https://openalex.org/W2964059111","https://openalex.org/W2964082701","https://openalex.org/W2964137095","https://openalex.org/W2964301649","https://openalex.org/W6600679772","https://openalex.org/W6821127250"],"related_works":[],"abstract_inverted_index":{"Image":[0],"classifiers":[1,23],"often":[2],"suffer":[3],"from":[4],"adversarial":[5,52,115],"examples,":[6],"which":[7,89],"are":[8],"generated":[9],"by":[10],"strategically":[11],"adding":[12],"a":[13,71,81,101],"small":[14],"amount":[15],"of":[16,50,66],"noise":[17],"to":[18,21],"input":[19],"images":[20],"trick":[22],"into":[24],"misclassification.":[25],"Over":[26],"the":[27,67,97],"years,":[28],"many":[29,118],"defense":[30,62,83],"mechanisms":[31],"have":[32,38],"been":[33],"proposed,":[34],"and":[35,54,74,92],"different":[36,61],"researchers":[37],"made":[39],"seemingly":[40],"contradictory":[41],"claims":[42],"on":[43],"their":[44],"effectiveness.":[45],"We":[46],"present":[47],"an":[48,56],"analysis":[49],"possible":[51],"models,":[53],"propose":[55,80],"evaluation":[57],"framework":[58,108],"for":[59],"comparing":[60],"mechanisms.":[63],"As":[64],"part":[65],"framework,":[68],"we":[69,79],"introduce":[70],"more":[72],"powerful":[73],"realistic":[75],"adversary":[76],"strategy.":[77],"Furthermore,":[78],"new":[82],"mechanism":[84],"called":[85],"Random":[86],"Spiking":[87],"(RS),":[88],"generalizes":[90],"dropout":[91],"introduces":[93],"random":[94],"noises":[95],"in":[96,100],"training":[98],"process":[99],"controlled":[102],"manner.":[103],"Evaluations":[104],"under":[105],"our":[106],"proposed":[107],"suggest":[109],"RS":[110],"delivers":[111],"better":[112],"protection":[113],"against":[114],"examples":[116],"than":[117],"existing":[119],"schemes.":[120]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2018-12-11T00:00:00"}
