{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{-“日期-部件”:[[2022,3,30]],“日期-时间”:“2022-03-30T22:56:40Z”,“时间戳”:1648681000804},“参考-计数”:25,“出版商”:“Springer Science and Business Media LLC”,“问题”:“2”,“许可证”:[{“开始”:{:“日期-零件”:[2019,9,11]],”日期-时间我”:“2019-09-11T00:00:00Z”,“timestamp”:156816000000},“content-version”:“tdm”,“delay-in-days”:0,“URL”:“http://\/www.springer.com/tdm”},{“start”:{“date-parts”:[[2019,9,11]],“date-time”:“2019-09-11T00:00:00Z”,“timetamp”:15.6816000000},”content-versiion“:”vor“,”delay-in-days“:0,”URL“http://\www.springer”。com/tdm“}],“出资人”:[{“DOI”:“10.13039\/501100010892”,“名称”:“科学技术部”,“doi-asserted-by”:“crossref”},{“doi”:“10.13039\/501000004541”,“name”:“人力资源开发部”,”doi-assert-by“:”publisher“}],“content-domain”:{“domain”:[“link.springer.com”],“crossmark-restriction”:false},“short-container-title”:[“Int J Multimed Info Retr”],”published-print“:{”date-parts“:[[2020,6]]},“DOI”:“10.1007\/s13735-019-00177-8”,“type”:“journal-article”,“created”:{“date-parts”:[[2019,9,11]],“date-time”:“2019-09-11T13:03:59Z”,“timestamp”:156820703000},”page“:”125-133“,”update-policy“http:\/\/dx.DOI.org\/10.10007\/springer_crossmark_policy”,”source“Crossref”“,”is-referenced-by-count“:0,”title“:[“基于检索的多样性和特定图像对手选择方法”],“前缀”:“10.1007”,“卷”:“9”,“作者”:[{“给定”:“Rajvardhan Singh”,“家族”:“拉瓦特”,“序列”:“第一”,“从属关系”:[]},{“ORCID”:“http://\/ORCID.org\/00000-0003-2317-2641”,“authenticated-ORCID”:false,“给定的”:“Yashaswi”,“家庭”:“Verma”,“sequence”:“additional”,“affiliation”:[]}],“member”:“297”,“published-on-line”:{“date-parts”:[[2019,9,11]]},“reference”:[{“key”:“177_CR1”,“volume-title”:“Learning to attack:对抗性转换网络”,“author”:“S Baluja”,”year“2018”,“unstructured”:“Baluja-S,Fischer I(2018)学习攻击:对抗性转换网络。人工智能进步协会,Menlo Park“},{”key“:”177_CR2“,”doi-asserted-by“:”publisher“,”first page“:“387”,”doi“:”10.1007\/978-3642-40994-3_25“,”volume-title“:”Advanced Information Systems Engineering“,”author“:”Battista Biggio“,”year“:”2013“,”unstructured“:”Biggio B、Corona I、Maiorca D、Nelson B、\u0160rndi\u0107 N、Laskov P、Giacinto G、Roli F(2013)《测试时针对机器学习的规避攻击》。在:关于数据库中的机器学习和知识发现的欧洲联合会议,第387\u2013402页,{“key”:“177_CR3”,“doi断言者”:“publisher”,“首页”:“1460002”,“doi”:“10.1142\/S012180001414600027”,“卷”:“28”,“作者”:“B Biggio”,“年份”:“2014”,“非结构化”:“Biggio B,Fumera G,Roli F(2014)受到攻击的模式识别系统:设计问题和研究挑战。Int J Pattern Recognit Artif Intell 28:1460002“,“journal-title”:“Int J Pattern Recognoint Artif Intell”},{“key”:“177_CR4”,“doi-asserted-by”:“crossref”,“unstructured”:“Carlini N,Wagner DA(2017)Towards the evaluation the robusiness of neural networks.In:IEEE symposium on security and privacy,pp 39\u201357”,“doi”:“10.1109\/SP.2017.49”}177_CR5“,”doi-asserted-by“:”crossref“,”unstructured“:”Chatfield K,Simonyan K,Vedaldi A,Zisserman A(2014)《细节中的魔鬼回归:深入研究卷积网》。In:英国机器视觉会议”,“DOI”:“10.5244\/C.28.6”},{“key”:“177_CR6”,“unstructured”:“Gong B,Chao W,Grauman K,Sha F(2014)监督视频摘要的多样顺序子集选择。In:神经信息处理系统进展”}解释和利用对抗性示例。In:学习表征国际会议“},{”key“:”177_CR8“,”first page“:“2672”,“volume”:“2”,“author”:“IJ Goodfellow”,“year”:“2014”,“unstructured”:“Goodfelow IJ,Pouget-Abadie J,Mirza M,Xu B,Warde-Farley D,Ozair S,Courville A,Bengio Y(2014)生成对抗网。神经信息处理系统2:2672\u20132680”,“journal-title“:”Neural Inf Process Syst“},{”key“:”177_CR9“,”unstructured“:”Gu S,Rigazio L(2014)Towards deep Neural network architectures robust to partical examples。CoRR\narXiv:1412.5068“}”,{“key”:“177_CR10”,“doi-asserted-by”:“crossref”,“unstructure”:“He K,Zhang X,Ren S,Sun J(2016)用于图像识别的深度残差学习。收录于:IEEE计算机视觉和模式识别会议,第770\u2013778页,“DOI”:“10.1109\/CVPR.2016.90”},{“key”:“177_CR11”,“DOI-asserted-by”:“crossref”,“unstructured”:“Kulesza A,Taskar B(2011)k-DPPs:定尺寸决定点过程。收录于“国际机器学习会议”,“DOI:”10.1561\/9781601986290“},}“key:”177_CR12“,“非结构化”:“Kulesza A,Taskar B(2011)学习确定点过程。在:人工智能的不确定性,pp 419\u2013427“},{”key“:”177_CR13“,”doi断言“:”publisher“,”首页“:”123“,”doi“:”10.1561\/2200000044“,”卷“:”5“,”作者“:”Kulesza“,”年份“:”2012“,”非结构化“:”Kulesza A,Taskar B(2012)机器学习的决定性点过程。发现趋势Mach Learn 5:123\u2013286“,”期刊标题“:“Found Trends Mach Learn”},{“key”:“177_CR14”,“nonstructured”:“Kurakin A,Goodfellow IJ,Bengio S(2016)大规模对抗性机器学习。CoRR\narXiv:11611.01236”},{“key”:“177_CR15”,“doi断言”:“publisher”,“first page”:“83”,“doi”:“10.2307\/1425855”,“volume”:“7”,“author”:“O Macchi”,“year”:“1975”,“nonstructured”:“Macchi O(1975)随机点过程的符合方法。高级应用概率7:83\u2013122。\nhttps:\/\/doi.org\/10.2307\/1425855“,”journal-title“:”Adv-Appl-Probab“},{“key”:“177_CR16”,“unstructured”:“Madry A,Makelov A,Schmidt L,Tsipras D,Vladu A(2018)《面向对抗性攻击的深度学习模型》。In:学习表征国际会议“}”,{”key“:”177_CR17“,”doi-asserted-by“:”crossref“,”unstructure“:”Moosavi-Dezfouli S,Fawzi A,Frossard P(2016)《深度愚弄:愚弄深度神经网络的简单而准确的方法》。收录于:IEEE计算机视觉和模式识别会议,第2574\u20132582页,“DOI”:“10.1109\/CVPR.2016.282”},{“key”:“177_CR18”,“DOI-asserted-by”:“crossref”,“unstructured”:“Moosavi-Dezfouli SM,Fawzi A,Fawz O,Frossard P(2017)通用对抗扰动。收录于,pp 86\u201394“,“DOI”:“10.1109\/CVPR.2017.17”},{“key”:“177_CR19”,“unstructured”:“Mopuri KR,Garg U,Radhakrishnan VB(2017)Fast feature fool:a data independent approach to universal对抗扰动。In:British machine vision conference”}、{“密钥”:“77_CR20”,“DOI-asserted-by”:“crossref”,“非结构化”:“Mopuri KR、Ojha U、Garg U、Babu RV(2018)NAG:对手生成网络。摘自:IEEE计算机视觉和模式识别会议,第742\u2013751页,“DOI”:“10.1109\/CVPR.2018.00084”},{“key”:“177_CR21”,“unstructured”:“Nayebi A,Ganguli S(2017)《生物启发的深层网络防御对抗性攻击》。CoRR\narXiv:1703.09202Papernot N、McDaniel P、Goodfellow I、Jha S、Celik ZB、Swami A(2017)《针对机器学习的实用黑盒攻击》。In:亚洲计算机和通信安全会议,pp 506\u2013519“,“DOI”:“10.1145\/3052973.3053009”},{“key”:“177_CR23”,“unstructured”:“Szegedy C,Zaremba W,Sutskever I,Bruna J,Erhan D,Goodfellow I,Fergus R(2014)神经网络的有趣特性。In:学习表征国际会议”}非结构化”:“Tram\u00e8r F,Kurakin A,Papernot N,Goodfellow I,Boneh D,McDaniel P(2018)合奏对抗训练:攻击与防御。In:学习表征国际会议“},{“key”:“177_CR25”,“doi-asserted-by”:“crossref”,“unstructured”:“Wu B,Jia F,Liu W,Ghanem B(2017)Diverse image annotation。In:IEEE conference on computer vision and pattern recognition”,“doi”:“10.1109\/CVPR.2017.656”}],“container-title”:[“国际多媒体信息检索杂志“],”original-title“:[],”language“:”en“,”link“:[{”URL“:”http://\/link.springer.com/content\/pdf\/10.1007\/s13735-019-00177-8.pdf“,”content-type“:”application\/pdf“、”content-version“:”vor“、”intended-application“:”text-mining“},”{“URL”:“http://\/link.springer.com/article\/10.1007\/s13735-019-00177-8\/fulltext.html“,“内容类型”:“文本\/html”,“内容版本”:“vor”,“intended-application”:“text-mining”},{“URL”:“http://\/llink.springer-com/content\/pdf\/10.10007\/s13735-019-00177-8.pdf”,“content-type”:“application\/pdf”“:”相似性检查“}”,“存放”:{“日期部分”:[[2020,9,10]],“日期时间”:“2020-09-10T16:39:16Z”,“时间戳”:1599755956000},“分数”:1,“资源”:{“主要”:{:“URL”:“http://\link.springer.com\/10.1007\/s13735-019-00177-8”},”副标题“:[],”短标题“:[],”已发布“:{”日期部分“:[2019,9,11]]},“references-count”:25,“journal-issue”:{“issue”:“2”,“published-print“:{”date-parts“:[[2020,6]]}},”alternative-id“:[”177“],”URL“:”http://\/dx.doi.org\/10.1007\/s13735-019-00177-8“,”relation“:{},“ISSN”:[“2192-6611”,“2192-6062X”],“ISSN-type”:[{“value”:“21926611”,“type”:“print”},{“value”:”2192-662X“,”type“:“电子”}],“主题”:[],“发布”:{“日期部分”:[[2019,9,11]]},“断言”:[{“值”:“2019年2月26日“,”订单“:1,”名称“:”收到“,”标签“:”接收“,”组“:组“:{”名称“:”ArticleHistory“,”label“:”Article History”}},{“value”:“2019年9月11日”,“order”:4,“name”:“first_online”,“label”:“first online”,”group“:{“name”:“ArticleHistory”,“table”:“Article历史”}}}]}}