{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T11:22:29Z","timestamp":1764588149907,"version":"3.40.3"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030585440"},{"type":"electronic","value":"9783030585457"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58545-7_26","type":"book-chapter","created":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T10:04:51Z","timestamp":1604484291000},"page":"450-466","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Gabor Layers Enhance Network Robustness"],"prefix":"10.1007","author":[{"given":"Juan C.","family":"P\u00e9rez","sequence":"first","affiliation":[]},{"given":"Motasem","family":"Alfarra","sequence":"additional","affiliation":[]},{"given":"Guillaume","family":"Jeanneret","sequence":"additional","affiliation":[]},{"given":"Adel","family":"Bibi","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Thabet","sequence":"additional","affiliation":[]},{"given":"Bernard","family":"Ghanem","sequence":"additional","affiliation":[]},{"given":"Pablo","family":"Arbel\u00e1ez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,5]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Alekseev, A., Bobe, A.: Gabornet: gabor filters with learnable parameters in deep convolutional neural network. In: International Conference on Engineering and Telecommunication (EnT) (2019)","key":"26_CR1","DOI":"10.1109\/EnT47717.2019.9030571"},{"unstructured":"Atanov, A., Ashukha, A., Struminsky, K., Vetrov, D., Welling, M.: The deep weight prior. In: International Conference on Learning Representations (ICLR) (2019)","key":"26_CR2"},{"doi-asserted-by":"crossref","unstructured":"Bai, M., Urtasun, R.: Deep watershed transform for instance segmentation. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2017)","key":"26_CR3","DOI":"10.1109\/CVPR.2017.305"},{"unstructured":"Bibi, A., Ghanem, B., Koltun, V., Ranftl, R.: Deep layers as stochastic solvers. In: International Conference on Learning Representations (ICLR) (2019)","key":"26_CR4"},{"doi-asserted-by":"crossref","unstructured":"Cao, Y., et al.: Adversarial sensor attack on lidar-based perception in autonomous driving. In: ACM SIGSAC Conference on Computer and Communications Security (2019)","key":"26_CR5","DOI":"10.1145\/3319535.3339815"},{"doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: IEEE Symposium on Security and Privacy (SP) (2017)","key":"26_CR6","DOI":"10.1109\/SP.2017.49"},{"key":"26_CR7","doi-asserted-by":"publisher","first-page":"2355","DOI":"10.1109\/LGRS.2017.2764915","volume":"14","author":"Y Chen","year":"2017","unstructured":"Chen, Y., Zhu, L., Ghamisi, P., Jia, X., Li, G., Tang, L.: Hyperspectral images classification with gabor filtering and convolutional neural network. IEEE Geosci. Remote Sens. Lett. 14, 2355\u20132359 (2017)","journal-title":"IEEE Geosci. Remote Sens. Lett."},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1109\/TNN.2003.813829","volume":"14","author":"C Liu","year":"2003","unstructured":"Liu, C., Wechsler, H.: Independent component analysis of gabor features for face recognition. IEEE Trans. Neural Netw. 14, 919\u2013928 (2003)","journal-title":"IEEE Trans. Neural Netw."},{"doi-asserted-by":"crossref","unstructured":"Chernikova, A., Oprea, A., Nita-Rotaru, C., Kim, B.: Are self-driving cars secure? evasion attacks against deep neural networks for steering angle prediction. In: IEEE Security and Privacy Workshops (SPW) (2019)","key":"26_CR9","DOI":"10.1109\/SPW.2019.00033"},{"doi-asserted-by":"crossref","unstructured":"Chollet, F.: Xception: deep learning with depthwise separable convolutions. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2017)","key":"26_CR10","DOI":"10.1109\/CVPR.2017.195"},{"unstructured":"Cisse, M., Bojanowski, P., Grave, E., Dauphin, Y., Usunier, N.: Parseval networks: improving robustness to adversarial examples. In: International Conference on Machine Learning (ICML) (2017)","key":"26_CR11"},{"issue":"8","key":"26_CR12","doi-asserted-by":"publisher","first-page":"1915","DOI":"10.1109\/TPAMI.2012.231","volume":"35","author":"C Farabet","year":"2012","unstructured":"Farabet, C., Couprie, C., Najman, L., LeCun, Y.: Learning hierarchical features for scene labeling. IEEE Trans. Pattern Anal. Mach. Intell. 35(8), 1915\u20131929 (2012)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"doi-asserted-by":"crossref","unstructured":"Gabor, D.: Theory of communication. Part 1: The analysis of information. J. Inst. Electr. Eng. Part III Radio Commun. Eng. 93, 429\u2013441 (1946)","key":"26_CR13","DOI":"10.1049\/ji-3-2.1946.0074"},{"key":"26_CR14","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1137\/080725891","volume":"2","author":"T Goldstein","year":"2009","unstructured":"Goldstein, T., Osher, S.: The split Bregman method for L1-regularized problems. SIAM J. Imag. Sci. 2, 323\u2013343 (2009)","journal-title":"SIAM J. Imag. Sci."},{"unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: International Conference on Learning Representations (ICLR) (2015)","key":"26_CR15"},{"doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: IEEE Conference on Computer Vision and Patter Recognition (CVPR) (2016)","key":"26_CR16","DOI":"10.1109\/CVPR.2016.90"},{"key":"26_CR17","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2012.2205597","volume":"29","author":"G Hinton","year":"2012","unstructured":"Hinton, G., et al.: Deep neural networks for acoustic modeling in speech recognition: the shared views of four research groups. IEEE Sig. Process. Mag. 29, 82\u201397 (2012)","journal-title":"IEEE Sig. Process. Mag."},{"key":"26_CR18","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1113\/jphysiol.1959.sp006308","volume":"148","author":"DH Hubel","year":"1959","unstructured":"Hubel, D.H., Wiesel, T.N.: Receptive fields of single neurons in the cat\u2019s striate cortex. J. Physiol. 148, 574\u2013591 (1959)","journal-title":"J. Physiol."},{"key":"26_CR19","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1038\/290091a0","volume":"290","author":"B Julesz","year":"1981","unstructured":"Julesz, B.: Textons, the elements of texture perception, and their interactions. Nature 290, 91\u201397 (1981)","journal-title":"Nature"},{"unstructured":"Krizhevsky, A., Hinton, G.: Learning multiple layers of features from tiny images. Technical report, Citeseer (2009)","key":"26_CR20"},{"unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Neural Information Processing Systems (NeurIPS) (2012)","key":"26_CR21"},{"unstructured":"LeCun, Y.: The MNIST database of handwritten digits (1998). http:\/\/yann.lecun.com\/exdb\/mnist\/","key":"26_CR22"},{"key":"26_CR23","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521, 436\u2013444 (2015)","journal-title":"Nature"},{"key":"26_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/3-540-46805-6_19","volume-title":"Shape, Contour and Grouping in Computer Vision","author":"Y LeCun","year":"1999","unstructured":"LeCun, Y., Haffner, P., Bottou, L., Bengio, Y.: Object recognition with gradient-based learning. Shape, Contour and Grouping in Computer Vision. LNCS, vol. 1681, pp. 319\u2013345. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-46805-6_19"},{"key":"26_CR25","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1023\/A:1011126920638","volume":"43","author":"T Leung","year":"2001","unstructured":"Leung, T., Malik, J.: Representing and recognizing the visual appearance of materials using three-dimensional textons. Int. J. Comput. Vis. (IJCV) 43, 29\u201344 (2001)","journal-title":"Int. J. Comput. Vis. (IJCV)"},{"doi-asserted-by":"crossref","unstructured":"Lowe, D.G.: Object recognition from local scale-invariant features. In: International Conference on Computer Vision (ICCV). IEEE (1999)","key":"26_CR26","DOI":"10.1109\/ICCV.1999.790410"},{"key":"26_CR27","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. (IJCV) 60, 91\u2013110 (2004)","journal-title":"Int. J. Comput. Vis. (IJCV)"},{"key":"26_CR28","doi-asserted-by":"publisher","first-page":"4357","DOI":"10.1109\/TIP.2018.2835143","volume":"27","author":"S Luan","year":"2018","unstructured":"Luan, S., Chen, C., Zhang, B., Han, J., Liu, J.: Gabor convolutional networks. IEEE Trans. Image Process. 27, 4357\u20134366 (2018)","journal-title":"IEEE Trans. Image Process."},{"unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: International Conference on Learning Representations (ICLR) (2018)","key":"26_CR29"},{"unstructured":"Marr, D.: Vision: a computational investigation into the human representation and processing of visual information. In: PsycCRITIQUES (1982)","key":"26_CR30"},{"unstructured":"Montufar, G., Pascanu, R., Cho, K., Bengio, Y.: On the number of linear regions of deep neural networks. In: Advances in Neural Information Processing Systems (NeurIPS) (2014)","key":"26_CR31"},{"doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Frossard, P.: Deepfool: a simple and accurate method to fool deep neural networks. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2016)","key":"26_CR32","DOI":"10.1109\/CVPR.2016.282"},{"unstructured":"Namuduri, K.R., Mehrotra, R., Ranganathan, N.: Edge detection models based on Gabor filters. In: International Conference on Pattern Recognition. Conference C: Image, Speech and Signal Analysis (1992)","key":"26_CR33"},{"unstructured":"Novak, C.L., Shafer, S.A., et al.: Anatomy of a color histogram. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (1992)","key":"26_CR34"},{"doi-asserted-by":"crossref","unstructured":"Ouyang, W., Wang, X.: Joint deep learning for pedestrian detection. In: IEEE International Conference on Computer Vision (ICCV) (2013)","key":"26_CR35","DOI":"10.1109\/ICCV.2013.257"},{"doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Wu, X., Jha, S., Swami, A.: Distillation as a defense to adversarial perturbations against deep neural networks. In: IEEE Symposium on Security and Privacy (SP) (2016)","key":"26_CR36","DOI":"10.1109\/SP.2016.41"},{"key":"26_CR37","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/34.56205","volume":"12","author":"P Perona","year":"1990","unstructured":"Perona, P., Malik, J.: Scale-space and edge detection using anisotropic diffusion. IEEE Trans. Pattern Anal. Mach. Intell. 12, 629\u2013639 (1990)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"doi-asserted-by":"crossref","unstructured":"Poggi, M., Mattoccia, S.: A wearable mobility aid for the visually impaired based on embedded 3D vision and deep learning. In: 2016 IEEE Symposium on Computers and Communication (ISCC) (2016)","key":"26_CR38","DOI":"10.1109\/ISCC.2016.7543741"},{"key":"26_CR39","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/323533a0","volume":"323","author":"DE Rumelhart","year":"1986","unstructured":"Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning representations by back-propagating errors. Nature 323, 533\u2013536 (1986)","journal-title":"Nature"},{"doi-asserted-by":"crossref","unstructured":"Russakovsky, O., et al.: Imagenet large scale visual recognition challenge. In: International Journal of Computer Vision (IJCV) (2015)","key":"26_CR40","DOI":"10.1007\/s11263-015-0816-y"},{"doi-asserted-by":"crossref","unstructured":"Sarwar, S.S., Panda, P., Roy, K.: Gabor filter assisted energy efficient fast learning convolutional neural networks. CoRR (2017)","key":"26_CR41","DOI":"10.1109\/ISLPED.2017.8009202"},{"unstructured":"Sedghi, H., Gupta, V., Long, P.M.: The singular values of convolutional layers. In: International Conference on Learning Representations (ICLR) (2019)","key":"26_CR42"},{"unstructured":"Shafahi, A., et al.: Adversarial training for free! In: Neural Information Processing Systems (NeurIPS) (2019)","key":"26_CR43"},{"doi-asserted-by":"crossref","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: International Conference on Learning Representations (ICLR) (2015)","key":"26_CR44","DOI":"10.1109\/ICCV.2015.314"},{"key":"26_CR45","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1016\/S0031-3203(02)00086-9","volume":"36","author":"YM Su","year":"2003","unstructured":"Su, Y.M., Wang, J.F.: A novel stroke extraction method for Chinese characters using Gabor filters. Pattern Recogn. 36, 635\u2013647 (2003)","journal-title":"Pattern Recogn."},{"unstructured":"Sun, J., Li, H., Xu, Z., et al.: Deep ADMM-net for compressive sensing MRI. In: Neural Information Systems (NeurIPS) (2016)","key":"26_CR46"},{"unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: International Conference on Learning Representations (ICLR) (2014)","key":"26_CR47"},{"unstructured":"Wong, E., Rice, L., Kolter, J.Z.: Fast is better than free: revisiting adversarial training. In: International Conference on Learning Representations (ICLR) (2020)","key":"26_CR48"},{"unstructured":"Xu, K., et al.: Structured adversarial attack: towards general implementation and better interpretability. In: International Conference on Learning Representations (ICLR) (2019)","key":"26_CR49"},{"doi-asserted-by":"crossref","unstructured":"Yao, H., Chuyi, L., Dan, H., Weiyu, Y.: Gabor feature based convolutional neural network for object recognition in natural scene. In: International Conference on Information Science and Control Engineering (ICISCE) (2016)","key":"26_CR50","DOI":"10.1109\/ICISCE.2016.91"},{"doi-asserted-by":"crossref","unstructured":"Zagoruyko, S., Komodakis, N.: Wide residual networks. In: British Machine Vision Conference (BMVC) (2016)","key":"26_CR51","DOI":"10.5244\/C.30.87"},{"unstructured":"Zhang, D., Zhang, T., Lu, Y., Zhu, Z., Dong, B.: You only propagate once: accelerating adversarial training via maximal principle. In: Neural Information Processing Systems (NeurIPS) (2019)","key":"26_CR52"},{"unstructured":"Zhang, J., Ghanem, B.: Deep learning. In: IEEE Conference on Computer Vision and Patter Recognition (CVPR) (2017)","key":"26_CR53"},{"unstructured":"Zhang, R.: Making convolutional networks shift-invariant again. In: International Con-ference on Machine Learning (ICML) (2019)","key":"26_CR54"},{"doi-asserted-by":"crossref","unstructured":"Zhong, Z., Jin, L., Xie, Z.: High performance offline handwritten Chinese character recognition using Googlenet and directional feature maps. In: International Conference on Document Analysis and Recognition (ICDAR) (2015)","key":"26_CR55","DOI":"10.1109\/ICDAR.2015.7333881"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58545-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T01:13:19Z","timestamp":1730682799000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58545-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030585440","9783030585457"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58545-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"5 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Glasgow","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2020.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OpenReview","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5025","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1360","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic. From the ECCV Workshops 249 full papers, 18 short papers, and 21 further contributions were published out of a total of 467 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}