{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:55:37Z","timestamp":1764784537779,"version":"3.40.3"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030585914"},{"type":"electronic","value":"9783030585921"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58592-1_24","type":"book-chapter","created":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T00:34:03Z","timestamp":1604363643000},"page":"396-413","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency"],"prefix":"10.1007","author":[{"given":"Shasha","family":"Li","sequence":"first","affiliation":[]},{"given":"Shitong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Sudipta","family":"Paul","sequence":"additional","affiliation":[]},{"given":"Amit","family":"Roy-Chowdhury","sequence":"additional","affiliation":[]},{"given":"Chengyu","family":"Song","sequence":"additional","affiliation":[]},{"given":"Srikanth","family":"Krishnamurthy","sequence":"additional","affiliation":[]},{"given":"Ananthram","family":"Swami","sequence":"additional","affiliation":[]},{"given":"Kevin S.","family":"Chan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,3]]},"reference":[{"unstructured":"Athalye, A., Engstrom, L., Ilyas, A., Kwok, K.: Synthesizing robust adversarial examples. arXiv preprint arXiv:1707.07397 (2017)","key":"24_CR1"},{"unstructured":"Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473 (2014)","key":"24_CR2"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-319-46484-8_14","volume-title":"Computer Vision \u2013 ECCV 2016","author":"JH Bappy","year":"2016","unstructured":"Bappy, J.H., Paul, S., Roy-Chowdhury, A.K.: Online adaptation for joint scene and object classification. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9912, pp. 227\u2013243. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46484-8_14"},{"doi-asserted-by":"crossref","unstructured":"Barnea, E., Ben-Shahar, O.: Exploring the bounds of the utility of context for object detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 7412\u20137420 (2019)","key":"24_CR4","DOI":"10.1109\/CVPR.2019.00759"},{"doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Adversarial examples are not easily detected: bypassing ten detection methods. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp. 3\u201314 (2017)","key":"24_CR5","DOI":"10.1145\/3128572.3140444"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-030-10925-7_4","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"S-T Chen","year":"2019","unstructured":"Chen, S.-T., Cornelius, C., Martin, J., Chau, D.H.P.: ShapeShifter: robust physical adversarial attack on faster R-CNN object detector. In: Berlingerio, M., Bonchi, F., G\u00e4rtner, T., Hurley, N., Ifrim, G. (eds.) ECML PKDD 2018. LNCS (LNAI), vol. 11051, pp. 52\u201368. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-10925-7_4"},{"doi-asserted-by":"crossref","unstructured":"Chen, X., Gupta, A.: Spatial memory for context reasoning in object detection. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 4086\u20134096 (2017)","key":"24_CR7","DOI":"10.1109\/ICCV.2017.440"},{"doi-asserted-by":"crossref","unstructured":"Cho, K., Van Merri\u00ebnboer, B., Bahdanau, D., Bengio, Y.: On the properties of neural machine translation: encoder-decoder approaches. arXiv preprint arXiv:1409.1259 (2014)","key":"24_CR8","DOI":"10.3115\/v1\/W14-4012"},{"issue":"2","key":"24_CR9","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1109\/TPAMI.2011.119","volume":"34","author":"MJ Choi","year":"2011","unstructured":"Choi, M.J., Torralba, A., Willsky, A.S.: A tree-based context model for object recognition. IEEE Trans. Pattern Anal. Mach. Intell. 34(2), 240\u2013252 (2011)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)","key":"24_CR10"},{"doi-asserted-by":"crossref","unstructured":"Dvornik, N., Mairal, J., Schmid, C.: Modeling visual context is key to augmenting object detection datasets. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 364\u2013380 (2018)","key":"24_CR11","DOI":"10.1007\/978-3-030-01258-8_23"},{"issue":"2","key":"24_CR12","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11263-009-0275-4","volume":"88","author":"M Everingham","year":"2010","unstructured":"Everingham, M., Van Gool, L., Williams, C.K., Winn, J., Zisserman, A.: The pascal visual object classes (VOC) challenge. Int. J. Comput. Vision 88(2), 303\u2013338 (2010)","journal-title":"Int. J. Comput. Vision"},{"doi-asserted-by":"crossref","unstructured":"Eykholt, K., et al.: Robust physical-world attacks on deep learning visual classification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1625\u20131634 (2018)","key":"24_CR13","DOI":"10.1109\/CVPR.2018.00175"},{"unstructured":"Feinman, R., Curtin, R.R., Shintre, S., Gardner, A.B.: Detecting adversarial samples from artifacts. arXiv preprint arXiv:1703.00410 (2017)","key":"24_CR14"},{"issue":"9","key":"24_CR15","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1109\/TPAMI.2009.167","volume":"32","author":"PF Felzenszwalb","year":"2009","unstructured":"Felzenszwalb, P.F., Girshick, R.B., McAllester, D., Ramanan, D.: Object detection with discriminatively trained part-based models. IEEE Trans. Pattern Anal. Mach. Intell. 32(9), 1627\u20131645 (2009)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"unstructured":"Gong, Z., Wang, W., Ku, W.S.: Adversarial and clean data are not twins. arXiv preprint arXiv:1704.04960 (2017)","key":"24_CR16"},{"unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)","key":"24_CR17"},{"doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","key":"24_CR18","DOI":"10.1109\/CVPR.2016.90"},{"unstructured":"Hendrycks, D., Gimpel, K.: Early methods for detecting adversarial images. arXiv preprint arXiv:1608.00530 (2016)","key":"24_CR19"},{"unstructured":"Hinton, G.E., Srivastava, N., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.R.: Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580 (2012)","key":"24_CR20"},{"issue":"4","key":"24_CR21","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1037\/0096-3445.127.4.398","volume":"127","author":"A Hollingworth","year":"1998","unstructured":"Hollingworth, A.: Does consistent scene context facilitate object perception? J. Exp. Psychol. Gen 127(4), 398 (1998)","journal-title":"J. Exp. Psychol. Gen"},{"doi-asserted-by":"crossref","unstructured":"Hu, H., Gu, J., Zhang, Z., Dai, J., Wei, Y.: Relation networks for object detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3588\u20133597 (2018)","key":"24_CR22","DOI":"10.1109\/CVPR.2018.00378"},{"key":"24_CR23","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1007\/978-1-4612-4380-9_35","volume-title":"Breakthroughs in Statistics","author":"PJ Huber","year":"1992","unstructured":"Huber, P.J.: Robust estimation of a location parameter. In: Kotz, S., Johnson, N.L. (eds.) Breakthroughs in Statistics, pp. 492\u2013518. Springer, New York (1992). https:\/\/doi.org\/10.1007\/978-1-4612-4380-9_35"},{"doi-asserted-by":"crossref","unstructured":"Jia, X., Wei, X., Cao, X., Foroosh, H.: ComDefend: an efficient image compression model to defend adversarial examples. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6084\u20136092 (2019)","key":"24_CR24","DOI":"10.1109\/CVPR.2019.00624"},{"doi-asserted-by":"crossref","unstructured":"Jin, D., Gao, S., Kao, J.Y., Chung, T., Hakkani-tur, D.: MMM: multi-stage multi-task learning for multi-choice reading comprehension. arXiv preprint arXiv:1910.00458 (2019)","key":"24_CR25","DOI":"10.1609\/aaai.v34i05.6310"},{"unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 (2016)","key":"24_CR26"},{"issue":"5","key":"24_CR27","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/TMM.2016.2642789","volume":"19","author":"J Li","year":"2016","unstructured":"Li, J., et al.: Attentive contexts for object detection. IEEE Trans. Multimedia 19(5), 944\u2013954 (2016)","journal-title":"IEEE Trans. Multimedia"},{"doi-asserted-by":"crossref","unstructured":"Li, S., et al.: Stealthy adversarial perturbations against real-time video classification systems. In: NDSS (2019)","key":"24_CR28","DOI":"10.14722\/ndss.2019.23202"},{"doi-asserted-by":"crossref","unstructured":"Li, X., Li, F.: Adversarial examples detection in deep networks with convolutional filter statistics. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 5764\u20135772 (2017)","key":"24_CR29","DOI":"10.1109\/ICCV.2017.615"},{"unstructured":"Liang, B., Li, H., Su, M., Li, X., Shi, W., Wang, X.: Detecting adversarial image examples in deep neural networks with adaptive noise reduction. IEEE Trans. Dependable Secure Comput. (2018)","key":"24_CR30"},{"doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Goyal, P., Girshick, R., He, K., Doll\u00e1r, P.: Focal loss for dense object detection. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2980\u20132988 (2017)","key":"24_CR31","DOI":"10.1109\/ICCV.2017.324"},{"key":"24_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-319-10602-1_48","volume-title":"Computer Vision \u2013 ECCV 2014","author":"T-Y Lin","year":"2014","unstructured":"Lin, T.-Y., et al.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8693, pp. 740\u2013755. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10602-1_48"},{"doi-asserted-by":"crossref","unstructured":"Liu, J., et al.: Detection based defense against adversarial examples from the steganalysis point of view. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4825\u20134834 (2019)","key":"24_CR33","DOI":"10.1109\/CVPR.2019.00496"},{"key":"24_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-46448-0_2","volume-title":"Computer Vision \u2013 ECCV 2016","author":"W Liu","year":"2016","unstructured":"Liu, W., et al.: SSD: single shot MultiBox detector. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9905, pp. 21\u201337. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46448-0_2"},{"doi-asserted-by":"crossref","unstructured":"Liu, Y., Wang, R., Shan, S., Chen, X.: Structure inference net: object detection using scene-level context and instance-level relationships. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6985\u20136994 (2018)","key":"24_CR35","DOI":"10.1109\/CVPR.2018.00730"},{"doi-asserted-by":"crossref","unstructured":"Lu, J., Issaranon, T., Forsyth, D.: SafetyNet: detecting and rejecting adversarial examples robustly. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 446\u2013454 (2017)","key":"24_CR36","DOI":"10.1109\/ICCV.2017.56"},{"issue":"3","key":"24_CR37","doi-asserted-by":"publisher","first-page":"1344","DOI":"10.1109\/LRA.2017.2667039","volume":"2","author":"C McCool","year":"2017","unstructured":"McCool, C., Perez, T., Upcroft, B.: Mixtures of lightweight deep convolutional neural networks: applied to agricultural robotics. IEEE Robot. Autom. Lett. 2(3), 1344\u20131351 (2017)","journal-title":"IEEE Robot. Autom. Lett."},{"unstructured":"Metzen, J.H., Genewein, T., Fischer, V., Bischoff, B.: On detecting adversarial perturbations. arXiv preprint arXiv:1702.04267 (2017)","key":"24_CR38"},{"doi-asserted-by":"crossref","unstructured":"Mottaghi, R., et al.: The role of context for object detection and semantic segmentation in the wild. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 891\u2013898 (2014)","key":"24_CR39","DOI":"10.1109\/CVPR.2014.119"},{"doi-asserted-by":"crossref","unstructured":"Oliva, A., Torralba, A., Castelhano, M.S., Henderson, J.M.: Top-down control of visual attention in object detection. In: Proceedings 2003 International Conference on Image Processing (Cat. No. 03CH37429), vol. 1, pp. I-253. IEEE (2003)","key":"24_CR40","DOI":"10.1109\/ICIP.2003.1246946"},{"doi-asserted-by":"crossref","unstructured":"Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You only look once: unified, real-time object detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 779\u2013788 (2016)","key":"24_CR41","DOI":"10.1109\/CVPR.2016.91"},{"unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster R-CNN: towards real-time object detection with region proposal networks. In: Advances in Neural Information Processing Systems, pp. 91\u201399 (2015)","key":"24_CR42"},{"unstructured":"Song, D., et al.: Physical adversarial examples for object detectors. In: 12th USENIX Workshop on Offensive Technologies (WOOT 2018) (2018)","key":"24_CR43"},{"doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2818\u20132826 (2016)","key":"24_CR44","DOI":"10.1109\/CVPR.2016.308"},{"issue":"2","key":"24_CR45","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1023\/A:1023052124951","volume":"53","author":"A Torralba","year":"2003","unstructured":"Torralba, A.: Contextual priming for object detection. Int. J. Comput. Vision 53(2), 169\u2013191 (2003)","journal-title":"Int. J. Comput. Vision"},{"key":"24_CR46","doi-asserted-by":"publisher","first-page":"41062","DOI":"10.1109\/ACCESS.2020.2973243","volume":"8","author":"J Xie","year":"2020","unstructured":"Xie, J., Yang, J., Ding, C., Li, W.: High accuracy individual identification model of crested ibis (Nipponia Nippon) based on autoencoder with self-attention. IEEE Access 8, 41062\u201341070 (2020)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Xu, W., Evans, D., Qi, Y.: Feature squeezing: detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155 (2017)","key":"24_CR47","DOI":"10.14722\/ndss.2018.23198"},{"doi-asserted-by":"crossref","unstructured":"Zhao, Y., Zhu, H., Liang, R., Shen, Q., Zhang, S., Chen, K.: Seeing isn\u2019t believing: towards more robust adversarial attack against real world object detectors. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1989\u20132004 (2019)","key":"24_CR48","DOI":"10.1145\/3319535.3354259"},{"unstructured":"Zhu, S., et al.: A4: evading learning-based adblockers. arXiv preprint arXiv:2001.10999 (2020)","key":"24_CR49"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58592-1_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,3]],"date-time":"2024-11-03T00:27:50Z","timestamp":1730593670000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58592-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030585914","9783030585921"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58592-1_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"3 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Glasgow","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2020.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OpenReview","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5025","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1360","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}