{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:44:18Z","timestamp":1743061458129,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031270659"},{"type":"electronic","value":"9783031270666"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-27066-6_3","type":"book-chapter","created":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T06:02:54Z","timestamp":1678255374000},"page":"33-44","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ADVFilter: Adversarial Example Generated by\u00a0Perturbing Optical Path"],"prefix":"10.1007","author":[{"given":"Lili","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiaodong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,9]]},"reference":[{"key":"3_CR1","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems 2012, pp. 1097\u20131105 (2012)"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.jpdc.2019.03.003","volume":"130","author":"X Wang","year":"2019","unstructured":"Wang, X., Li, J., Kuang, X., Tan, Y., Li, J.: The security of machine learning in an adversarial setting: a survey. J. Parallel Distrib. Comput. 130, 12\u201323 (2019). https:\/\/doi.org\/10.1016\/j.jpdc.2019.03.003","journal-title":"J. Parallel Distrib. Comput."},{"key":"3_CR3","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. Presented at the ICLR (2014). http:\/\/arxiv.org\/abs\/1312.6199. Accessed 22 Aug 2019"},{"key":"3_CR4","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. Presented at the ICLR (2015). http:\/\/arxiv.org\/abs\/1412.6572. Accessed 22 Aug 2019"},{"key":"3_CR5","doi-asserted-by":"publisher","unstructured":"Chen, P.-Y., Zhang, H., Sharma, Y., Yi, J., Hsieh, C.-J.: ZOO: zeroth order optimization based black-box attacks to deep neural networks without training substitute models. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security (AISec), pp. 15\u201326 (2017). https:\/\/doi.org\/10.1145\/3128572.3140448","DOI":"10.1145\/3128572.3140448"},{"key":"3_CR6","unstructured":"Ilyas, A., Engstrom, L., Athalye, A., Lin, J.: Black-box Adversarial Attacks with Limited Queries and Information (2018). http:\/\/arxiv.org\/abs\/1804.08598. Accessed 18 Aug 2019"},{"key":"3_CR7","unstructured":"Tu, C.-C., et al.: AutoZOOM: Autoencoder-Based Zeroth Order Optimization Method for Attacking Black-box Neural Networks (2019). http:\/\/arxiv.org\/abs\/1805.11770. Accessed 18 Aug 2019"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.-M., Fawzi, A., Fawzi, O., Frossard, P.: Universal Adversarial Perturbations, p. 9 (2017)","DOI":"10.1109\/CVPR.2017.17"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1007\/978-3-030-58621-8_46","volume-title":"Computer Vision \u2013 ECCV 2020","author":"Y Li","year":"2020","unstructured":"Li, Y., Bai, S., Xie, C., Liao, Z., Shen, X., Yuille, A.: Regional homogeneity: towards learning transferable universal adversarial perturbations against defenses. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12356, pp. 795\u2013813. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58621-8_46"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, C., Benz, P., Imtiaz, T., Kweon, I.S.: Understanding Adversarial Examples From the Mutual Influence of Images and Perturbations, p. 10 (2020)","DOI":"10.1109\/CVPR42600.2020.01453"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Baluja, S., Fischer, I.: Learning to attack: adversarial transformation networks. In: The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI) 2018, p. 9 (2018)","DOI":"10.1609\/aaai.v32i1.11672"},{"key":"3_CR12","doi-asserted-by":"publisher","unstructured":"Li, M., Yang, Y., Wei, K., Yang, X., Huang, H.: Learning universal adversarial perturbation by adversarial example. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 36, pp. 1350\u20131358 (2022). https:\/\/doi.org\/10.1609\/aaai.v36i2.20023","DOI":"10.1609\/aaai.v36i2.20023"},{"key":"3_CR13","unstructured":"Engstrom, L., Tran, B., Tsipras, D., Schmidt, L., Madry, A.: Exploring the Landscape of Spatial Robustness (2019). http:\/\/arxiv.org\/abs\/1712.02779. Accessed 28 Apr 2022"},{"key":"3_CR14","unstructured":"Alaifari, R., Alberti, G.S., Gauksson, T.: ADef: an Iterative Algorithm to Construct Adversarial Deformations (2019). http:\/\/arxiv.org\/abs\/1804.07729. Accessed 28 Apr 2022"},{"key":"3_CR15","unstructured":"Xiao, C., Zhu, J.-Y., Li, B., He, W., Liu, M., Song, D.: Spatially Transformed Adversarial Examples (2018). http:\/\/arxiv.org\/abs\/1801.02612. Accessed 28 Apr 2022"},{"key":"3_CR16","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial examples in the physical world, arXiv:1607.02533 Cs Stat (2016). http:\/\/arxiv.org\/abs\/1607.02533. Accessed 22 Aug 2019"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., Reiter, M.K.: Accessorize to a crime: real and stealthy attacks on state-of-the-art face recognition. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS 2016, Vienna, Austria, pp. 1528\u20131540 (2016)","DOI":"10.1145\/2976749.2978392"},{"key":"3_CR18","unstructured":"Brown, T.B., Man\u00e9, D., Roy, A., Abadi, M., Gilmer, J.: Adversarial Patch, arXiv:1712.09665 Cs (2017). http:\/\/arxiv.org\/abs\/1712.09665. Accessed 22 Aug 2019"},{"key":"3_CR19","unstructured":"Athalye, A., Engstrom, L., Ilyas, A., Kwok, K.: Synthesizing Robust Adversarial Examples (2018). http:\/\/arxiv.org\/abs\/1707.07397. Accessed 28 July 2019"},{"key":"3_CR20","unstructured":"Athalye, A., Carlini, N., Wagner, D.: Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples (2018). http:\/\/arxiv.org\/abs\/1802.00420. Accessed 18 Aug 2019"},{"key":"3_CR21","doi-asserted-by":"publisher","unstructured":"Eykholt, K., et al.: Robust physical-world attacks on deep learning visual classification. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Salt Lake City, UT, USA, pp. 1625\u20131634 (2018). https:\/\/doi.org\/10.1109\/CVPR.2018.00175","DOI":"10.1109\/CVPR.2018.00175"},{"key":"3_CR22","doi-asserted-by":"publisher","unstructured":"Wang, D., et al.: FCA: learning a 3D full-coverage vehicle camouflage for multi-view physical adversarial attack. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 36, pp. 2414\u20132422 (2022). https:\/\/doi.org\/10.1609\/aaai.v36i2.20141","DOI":"10.1609\/aaai.v36i2.20141"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1007\/978-3-030-58558-7_39","volume-title":"Computer Vision \u2013 ECCV 2020","author":"K Xu","year":"2020","unstructured":"Xu, K., et al.: Adversarial T-shirt! evading person detectors in a physical world. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12350, pp. 665\u2013681. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58558-7_39"},{"key":"3_CR24","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1109\/CEC.2008.4631255","volume":"15","author":"D Wierstra","year":"2014","unstructured":"Wierstra, D., Schaul, T., Peters, J., Schmidhuber, J.: Natural evolution strategies. J. Mach. Learn. Res. 15, 949\u2013980 (2014). https:\/\/doi.org\/10.1109\/CEC.2008.4631255","journal-title":"J. Mach. Learn. Res."}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ACCV 2022 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-27066-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T06:13:05Z","timestamp":1678255985000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-27066-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031270659","9783031270666"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-27066-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"9 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"accv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.accv2022.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT Microsoft","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"836","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"277","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the ACCV 2022 workshops 25 papers have been accepted from 40 submissions","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}