{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T09:06:33Z","timestamp":1743757593077,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031453151"},{"type":"electronic","value":"9783031453168"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45316-8_34","type":"book-chapter","created":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:03:14Z","timestamp":1699228994000},"page":"533-547","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Adversarial Attack Versus a\u00a0Bio-Inspired Defensive Method for\u00a0Image Classification"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-1095-9303","authenticated-orcid":false,"given":"Oscar","family":"Garcia-Porras","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6353-0864","authenticated-orcid":false,"given":"Sebasti\u00e1n","family":"Salazar-Colores","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5123-4881","authenticated-orcid":false,"given":"E. Ulises","family":"Moya-S\u00e1nchez","sequence":"additional","affiliation":[]},{"given":"Abraham","family":"S\u00e1nchez-P\u00e9rez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,6]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Bengio, Y.: Learning Deep Architectures for AI, 1st edn. Now Publishers Inc., Dept. IRO, Universit\u00e9 de Montr\u00e9al, Canada (2009)","DOI":"10.1561\/9781601982957"},{"key":"34_CR2","unstructured":"Tan, M., Le, Q.: EfficientNetV2: smaller models and faster training. In: Meila, M., Zhang, T. (eds.) International Conference on Machine Learning, vol. 139, pp. 10096\u201310106. PMLR (2021)"},{"key":"34_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/978-3-030-58558-7_29","volume-title":"Computer Vision \u2013 ECCV 2020","author":"A Kolesnikov","year":"2020","unstructured":"Kolesnikov, A., et al.: Big transfer (BiT): general visual representation learning. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12350, pp. 491\u2013507. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58558-7_29"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Ridnik, T., et al.: TResNet high performance GPU-dedicated architecture. In: IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1399\u20131408. IEEE (2021)","DOI":"10.1109\/WACV48630.2021.00144"},{"key":"34_CR5","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/MSP.2012.2211477","volume":"29","author":"L Deng","year":"2012","unstructured":"Deng, L.: The MNIST database of handwritten digit images for machine learning research [best of the web]. IEEE Signal Process. Mag. 29, 141\u2013142 (2012)","journal-title":"IEEE Signal Process. Mag."},{"key":"34_CR6","unstructured":"Song, H., Kim, M., Lee, JG.: SELFIE: refurbishing unclean samples for robust deep learning. In: Chaudhuri, K., Salakhutdinov, R. (eds.) International Conference on Machine Learning, vol. 97, pp. 5907\u20135915. PMLR (2019)"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Amarathunga, D., Ratnayake, MN., Grundy, J., Dorin, A.: Image data set of two morphologically close thrip species: western flower thrips and plague thrips. Monash University (2022)","DOI":"10.2139\/ssrn.4137865"},{"issue":"170177","key":"34_CR8","first-page":"1","volume":"4","author":"RS Lee","year":"2017","unstructured":"Lee, R.S., et al.: A curated mammography data set for use in computer-aided detection and diagnosis research. Sci. Data 4(170177), 1\u20139 (2017)","journal-title":"Sci. Data"},{"key":"34_CR9","unstructured":"Madry, A., et al.: Towards deep learning models resistant to adversarial attacks. In: 6th International Conference on Learning Representations, ICLR 2018 - Conference Track Proceedings (2018)"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Jagielski, M., et al.: Manipulating machine learning: poisoning attacks and countermeasures for regression learning. In: IEEE Symposium on Security and Privacy (SP), pp. 19\u201335. IEEE (2018)","DOI":"10.1109\/SP.2018.00057"},{"issue":"8","key":"34_CR11","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.3390\/electronics11081283","volume":"11","author":"H Liang","year":"2022","unstructured":"Liang, H., et al.: Adversarial attack and defense a survey. Electronics 11(8), 1283 (2022)","journal-title":"Electronics"},{"key":"34_CR12","doi-asserted-by":"crossref","unstructured":"Papernot, N., et al.: Distillation as a defense to adversarial perturbations against deep neural networks. In: IEEE Symposium on Security and Privacy (SP), pp. 582\u2013597. IEEE (2016)","DOI":"10.1109\/SP.2016.41"},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Folz, J., et al.: Adversarial defense based on structure-to-signal autoencoders. In: IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 3568\u20133577. IEEE (2020)","DOI":"10.1109\/WACV45572.2020.9093310"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Liao, F., et al.: Defense against adversarial attacks using high-level representation guided denoiser. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1778\u20131787. IEEE (2018)","DOI":"10.1109\/CVPR.2018.00191"},{"key":"34_CR15","unstructured":"Kannan, H., Kurakin, A., Goodfellow, I.: Adversarial logit pairing. Cornell University (2018)"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Jia, X., et al.: ComDefend: an efficient image compression model to defend adversarial examples. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 6077\u20136085. IEEE (2019)","DOI":"10.1109\/CVPR.2019.00624"},{"key":"34_CR17","unstructured":"Guo C., et al.: Countering adversarial images using input transformations. Cornell University (2017)"},{"key":"34_CR18","unstructured":"Pouya S., Maya K., Rama C.: Defense-GAN: protecting classifiers against adversarial attacks using generative models. Cornell University (2018)"},{"issue":"53","key":"34_CR19","doi-asserted-by":"publisher","first-page":"2607","DOI":"10.21105\/joss.02607","volume":"5","author":"J Rauber","year":"2020","unstructured":"Rauber, J., et al.: Foolbox native: fast adversarial attacks to benchmark the robustness of machine learning models in PyTorch, TensorFlow, and JAX. Journal of Open Source Software 5(53), 2607 (2020)","journal-title":"Journal of Open Source Software"},{"key":"34_CR20","unstructured":"Krizhevsky, A.: Learning multiple layers of features from tiny images. University of Toronto (2009)"},{"key":"34_CR21","doi-asserted-by":"publisher","first-page":"3136","DOI":"10.1109\/78.969520","volume":"49","author":"M Felsberg","year":"2001","unstructured":"Felsberg, M., Sommer, G.: The monogenic signal. IEEE Trans. Signal Process. 49, 3136\u20133144 (2001)","journal-title":"IEEE Trans. Signal Process."},{"key":"34_CR22","volume-title":"Signal Processing for Computer Vision","author":"GH Granlund","year":"2013","unstructured":"Granlund, G.H., Knutsson, H.: Signal Processing for Computer Vision, 1st edn. Springer, New York (2013)","edition":"1"},{"key":"34_CR23","unstructured":"Bridge, CP.: Introduction to the monogenic signal. Cornell University (2017)"},{"issue":"1","key":"34_CR24","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1049\/cit2.12028","volume":"6","author":"A Chakraborty","year":"2021","unstructured":"Chakraborty, A., et al.: A survey on adversarial attacks and defences. CAAI Trans. Intell. Technol. 6(1), 25\u201345 (2021)","journal-title":"CAAI Trans. Intell. Technol."},{"key":"34_CR25","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: IEEE Symposium on Security and Privacy (SP), pp. 39\u201357. IEEE (2017)","DOI":"10.1109\/SP.2017.49"},{"issue":"1","key":"34_CR26","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1113\/jphysiol.1962.sp006837","volume":"160","author":"DH Hubel","year":"1962","unstructured":"Hubel, D.H., Wiesel, T.N.: Receptive fields, binocular interaction and functional architecture in the cat\u2019s visual cortex. J. Physiol. 160(1), 106\u2013154 (1962)","journal-title":"J. Physiol."},{"key":"34_CR27","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.patrec.2019.12.001","volume":"131","author":"EU Moya-Sanchez","year":"2020","unstructured":"Moya-Sanchez, E.U., et al.: A bio-inspired quaternion local phase CNN layer with contrast invariance and linear sensitivity to rotation angles. Pattern Recogn. Lett. 131, 56\u201362 (2020)","journal-title":"Pattern Recogn. Lett."},{"key":"34_CR28","doi-asserted-by":"publisher","first-page":"163735","DOI":"10.1109\/ACCESS.2021.3128552","volume":"9","author":"EU Moya-Sanchez","year":"2021","unstructured":"Moya-Sanchez, E.U., et al.: A trainable monogenic ConvNet layer robust in front of large contrast changes in image classification. IEEE Access 9, 163735\u2013163746 (2021)","journal-title":"IEEE Access"},{"key":"34_CR29","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., et al.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13, 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"34_CR30","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/MSP.2008.930649","volume":"26","author":"Z Wang","year":"2009","unstructured":"Wang, Z., Bovik, A.C.: Mean squared error: love it or leave it? A new look at signal fidelity measures. IEEE Signal Process. Mag. 26, 98\u2013117 (2009)","journal-title":"IEEE Signal Process. Mag."},{"key":"34_CR31","doi-asserted-by":"publisher","first-page":"e453","DOI":"10.7717\/peerj.453","volume":"2","author":"S Van-der-Walt","year":"2014","unstructured":"Van-der-Walt, S., et al.: Scikit-image: image processing in Python. PeerJ 2, e453 (2014)","journal-title":"PeerJ"},{"key":"34_CR32","doi-asserted-by":"crossref","unstructured":"Jin, G., et al.: Enhancing adversarial training with second-order statistics of weights. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 15252\u201315262. IEEE (2022)","DOI":"10.1109\/CVPR52688.2022.01484"},{"key":"34_CR33","doi-asserted-by":"crossref","unstructured":"Addepalli, S., et al.: Towards achieving adversarial robustness by enforcing feature consistency across bit planes. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1017\u20131026. IEEE (2020)","DOI":"10.1109\/CVPR42600.2020.00110"},{"key":"34_CR34","unstructured":"Robustness (Python Library). https:\/\/github.com\/MadryLab\/robustness. Accessed 18 July 2023"},{"key":"34_CR35","doi-asserted-by":"crossref","unstructured":"He, K., et al.: Deep residual learning for image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770\u2013778. IEEE (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"34_CR36","unstructured":"Collobert, R., Kavukcuoglu, K., Farabet, C.: Torch7: a matlab-like environment for machine learning. In: BigLearn, NIPS workshop. LIDIAP (2011)"}],"container-title":["Communications in Computer and Information Science","Telematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45316-8_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:09:14Z","timestamp":1699229354000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45316-8_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031453151","9783031453168"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45316-8_34","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"6 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WITCOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Congress of Telematics and Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Puerto Vallarta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mexico","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"witcom2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.witcom.upiita.ipn.mx\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"88","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}