{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,26]],"date-time":"2025-04-26T05:07:22Z","timestamp":1745644042528,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031539626"},{"type":"electronic","value":"9783031539633"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53963-3_13","type":"book-chapter","created":{"date-parts":[[2024,3,16]],"date-time":"2024-03-16T05:02:22Z","timestamp":1710565342000},"page":"174-196","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Near Real-Time Detection and\u00a0Rectification of\u00a0Adversarial Patches"],"prefix":"10.1007","author":[{"given":"Ching-Yu","family":"Kao","sequence":"first","affiliation":[]},{"given":"Iheb","family":"Ghanmi","sequence":"additional","affiliation":[]},{"given":"Houcemeddine Ben","family":"Ayed","sequence":"additional","affiliation":[]},{"given":"Ayush","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Konstantin","family":"B\u00f6ttinger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,17]]},"reference":[{"issue":"3","key":"13_CR1","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1531326.1531330","volume":"28","author":"C Barnes","year":"2009","unstructured":"Barnes, C., Shechtman, E., Finkelstein, A., Goldman, D.B.: Patchmatch: a randomized correspondence algorithm for structural image editing. ACM Trans. Graph. 28(3), 7 (2009)","journal-title":"ACM Trans. Graph."},{"key":"13_CR2","unstructured":"Brown, T.B., Man\u00e9, D., Roy, A., Abadi, M., Gilmer, J.: Adversarial patch. arXiv preprint arXiv:1712.09665, 2017"},{"key":"13_CR3","unstructured":"Carlini, N., et al.: On evaluating adversarial robustness. arXiv preprint arXiv:1902.06705 (2019)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 39\u201357. IEEE (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"13_CR5","unstructured":"Borkar, T., Heide, F., Karam, L.: Detecting and mitigating robust and universal adversarial patch attacks, Turning your strength against you (2022)"},{"key":"13_CR6","unstructured":"Evtimov, I.: Cryptography and Security, Robust physical-world attacks on deep learning models. arXiv (2017)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Eykholt, K., et al.: Robust physical-world attacks on deep learning visual classification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1625\u20131634 (2018)","DOI":"10.1109\/CVPR.2018.00175"},{"key":"13_CR8","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"issue":"3","key":"13_CR9","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1002\/rob.21918","volume":"37","author":"S Grigorescu","year":"2020","unstructured":"Grigorescu, S., Trasnea, B., Cocias, T., Macesanu, G.: A survey of deep learning techniques for autonomous driving. J. Field Robot. 37(3), 362\u2013386 (2020)","journal-title":"J. Field Robot."},{"issue":"6","key":"13_CR10","doi-asserted-by":"publisher","first-page":"2023","DOI":"10.1109\/TVCG.2017.2702738","volume":"24","author":"Q Guo","year":"2018","unstructured":"Guo, Q., Gao, S., Zhang, X., Yin, Y., Zhang, C.: Patch-based image inpainting via two-stage low rank approximation. IEEE Trans. Visual Comput. Graphics 24(6), 2023\u20132036 (2018)","journal-title":"IEEE Trans. Visual Comput. Graphics"},{"key":"13_CR11","unstructured":"Guo, Y., Wang, H., Fan, Y., Li, S., Xu, M.: Super-resolution image reconstruction based on self-calibrated convolutional gan. arXiv preprint arXiv:2106.05545 (2021)"},{"key":"13_CR12","unstructured":"Hayes, J.: Adversarial patch. https:\/\/github.com\/jhayes14\/adversarial-patch (2018). Accessed 11 Sep 2022"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Hayes, J.: On visible adversarial perturbations & digital watermarking. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, June 2018","DOI":"10.1109\/CVPRW.2018.00210"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Houben, S., Stallkamp, J., Salmen, J., Schlipsing, M., Igel, C.: Detection of traffic signs in real-world images: the German traffic sign detection benchmark. In: International Joint Conference on Neural Networks, no. 1288 (2013)","DOI":"10.1109\/IJCNN.2013.6706807"},{"issue":"1","key":"13_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-5281-2012-6","volume":"2012","author":"S Hua","year":"2012","unstructured":"Hua, S., Chen, G., Wei, H., Jiang, Q.: Similarity measure for image resizing using sift feature. EURASIP J. Image Video Process. 2012(1), 1\u201311 (2012)","journal-title":"EURASIP J. Image Video Process."},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Isola, P., Zhu, J.Y., Zhou, T., Efros, A.A.: Image-to-image translation with conditional adversarial networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1125\u20131134 (2017)","DOI":"10.1109\/CVPR.2017.632"},{"key":"13_CR17","unstructured":"Karmon, D., Zoran, D., Goldberg, Y., et al.: LaVAN: localized and visible adversarial noise. In: Dy, J., Krause, A. (eds.), Proceedings of the 35th International Conference on Machine Learning, vol. 80 of Proceedings of Machine Learning Research, pp. 2507\u20132515. PMLR, 10\u201315 July 2018"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Komkov, S., Petiushko, A.: AdvHat: real-world adversarial attack on arcface face id system. In: 2020 25th International Conference on Pattern Recognition (ICPR), pp. 819\u2013826. IEEE (2021)","DOI":"10.1109\/ICPR48806.2021.9412236"},{"key":"13_CR19","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236 (2016)"},{"key":"13_CR20","unstructured":"Lee, T.: Lavan python TF. https:\/\/github.com\/lith0613\/LaVAN_python-tf- (2018). Accessed 11 Sep 2022"},{"key":"13_CR21","unstructured":"Levine, A., Feizi, S.: (de)randomized smoothing for certifiable defense against patch attacks. In: Larochelle, H., Ranzato, M., Hadsell, R., Balcan, M.F., Lin, H. (eds.), Advances in Neural Information Processing Systems, vol. 33, pp. 6465\u20136475. Curran Associates Inc (2020)"},{"key":"13_CR22","first-page":"4585","volume":"34","author":"A Levine","year":"2020","unstructured":"Levine, A., Feizi, S.: Robustness certificates for sparse adversarial attacks by randomized ablation. Proc. AAAI Conf. Artif. Intell. 34, 4585\u20134593 (2020)","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Liu, G., Reda, F.A., Shih, K.J., Wang, T.C., Tao, A., Catanzaro, B.: Image inpainting for irregular holes using partial convolutions. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 85\u2013100 (2018)","DOI":"10.1007\/978-3-030-01252-6_6"},{"key":"13_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1007\/978-3-030-58536-5_43","volume-title":"Computer Vision \u2013 ECCV 2020","author":"H Liu","year":"2020","unstructured":"Liu, H., Jiang, B., Song, Y., Huang, W., Yang, C.: Rethinking image inpainting via a mutual encoder-decoder with feature equalizations. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12347, pp. 725\u2013741. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58536-5_43"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Liu, J., Levine, A., Lau, C.P., Chellappa, R., Feizi, S.: Segment and complete: defending object detectors against adversarial patch attacks with robust patch detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 14973\u201314982, June 2022","DOI":"10.1109\/CVPR52688.2022.01455"},{"issue":"1","key":"13_CR26","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/3468507.3468519","volume":"23","author":"N Liu","year":"2021","unstructured":"Liu, N., Mengnan, D., Guo, R., Liu, H., Xia, H.: Adversarial attacks and defenses: an interpretation perspective. SIGKDD Explor. Newsl. 23(1), 86\u201399 (2021)","journal-title":"SIGKDD Explor. Newsl."},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: Proceedings of International Conference on Computer Vision (ICCV), December 2015","DOI":"10.1109\/ICCV.2015.425"},{"key":"13_CR28","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"McGehee, D.V., Mazzae, E.N., Baldwin, G.S.: Driver reaction time in crash avoidance research: Validation of a driving simulator study on a test track. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 44, pp. 3\u2013320. Sage Publications Sage CA, Los Angeles, CA (2000)","DOI":"10.1177\/154193120004402026"},{"issue":"7","key":"13_CR30","first-page":"3523","volume":"44","author":"S Minaee","year":"2022","unstructured":"Minaee, S., Boykov, Y., Porikli, F., Plaza, A., Kehtarnavaz, N., Terzopoulos, D.: Image segmentation using deep learning: a survey. IEEE Trans. Pattern Anal. Mach. Intell. 44(7), 3523\u20133542 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Naseer, M., Khan, S., Porikli, F.: Local gradients smoothing: defense against localized adversarial attacks. In: 2019 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1300\u20131307 (2019)","DOI":"10.1109\/WACV.2019.00143"},{"key":"13_CR32","doi-asserted-by":"crossref","unstructured":"Oyelade, O.N., et al.: A generative adversarial network for synthetization of regions of interest based on digital mammograms. Sci. Rep. 12(1), 1\u201330 (2022)","DOI":"10.1038\/s41598-022-09929-9"},{"key":"13_CR33","doi-asserted-by":"crossref","unstructured":"Pathak, D., Krahenbuhl, P., Donahue, J., Darrell, T., Efros, A.A.: Context encoders: feature learning by inpainting. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2536\u20132544 (2016)","DOI":"10.1109\/CVPR.2016.278"},{"key":"13_CR34","unstructured":"Salimans, T., Goodfellow, I., Zaremba, W., Cheung, V., Radford, A., Chen, X.: Improved techniques for training GANs. In: Advances in Neural Information Processing Systems, vol. 29 (2016)"},{"key":"13_CR35","doi-asserted-by":"crossref","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., Reiter, M.K.: Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1528\u20131540 (2016)","DOI":"10.1145\/2976749.2978392"},{"key":"13_CR36","unstructured":"Silva, S.H., Najafirad, P.: Opportunities and challenges in deep learning adversarial robustness: a survey. ArXiv, abs\/2007.00753 (2020)"},{"key":"13_CR37","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/978-981-15-0372-6_30","volume-title":"Advances in Data Sciences, Security and Applications","author":"NS Singh","year":"2020","unstructured":"Singh, N.S., Hariharan, S., Gupta, M.: Facial recognition using deep learning. In: Jain, V., Chaudhary, G., Taplamacioglu, M.C., Agarwal, M.S. (eds.) Advances in Data Sciences, Security and Applications. LNEE, vol. 612, pp. 375\u2013382. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-0372-6_30"},{"key":"13_CR38","doi-asserted-by":"crossref","unstructured":"Sperl, P., Kao, C.-Y., Chen, P., Lei, X., B\u00f6ttinger, K.: DLA: dense-layer-analysis for adversarial example detection. In: 2020 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 198\u2013215. IEEE (2020)","DOI":"10.1109\/EuroSP48549.2020.00021"},{"key":"13_CR39","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., Fergus, R.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)"},{"key":"13_CR40","unstructured":"Xiang, C., Bhagoji, A.N., Sehwag, V., Mittal, P.: Patchguard: a provably robust defense against adversarial patches via small receptive fields and masking. arXiv preprint arXiv:2005.10884 (2020)"},{"key":"13_CR41","unstructured":"Xiang, C., Mittal, P.: Patchguard++: efficient provable attack detection against adversarial patches. arXiv preprint arXiv:2104.12609 (2021)"},{"key":"13_CR42","doi-asserted-by":"crossref","unstructured":"Yan, Z., Li, X., Li, M., Zuo, W., Shan, S.: Shift-net: image inpainting via deep feature rearrangement. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 1\u201317 (2018)","DOI":"10.1007\/978-3-030-01264-9_1"},{"key":"13_CR43","doi-asserted-by":"crossref","unstructured":"Yang, C., Lu, X., Lin, Z., Shechtman, E., Wang, O., Li, H.: High-resolution image inpainting using multi-scale neural patch synthesis. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6721\u20136729 (2017)","DOI":"10.1109\/CVPR.2017.434"},{"key":"13_CR44","doi-asserted-by":"crossref","unstructured":"Yu, J., Lin, Z., Yang, J., Shen, X., Lu, X., Huang, T.S.: Generative image inpainting with contextual attention. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 5505\u20135514 (2018)","DOI":"10.1109\/CVPR.2018.00577"},{"key":"13_CR45","doi-asserted-by":"crossref","unstructured":"Zeng, Y., Fu, J., Chao, H., Guo, B.: Learning pyramid-context encoder network for high-quality image inpainting. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1486\u20131494 (2019)","DOI":"10.1109\/CVPR.2019.00158"}],"container-title":["Lecture Notes in Networks and Systems","Advances in Information and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53963-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,16]],"date-time":"2024-03-16T05:10:41Z","timestamp":1710565841000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53963-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031539626","9783031539633"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53963-3_13","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"17 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FICC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Future of Information and Communication Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Berlin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ficc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/saiconference.com\/FICC","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}