{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T23:55:21Z","timestamp":1775087721191,"version":"3.50.1"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031729423","type":"print"},{"value":"9783031729430","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T00:00:00Z","timestamp":1732838400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T00:00:00Z","timestamp":1732838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-72943-0_8","type":"book-chapter","created":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T13:39:25Z","timestamp":1732801165000},"page":"130-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["DIFFender: Diffusion-Based Adversarial Defense Against Patch Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-1924-9311","authenticated-orcid":false,"given":"Caixin","family":"Kang","sequence":"first","affiliation":[]},{"given":"Yinpeng","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Zhengyi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shouwei","family":"Ruan","sequence":"additional","affiliation":[]},{"given":"Yubo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hang","family":"Su","sequence":"additional","affiliation":[]},{"given":"Xingxing","family":"Wei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,29]]},"reference":[{"key":"8_CR1","unstructured":"Athalye, A., Carlini, N., Wagner, D.: Obfuscated gradients give a false sense of security: circumventing defenses to adversarial examples. In: International Conference on Machine Learning, pp. 274\u2013283. PMLR (2018)"},{"key":"8_CR2","unstructured":"Brown, T.B., Man\u00e9, D., Roy, A., Abadi, M., Gilmer, J.: Adversarial patch. arXiv preprint arXiv:1712.09665 (2017)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 39\u201357. IEEE (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"8_CR4","unstructured":"Chiang, P.y., Ni, R., Abdelkader, A., Zhu, C., Studer, C., Goldstein, T.: Certified defenses for adversarial patches. arXiv preprint arXiv:2003.06693 (2020)"},{"key":"8_CR5","unstructured":"Couairon, G., Verbeek, J., Schwenk, H., Cord, M.: DiffEdit: diffusion-based semantic image editing with mask guidance. arXiv preprint arXiv:2210.11427 (2022)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Dong, Y., et al.: Benchmarking robustness of 3D object detection to common corruptions. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1022\u20131032 (2023)","DOI":"10.1109\/CVPR52729.2023.00105"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Dong, Y., et al.: Boosting adversarial attacks with momentum. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 9185\u20139193 (2018)","DOI":"10.1109\/CVPR.2018.00957"},{"key":"8_CR9","unstructured":"Dong, Y., Ruan, S., Su, H., Kang, C., Wei, X., Zhu, J.: ViewFool: evaluating the robustness of visual recognition to adversarial viewpoints. arXiv preprint arXiv:2210.03895 (2022)"},{"key":"8_CR10","unstructured":"Dosovitskiy, A., et\u00a0al.: An image is worth $$16\\times 16$$ words: transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)"},{"key":"8_CR11","unstructured":"Dziugaite, G.K., Ghahramani, Z., Roy, D.M.: A study of the effect of JPG compression on adversarial images. arXiv preprint arXiv:1608.00853 (2016)"},{"key":"8_CR12","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Gowal, S., et al.: Scalable verified training for provably robust image classification. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4842\u20134851 (2019)","DOI":"10.1109\/ICCV.2019.00494"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Hayes, J.: On visible adversarial perturbations & digital watermarking. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 1597\u20131604 (2018)","DOI":"10.1109\/CVPRW.2018.00210"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"He, Z., Rakin, A.S., Fan, D.: Parametric noise injection: trainable randomness to improve deep neural network robustness against adversarial attack. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 588\u2013597 (2019)","DOI":"10.1109\/CVPR.2019.00068"},{"key":"8_CR17","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. In: Advances in Neural Information Processing Systems 33, pp. 6840\u20136851 (2020)"},{"key":"8_CR18","unstructured":"Huang, G.B., Mattar, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. In: Workshop on Faces in \u2018Real-Life\u2019 Images: Detection, Alignment, and Recognition (2008)"},{"key":"8_CR19","unstructured":"Jing, P., et al.: Too good to be safe: tricking lane detection in autonomous driving with crafted perturbations. In: Proceedings of USENIX Security Symposium (2021)"},{"key":"8_CR20","unstructured":"Karmon, D., Zoran, D., Goldberg, Y.: LaVAN: localized and visible adversarial noise. In: International Conference on Machine Learning, pp. 2507\u20132515. PMLR (2018)"},{"key":"8_CR21","unstructured":"Kong, L., et\u00a0al.: The RoboDrive Challenge: drive anytime anywhere in any condition. arXiv preprint arXiv:2405.08816 (2024)"},{"key":"8_CR22","unstructured":"Li, X., Ji, S.: Generative dynamic patch attack. In: BMVC (2021)"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Liao, F., Liang, M., Dong, Y., Pang, T., Hu, X., Zhu, J.: Defense against adversarial attacks using high-level representation guided denoiser. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1778\u20131787 (2018)","DOI":"10.1109\/CVPR.2018.00191"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Liu, J., Levine, A., Lau, C.P., Chellappa, R., Feizi, S.: Segment and complete: defending object detectors against adversarial patch attacks with robust patch detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14973\u201314982 (2022)","DOI":"10.1109\/CVPR52688.2022.01455"},{"issue":"10","key":"8_CR25","doi-asserted-by":"publisher","first-page":"6393","DOI":"10.1109\/TPAMI.2021.3087514","volume":"44","author":"K Ma","year":"2021","unstructured":"Ma, K., Xu, Q., Zeng, J., Cao, X., Huang, Q.: Poisoning attack against estimating from pairwise comparisons. IEEE Trans. Pattern Anal. Mach. Intell. 44(10), 6393\u20136408 (2021)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"4","key":"8_CR26","first-page":"4090","volume":"45","author":"K Ma","year":"2022","unstructured":"Ma, K., Xu, Q., Zeng, J., Li, G., Cao, X., Huang, Q.: A tale of hodgerank and spectral method: target attack against rank aggregation is the fixed point of adversarial game. IEEE Trans. Pattern Anal. Mach. Intell. 45(4), 4090\u20134108 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"8_CR27","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Frossard, P.: DeepFool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2574\u20132582 (2016)","DOI":"10.1109\/CVPR.2016.282"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Naseer, M., Khan, S., Porikli, F.: Local gradients smoothing: defense against localized adversarial attacks. In: 2019 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1300\u20131307. IEEE (2019)","DOI":"10.1109\/WACV.2019.00143"},{"key":"8_CR30","unstructured":"Nie, W., Guo, B., Huang, Y., Xiao, C., Vahdat, A., Anandkumar, A.: Diffusion models for adversarial purification. arXiv preprint arXiv:2205.07460 (2022)"},{"key":"8_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/978-3-030-68238-5_32","volume-title":"Computer Vision \u2013 ECCV 2020 Workshops","author":"S Rao","year":"2020","unstructured":"Rao, S., Stutz, D., Schiele, B.: Adversarial training against location-optimized adversarial patches. In: Bartoli, A., Fusiello, A. (eds.) ECCV 2020. LNCS, vol. 12539, pp. 429\u2013448. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-68238-5_32"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Rombach, R., Blattmann, A., Lorenz, D., Esser, P., Ommer, B.: High-resolution image synthesis with latent diffusion models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 10684\u201310695 (2022)","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., Reiter, M.K.: Accessorize to a crime: real and stealthy attacks on state-of-the-art face recognition. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1528\u20131540 (2016)","DOI":"10.1145\/2976749.2978392"},{"key":"8_CR34","unstructured":"Sohl-Dickstein, J., Weiss, E., Maheswaranathan, N., Ganguli, S.: Deep unsupervised learning using nonequilibrium thermodynamics. In: International Conference on Machine Learning, pp. 2256\u20132265 (2015)"},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2818\u20132826 (2016)","DOI":"10.1109\/CVPR.2016.308"},{"key":"8_CR36","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)"},{"key":"8_CR37","doi-asserted-by":"crossref","unstructured":"Tarchoun, B., Ben\u00a0Khalifa, A., Mahjoub, M.A., Abu-Ghazaleh, N., Alouani, I.: Jedi: entropy-based localization and removal of adversarial patches. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4087\u20134095 (2023)","DOI":"10.1109\/CVPR52729.2023.00398"},{"key":"8_CR38","unstructured":"Wang, J., Lyu, Z., Lin, D., Dai, B., Fu, H.: Guided diffusion model for adversarial purification. arXiv preprint arXiv:2205.14969 (2022)"},{"issue":"3","key":"8_CR39","first-page":"2711","volume":"45","author":"X Wei","year":"2023","unstructured":"Wei, X., Guo, Y., Yu, J.: Adversarial sticker: a stealthy attack method in the physical world. IEEE Trans. Pattern Anal. Mach. Intell. 45(3), 2711\u20132725 (2023)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"8_CR40","unstructured":"Wei, X., Pu, B., Lu, J., Wu, B.: Physically adversarial attacks and defenses in computer vision: a survey. arXiv preprint arXiv:2211.01671 (2022)"},{"key":"8_CR41","doi-asserted-by":"crossref","unstructured":"Wei, X., Zhao, S., Li, B.: Revisiting the trade-off between accuracy and robustness via weight distribution of filters. IEEE Trans. Pattern Anal. Mach. Intell. (2024)","DOI":"10.1109\/TPAMI.2024.3411035"},{"key":"8_CR42","unstructured":"Wu, T., Tong, L., Vorobeychik, Y.: Defending against physically realizable attacks on image classification. arXiv preprint arXiv:1909.09552 (2019)"},{"key":"8_CR43","unstructured":"Xiao, C., et al.: DensePure: understanding diffusion models for adversarial robustness. In: The Eleventh International Conference on Learning Representations (2022)"},{"key":"8_CR44","doi-asserted-by":"crossref","unstructured":"Xiao, Z., et al.: Improving transferability of adversarial patches on face recognition with generative models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 11845\u201311854 (2021)","DOI":"10.1109\/CVPR46437.2021.01167"},{"issue":"6","key":"8_CR45","doi-asserted-by":"publisher","first-page":"7668","DOI":"10.1109\/TPAMI.2022.3220849","volume":"45","author":"Q Xu","year":"2022","unstructured":"Xu, Q., Yang, Z., Zhao, Y., Cao, X., Huang, Q.: Rethinking label flipping attack: from sample masking to sample thresholding. IEEE Trans. Pattern Anal. Mach. Intell. 45(6), 7668\u20137685 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"8_CR46","doi-asserted-by":"crossref","unstructured":"Xu, W., Evans, D., Qi, Y.: Feature squeezing: detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155 (2017)","DOI":"10.14722\/ndss.2018.23198"},{"key":"8_CR47","unstructured":"Yin, P., Lyu, J., Zhang, S., Osher, S., Qi, Y., Xin, J.: Understanding straight-through estimator in training activation quantized neural nets. arXiv preprint arXiv:1903.05662 (2019)"},{"key":"8_CR48","doi-asserted-by":"crossref","unstructured":"Yu, C., et al.: Defending against universal adversarial patches by clipping feature norms. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 16434\u201316442 (2021)","DOI":"10.1109\/ICCV48922.2021.01612"},{"key":"8_CR49","doi-asserted-by":"crossref","unstructured":"Zhang, R., Isola, P., Efros, A.A., Shechtman, E., Wang, O.: The unreasonable effectiveness of deep features as a perceptual metric. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 586\u2013595 (2018)","DOI":"10.1109\/CVPR.2018.00068"},{"key":"8_CR50","first-page":"1","volume":"01","author":"S Zhao","year":"2024","unstructured":"Zhao, S., Wang, X., Wei, X.: Mitigating accuracy-robustness trade-off via balanced multi-teacher adversarial distillation. IEEE Trans. Pattern Anal. Mach. Intell. 01, 1\u201314 (2024)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"8_CR51","doi-asserted-by":"crossref","unstructured":"Zhong, Y., Liu, X., Zhai, D., Jiang, J., Ji, X.: Shadows can be dangerous: stealthy and effective physical-world adversarial attack by natural phenomenon. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 15345\u201315354 (2022)","DOI":"10.1109\/CVPR52688.2022.01491"},{"issue":"9","key":"8_CR52","doi-asserted-by":"publisher","first-page":"2337","DOI":"10.1007\/s11263-022-01653-1","volume":"130","author":"K Zhou","year":"2022","unstructured":"Zhou, K., Yang, J., Loy, C.C., Liu, Z.: Learning to prompt for vision-language models. Int. J. Comput. Vis. 130(9), 2337\u20132348 (2022)","journal-title":"Int. J. Comput. Vis."},{"key":"8_CR53","doi-asserted-by":"crossref","unstructured":"Zhu, Z., et al.: Understanding the robustness of 3D object detection with bird\u2019s-eye-view representations in autonomous driving. arXiv preprint arXiv:2303.17297 (2023)","DOI":"10.1109\/CVPR52729.2023.02069"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72943-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T14:17:21Z","timestamp":1732803441000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72943-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,29]]},"ISBN":["9783031729423","9783031729430"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72943-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,29]]},"assertion":[{"value":"29 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}