{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:57:48Z","timestamp":1769749068179,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":41,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819556953","type":"print"},{"value":"9789819556960","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5696-0_4","type":"book-chapter","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T14:03:54Z","timestamp":1769695434000},"page":"47-60","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["GMDMP: Gaussian Mixture Diffusion Model for\u00a0Adversarial Purification"],"prefix":"10.1007","author":[{"given":"Yongbo","family":"Li","sequence":"first","affiliation":[]},{"given":"Wenhua","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Zhijie","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Mengjie","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianwen","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,30]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Augustin, M., Meinke, A., Hein, M.: Adversarial robustness on in-and out-distribution improves explainability. In: European Conference on Computer Vision, pp. 228\u2013245. Springer (2020)","DOI":"10.1007\/978-3-030-58574-7_14"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Bai, T., Luo, J., Zhao, J., Wen, B., Wang, Q.: Recent advances in adversarial training for adversarial robustness. arXiv preprint arXiv:2102.01356 (2021)","DOI":"10.24963\/ijcai.2021\/591"},{"key":"4_CR3","unstructured":"Croce, F., et al.: Robustbench: a standardized adversarial robustness benchmark. arXiv preprint arXiv:2010.09670 (2020)"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"74461","DOI":"10.52202\/079017-2370","volume":"37","author":"J Cui","year":"2024","unstructured":"Cui, J., Tian, Z., Zhong, Z., Qi, X., Yu, B., Zhang, H.: Decoupled kullback-leibler divergence loss. Adv. Neural. Inf. Process. Syst. 37, 74461\u201374486 (2024)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"4_CR5","unstructured":"Ding, G.W., Sharma, Y., Lui, K.Y.C., Huang, R.: MMA training: direct input space margin maximization through adversarial training. arXiv preprint arXiv:1812.02637 (2018)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Dolatabadi, H.M., Erfani, S., Leckie, C.: -robustness and beyond: Unleashing efficient adversarial training. In: European Conference on Computer Vision, pp. 467\u2013483. Springer (2022)","DOI":"10.1007\/978-3-031-20083-0_28"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Frosio, I., Kautz, J.: The best defense is a good offense: adversarial augmentation against adversarial attacks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4067\u20134076 (2023)","DOI":"10.1109\/CVPR52729.2023.00396"},{"key":"4_CR8","unstructured":"Gowal, S., et al.: On the effectiveness of interval bound propagation for training verifiably robust models. arXiv preprint arXiv:1810.12715 (2018)"},{"key":"4_CR9","unstructured":"Gowal, S., Qin, C., Uesato, J., Mann, T., Kohli, P.: Uncovering the limits of adversarial training against norm-bounded adversarial examples. arXiv preprint arXiv:2010.03593 (2020)"},{"key":"4_CR10","first-page":"4218","volume":"34","author":"S Gowal","year":"2021","unstructured":"Gowal, S., Rebuffi, S.A., Wiles, O., Stimberg, F., Calian, D.A., Mann, T.A.: Improving robustness using generated data. Adv. Neural. Inf. Process. Syst. 34, 4218\u20134233 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"4_CR12","unstructured":"Hill, M., Mitchell, J., Zhu, S.C.: Stochastic security: adversarial defense using long-run dynamics of energy-based models. arXiv preprint arXiv:2005.13525 (2020)"},{"key":"4_CR13","first-page":"6840","volume":"33","author":"J Ho","year":"2020","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. Adv. Neural. Inf. Process. Syst. 33, 6840\u20136851 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"4_CR14","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. Adv. Neural Inf. Process. Syst. 25 (2012)"},{"key":"4_CR15","unstructured":"Laidlaw, C., Singla, S., Feizi, S.: Perceptual adversarial robustness: defense against unseen threat models. arXiv preprint arXiv:2006.12655 (2020)"},{"key":"4_CR16","unstructured":"Ma, H., Zhang, L., Zhu, X., Feng, J.: Approximated anomalous diffusion: gaussian mixture score-based generative models (2023)"},{"key":"4_CR17","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)"},{"key":"4_CR18","unstructured":"Nachmani, E., Roman, R.S., Wolf, L.: Non gaussian denoising diffusion models. arXiv preprint arXiv:2106.07582 (2021)"},{"key":"4_CR19","unstructured":"Nichol, A.Q., Dhariwal, P.: Improved denoising diffusion probabilistic models. In: International Conference on Machine Learning, pp. 8162\u20138171. PMLR (2021)"},{"key":"4_CR20","unstructured":"Nie, W., Guo, B., Huang, Y., Xiao, C., Vahdat, A., Anandkumar, A.: Diffusion models for adversarial purification. arXiv preprint arXiv:2205.07460 (2022)"},{"key":"4_CR21","unstructured":"Ning, M., Li, M., Su, J., Salah, A.A., Ertugrul, I.O.: Elucidating the exposure bias in diffusion models. arXiv preprint arXiv:2308.15321 (2023)"},{"key":"4_CR22","unstructured":"Rebuffi, S.A., Gowal, S., Calian, D.A., Stimberg, F., Wiles, O., Mann, T.: Fixing data augmentation to improve adversarial robustness. arXiv preprint arXiv:2103.01946 (2021)"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Rony, J., Hafemann, L.G., Oliveira, L.S., Ayed, I.B., Sabourin, R., Granger, E.: Decoupling direction and norm for efficient gradient-based l2 adversarial attacks and defenses. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4322\u20134330 (2019)","DOI":"10.1109\/CVPR.2019.00445"},{"key":"4_CR24","first-page":"3533","volume":"33","author":"H Salman","year":"2020","unstructured":"Salman, H., Ilyas, A., Engstrom, L., Kapoor, A., Madry, A.: Do adversarially robust imagenet models transfer better? Adv. Neural. Inf. Process. Syst. 33, 3533\u20133545 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"4_CR25","unstructured":"Samangouei, P., Kabkab, M., Chellappa, R.: Defense-GAN: protecting classifiers against adversarial attacks using generative models. arXiv preprint arXiv:1805.06605 (2018)"},{"key":"4_CR26","unstructured":"Sehwag, V., Mahloujifar, S., Handina, T., Dai, S., Xiang, C., Chiang, M., Mittal, P.: Robust learning meets generative models: can proxy distributions improve adversarial robustness? arXiv preprint arXiv:2104.09425 (2021)"},{"key":"4_CR27","unstructured":"Shi, C., Holtz, C., Mishne, G.: Online adversarial purification based on self-supervision. arXiv preprint arXiv:2101.09387 (2021)"},{"key":"4_CR28","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)"},{"key":"4_CR29","unstructured":"Sohl-Dickstein, J., Weiss, E., Maheswaranathan, N., Ganguli, S.: Deep unsupervised learning using nonequilibrium thermodynamics. In: International Conference on Machine Learning, pp. 2256\u20132265. pmlr (2015)"},{"key":"4_CR30","unstructured":"Song, Y., Sohl-Dickstein, J., Kingma, D.P., Kumar, A., Ermon, S., Poole, B.: Score-based generative modeling through stochastic differential equations. arXiv preprint arXiv:2011.13456 (2020)"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Szegedy, C., et al.: Going deeper with convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp.\u00a01\u20139 (2015)","DOI":"10.1109\/CVPR.2015.7298594"},{"issue":"9","key":"4_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3672080","volume":"20","author":"H Wang","year":"2024","unstructured":"Wang, H., Zhai, D., Zhou, X., Jiang, J., Liu, X.: Mix-ddpm: Enhancing diffusion models through fitting mixture noise with global stochastic offset. ACM Trans. Multimedia Comput. Commun. Appl. 20(9), 1\u201324 (2024)","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl."},{"key":"4_CR33","unstructured":"Wang, J., Lyu, Z., Lin, D., Dai, B., Fu, H.: Guided diffusion model for adversarial purification. arXiv preprint arXiv:2205.14969 (2022)"},{"key":"4_CR34","unstructured":"Wang, Z., Pang, T., Du, C., Lin, M., Liu, W., Yan, S.: Better diffusion models further improve adversarial training. In: International Conference on Machine Learning, pp. 36246\u201336263. PMLR (2023)"},{"key":"4_CR35","unstructured":"Wong, E., Rice, L., Kolter, J.Z.: Fast is better than free: revisiting adversarial training. arXiv preprint arXiv:2001.03994 (2020)"},{"key":"4_CR36","first-page":"2958","volume":"33","author":"D Wu","year":"2020","unstructured":"Wu, D., Xia, S.T., Wang, Y.: Adversarial weight perturbation helps robust generalization. Adv. Neural. Inf. Process. Syst. 33, 2958\u20132969 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"4_CR37","unstructured":"Xu, Y., Sun, Y., Goldblum, M., Goldstein, T., Huang, F.: Exploring and exploiting decision boundary dynamics for adversarial robustness. arXiv preprint arXiv:2302.03015 (2023)"},{"key":"4_CR38","unstructured":"Yoon, J., Hwang, S.J., Lee, J.: Adversarial purification with score-based generative models. In: International Conference on Machine Learning, pp. 12062\u201312072. PMLR (2021)"},{"key":"4_CR39","doi-asserted-by":"crossref","unstructured":"Zagoruyko, S., Komodakis, N.: Wide residual networks. arXiv preprint arXiv:1605.07146 (2016)","DOI":"10.5244\/C.30.87"},{"key":"4_CR40","unstructured":"Zhang, H., Weng, T.W., Chen, P.Y., Hsieh, C.J., Daniel, L.: Efficient neural network robustness certification with general activation functions. Adv. Neural Inf. Process. Syst. 31 (2018)"},{"key":"4_CR41","unstructured":"Zhang, J., Zhu, J., Niu, G., Han, B., Sugiyama, M., Kankanhalli, M.: Geometry-aware instance-reweighted adversarial training. arXiv preprint arXiv:2010.01736 (2020)"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5696-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T14:04:08Z","timestamp":1769695448000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5696-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819556953","9789819556960"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5696-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"30 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2025.prcv.cn\/index.asp","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}