{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T15:45:04Z","timestamp":1770479104506,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819569625","type":"print"},{"value":"9789819569632","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6963-2_7","type":"book-chapter","created":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T10:08:20Z","timestamp":1770372500000},"page":"80-93","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Ensemble Adversarial Defense via\u00a0Dataset Orthogonal Decomposition"],"prefix":"10.1007","author":[{"given":"Jin","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Jiayu","family":"Du","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhizhong","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,7]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"99112","DOI":"10.1109\/ACCESS.2021.3096136","volume":"9","author":"MTH Fuad","year":"2021","unstructured":"Fuad, M.T.H., Fime, A.A., Sikder, D., et al.: Recent advances in deep learning techniques for face recognition. IEEE Access 9, 99112\u201399142 (2021)","journal-title":"IEEE Access"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"100216","DOI":"10.1016\/j.health.2023.100216","volume":"4","author":"PK Mall","year":"2023","unstructured":"Mall, P.K., Singh, P.K., Srivastav, S., et al.: A comprehensive review of deep neural networks for medical image processing: Recent developments and future opportunities[J]. Healthc. Anal. 4, 100216 (2023)","journal-title":"Healthc. Anal."},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"144","DOI":"10.54254\/2755-2721\/50\/20241379","volume":"50","author":"T Zhang","year":"2024","unstructured":"Zhang, T.: The application of deep learning in autonomous driving. Appl. Comput. Eng. 50, 144\u2013148 (2024)","journal-title":"Appl. Comput. Eng."},{"key":"7_CR4","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., et al.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)"},{"key":"7_CR5","unstructured":"Ilyas, A., Santurkar, S., Tsipras, D., et al.: Adversarial examples are not bugs, they are features. Adv. Neural Inf. Process. Syst. 32 (2019)"},{"key":"7_CR6","unstructured":"Liu, Y., Chen, X., Liu, C., et al.: Delving into transferable adversarial examples and black-box attacks. arXiv preprint arXiv:1611.02770 (2016)"},{"key":"7_CR7","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"7_CR8","unstructured":"Madry, A., Makelov, A., Schmidt, L., et al.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)"},{"key":"7_CR9","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236 (2016)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Frossard, P.: DeepFool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2574\u20132582 (2016)","DOI":"10.1109\/CVPR.2016.282"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 39\u201357. IEEE (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Chen, P.Y., Sharma, Y., Zhang, H., et al.: EAD: elastic-net attacks to deep neural networks via adversarial examples. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 32, no. 1 (2018)","DOI":"10.1609\/aaai.v32i1.11302"},{"key":"7_CR13","unstructured":"Huang, R., Xu, B., Schuurmans, D., et al.: Learning with a strong adversary. arXiv preprint arXiv:1511.03034 (2015)"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Uesato, J., et al.: Robustness via curvature regularization, and vice versa. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9078\u20139086 (2019)","DOI":"10.1109\/CVPR.2019.00929"},{"issue":"4","key":"7_CR15","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1137\/22M1478835","volume":"5","author":"R Muthukumar","year":"2023","unstructured":"Muthukumar, R., Sulam, J.: Adversarial robustness of sparse local Lipschitz predictors. SIAM J. Math. Data Sci. 5(4), 920\u2013948 (2023)","journal-title":"SIAM J. Math. Data Sci."},{"key":"7_CR16","unstructured":"Cohen, J., Rosenfeld, E., Kolter, Z.: Certified adversarial robustness via randomized smoothing. In: International Conference on Machine Learning, pp. 1310\u20131320. PMLR (2019)"},{"key":"7_CR17","unstructured":"Xie, C., Wang, J., Zhang, Z., et al.: Mitigating adversarial effects through randomization. arXiv preprint arXiv:1711.01991 (2017)"},{"key":"7_CR18","unstructured":"Zheng Z, Hong P. Robust detection of adversarial attacks by modeling the intrinsic properties of deep neural networks. Adv. Neural Inf. Process. Syst. 31 (2018)"},{"key":"7_CR19","unstructured":"Pang, T., Xu, K., Du, C., et al.: Improving adversarial robustness via promoting ensemble diversity. In: International Conference on Machine Learning, pp. 4970\u20134979. PMLR (2019)"},{"key":"7_CR20","first-page":"5505","volume":"33","author":"H Yang","year":"2020","unstructured":"Yang, H., Zhang, J., Dong, H., et al.: Dverge: diversifying vulnerabilities for enhanced robust generation of ensembles. Adv. Neural. Inf. Process. Syst. 33, 5505\u20135515 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Huang, B., Ke, Z., Wang, Y., et al.: Adversarial defence by diversified simultaneous training of deep ensembles. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, no. 9, pp. 7823\u20137831 (2021)","DOI":"10.1609\/aaai.v35i9.16955"},{"key":"7_CR22","first-page":"17642","volume":"34","author":"Z Yang","year":"2021","unstructured":"Yang, Z., Li, L., Xu, X., et al.: TRS: transferability reduced ensemble via promoting gradient diversity and model smoothness. Adv. Neural. Inf. Process. Syst. 34, 17642\u201317655 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"7_CR23","unstructured":"Sen, S., Ravindran, B., Raghunathan, A.: EMPIR: ensembles of mixed precision deep networks for increased robustness against adversarial attacks. arXiv preprint arXiv:2004.10162 (2020)"},{"key":"7_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29844-9","volume-title":"Cyberspace Mimic Defense","author":"J Wu","year":"2020","unstructured":"Wu, J.: Cyberspace Mimic Defense. Springer, Cham (2020)"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., et al.: ArcFace: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4690\u20134699 (2019)","DOI":"10.1109\/CVPR.2019.00482"}],"container-title":["Lecture Notes in Computer Science","MultiMedia Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6963-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T10:08:23Z","timestamp":1770372503000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6963-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819569625","9789819569632"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6963-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"7 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MMM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Multimedia Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Prague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2026","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 January 2026","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 January 2026","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mmm2026","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mmm2026.cz\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}