{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:10:36Z","timestamp":1743019836454,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819611478"},{"type":"electronic","value":"9789819611485"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1148-5_8","type":"book-chapter","created":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T13:45:20Z","timestamp":1737121520000},"page":"89-104","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Adversarial Robustness in\u00a0Object Detection via\u00a0Multi-task Learning and\u00a0Class-Aware Adversarial Training"],"prefix":"10.1007","author":[{"given":"Fan","family":"Qin","sequence":"first","affiliation":[]},{"given":"Nan","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Zeping","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Yu-an","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,18]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Chen, P.C., Kung, B.H., Chen, J.C.: Class-aware robust adversarial training for object detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 10420\u201310429 (2021)","key":"8_CR1","DOI":"10.1109\/CVPR46437.2021.01028"},{"doi-asserted-by":"crossref","unstructured":"Chen, S.T., Cornelius, C., Martin, J., Chau, D.H.: ShapeShifter: robust physical adversarial attack on faster R-CNN object detector. In: Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2018, Dublin, Ireland, September 10\u201314, 2018, Proceedings, Part I 18, pp. 52\u201368. Springer (2019)","key":"8_CR2","DOI":"10.1007\/978-3-030-10925-7_4"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-030-60636-7_29","volume-title":"Pattern Recognition and Computer Vision","author":"Q Cheng","year":"2020","unstructured":"Cheng, Q., Wu, Y., Chen, F., Guo, Y.: Balanced loss for accurate object detection. In: Peng, Y., et al. (eds.) Pattern Recognition and Computer Vision, pp. 342\u2013354. Springer, Cham (2020)"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/s11263-014-0733-5","volume":"111","author":"M Everingham","year":"2015","unstructured":"Everingham, M., Eslami, S.A., Van Gool, L., Williams, C.K., Winn, J., Zisserman, A.: The Pascal visual object classes challenge: a retrospective. Int. J. Comput. Vis. 111, 98\u2013136 (2015)","journal-title":"Int. J. Comput. Vis."},{"issue":"3","key":"8_CR5","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/s10994-017-5663-3","volume":"107","author":"A Fawzi","year":"2018","unstructured":"Fawzi, A., Fawzi, O., Frossard, P.: Analysis of classifiers\u2019 robustness to adversarial perturbations. Mach. Learn. 107(3), 481\u2013508 (2018)","journal-title":"Mach. Learn."},{"doi-asserted-by":"crossref","unstructured":"Girshick, R., Donahue, J., Darrell, T., Malik, J.: Rich feature hierarchies for accurate object detection and semantic segmentation. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 580\u2013587 (2014)","key":"8_CR6","DOI":"10.1109\/CVPR.2014.81"},{"unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)","key":"8_CR7"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.ins.2019.05.084","volume":"501","author":"F Guo","year":"2019","unstructured":"Guo, F., et al.: Detecting adversarial examples via prediction difference for deep neural networks. Info. Sci. 501, 182\u2013192 (2019). https:\/\/doi.org\/10.1016\/j.ins.2019.05.084","journal-title":"Info. Sci."},{"issue":"6","key":"8_CR9","doi-asserted-by":"publisher","first-page":"2845","DOI":"10.1109\/TMECH.2021.3100306","volume":"26","author":"M Ilyas","year":"2021","unstructured":"Ilyas, M., Khaw, H.Y., Selvaraj, N.M., Jin, Y., Zhao, X., Cheah, C.C.: Robot-assisted object detection for construction automation: data and information-driven approach. IEEE\/ASME Trans. Mechatron. 26(6), 2845\u20132856 (2021)","journal-title":"IEEE\/ASME Trans. Mechatron."},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"128837","DOI":"10.1109\/ACCESS.2019.2939201","volume":"7","author":"L Jiao","year":"2019","unstructured":"Jiao, L., et al.: A survey of deep learning-based object detection. IEEE Access 7, 128837\u2013128868 (2019)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Lin, T.Y., et al.: Microsoft CoCo: common objects in context. In: Computer Vision\u2013ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part V 13, pp. 740\u2013755. Springer (2014)","key":"8_CR11","DOI":"10.1007\/978-3-319-10602-1_48"},{"unstructured":"Lu, J., Sibai, H., Fabry, E., Forsyth, D.: No need to worry about adversarial examples in object detection in autonomous vehicles. arXiv preprint arXiv:1707.03501 (2017)","key":"8_CR12"},{"unstructured":"Madry, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)","key":"8_CR13"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.neucom.2022.10.046","volume":"519","author":"JX Mi","year":"2023","unstructured":"Mi, J.X., Wang, X.D., Zhou, L.F., Cheng, K.: Adversarial examples based on object detection tasks: a survey. Neurocomputing 519, 114\u2013126 (2023)","journal-title":"Neurocomputing"},{"doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Frossard, P.: DeepFool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2574\u20132582 (2016)","key":"8_CR15","DOI":"10.1109\/CVPR.2016.282"},{"key":"8_CR16","first-page":"7779","volume":"33","author":"T Pang","year":"2020","unstructured":"Pang, T., Yang, X., Dong, Y., Xu, K., Zhu, J., Su, H.: Boosting adversarial training with hypersphere embedding. Adv. Neural. Inf. Process. Syst. 33, 7779\u20137792 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"doi-asserted-by":"crossref","unstructured":"Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You only look once: unified, real-time object detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 779\u2013788 (2016)","key":"8_CR17","DOI":"10.1109\/CVPR.2016.91"},{"unstructured":"Ren, S.: Faster R-CNN: towards real-time object detection with region proposal networks. arXiv preprint arXiv:1506.01497 (2015)","key":"8_CR18"},{"issue":"5","key":"8_CR19","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1109\/T-C.1971.223290","volume":"100","author":"A Rosenfeld","year":"1971","unstructured":"Rosenfeld, A., Thurston, M.: Edge and curve detection for visual scene analysis. IEEE Trans. Comput. 100(5), 562\u2013569 (1971)","journal-title":"IEEE Trans. Comput."},{"unstructured":"Shafahi, A., et al.: Adversarial training for free! Adv. Neural Info. Process. Syst. 32 (2019)","key":"8_CR20"},{"doi-asserted-by":"crossref","unstructured":"Song, Z., et al.: Robustness-aware 3D object detection in autonomous driving: a review and outlook. IEEE Trans. Intell. Transp. Syst. (2024)","key":"8_CR21","DOI":"10.1109\/TITS.2024.3439557"},{"unstructured":"Szegedy, C.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)","key":"8_CR22"},{"issue":"7","key":"8_CR23","doi-asserted-by":"publisher","first-page":"3781","DOI":"10.1109\/TIV.2023.3264658","volume":"8","author":"L Wang","year":"2023","unstructured":"Wang, L., et al.: Multi-modal 3D object detection in autonomous driving: a survey and taxonomy. IEEE Trans. Intell. Veh. 8(7), 3781\u20133798 (2023)","journal-title":"IEEE Trans. Intell. Veh."},{"key":"8_CR24","doi-asserted-by":"publisher","first-page":"102634","DOI":"10.1016\/j.jnca.2020.102634","volume":"161","author":"Y Wang","year":"2020","unstructured":"Wang, Y., Tan, Y.A., Zhang, W., Zhao, Y., Kuang, X.: An adversarial attack on DNN-based black-box object detectors. J. Netw. Comput. Appl. 161, 102634 (2020). https:\/\/doi.org\/10.1016\/j.jnca.2020.102634","journal-title":"J. Netw. Comput. Appl."},{"doi-asserted-by":"crossref","unstructured":"Xie, C., Wang, J., Zhang, Z., Zhou, Y., Xie, L., Yuille, A.: Adversarial examples for semantic segmentation and object detection. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 1369\u20131378 (2017)","key":"8_CR25","DOI":"10.1109\/ICCV.2017.153"},{"doi-asserted-by":"crossref","unstructured":"Zhang, H., Wang, J.: Towards adversarially robust object detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV) (2019)","key":"8_CR26","DOI":"10.1109\/ICCV.2019.00051"},{"issue":"12","key":"8_CR27","doi-asserted-by":"publisher","first-page":"7722","DOI":"10.1109\/TII.2019.2954956","volume":"16","author":"H Zhang","year":"2019","unstructured":"Zhang, H., Li, D., Ji, Y., Zhou, H., Wu, W., Liu, K.: Toward new retail: a benchmark dataset for smart unmanned vending machines. IEEE Trans. Industr. Inf. 16(12), 7722\u20137731 (2019)","journal-title":"IEEE Trans. Industr. Inf."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1148-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T13:45:29Z","timestamp":1737121529000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1148-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819611478","9789819611485"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1148-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"18 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIS&P","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ais&p2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}