{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T04:02:41Z","timestamp":1750737761071,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819665785","type":"print"},{"value":"9789819665792","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-6579-2_26","type":"book-chapter","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T12:06:45Z","timestamp":1750680405000},"page":"384-398","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Certified Patch Defense via\u00a0Dual Mask-Preservation Prediction"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-6002-5257","authenticated-orcid":false,"given":"Ziming","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3048-9604","authenticated-orcid":false,"given":"Jun","family":"Yan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8507-015X","authenticated-orcid":false,"given":"Huilin","family":"Yin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,24]]},"reference":[{"key":"26_CR1","unstructured":"Brown, T.B., Man\u00e9, D., Roy, A., Abadi, M., Gilmer, J.: Adversarial patch. In: NeurIPS Workshops (2017)"},{"key":"26_CR2","unstructured":"Cao, Y., Bhupathiraju, S.H., Naghavi, P., Sugawara, T., Mao, Z.M., Rampazzi, S.: You can\u2019t see me: physical removal attacks on $$\\{$$LiDAR-based$$\\}$$ autonomous vehicles driving frameworks. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 2993\u20133010 (2023)"},{"key":"26_CR3","doi-asserted-by":"publisher","unstructured":"Chen, Z., Li, B., Wu, S., Xu, J., Ding, S., Zhang, W.: Shape matters: deformable patch attack. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) European Conference on Computer Vision, pp. 529\u2013548. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-19772-7_31","DOI":"10.1007\/978-3-031-19772-7_31"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Chen, Z., Li, B., Xu, J., Wu, S., Ding, S., Zhang, W.: Towards practical certifiable patch defense with vision transformer. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 15148\u201315158 (2022)","DOI":"10.1109\/CVPR52688.2022.01472"},{"key":"26_CR5","unstructured":"Chiang, P., Ni, R., Abdelkader, A., Zhu, C., Studor, C., Goldstein, T.: Certified defenses for adversarial patches. In: International Conference on Learning Representations (2020)"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"26_CR7","unstructured":"Dosovitskiy, A., et\u00a0al.: An image is worth 16$$\\times $$16 words: transformers for image recognition at scale. In: International Conference on Learning Representations (2020)"},{"key":"26_CR8","first-page":"28169","volume":"34","author":"H Han","year":"2021","unstructured":"Han, H., et al.: ScaleCert: scalable certified defense against adversarial patches with sparse superficial layers. Adv. Neural. Inf. Process. Syst. 34, 28169\u201328181 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Jiang, K., et al.: Efficient decision-based black-box patch attacks on video recognition. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4379\u20134389 (2023)","DOI":"10.1109\/ICCV51070.2023.00404"},{"key":"26_CR11","unstructured":"Karmon, D., Zoran, D., Goldberg, Y.: LaVAN: localized and visible adversarial noise. In: International Conference on Machine Learning, pp. 2507\u20132515. PMLR (2018)"},{"key":"26_CR12","unstructured":"Krizhevsky, A., Hinton, G., et\u00a0al.: Learning multiple layers of features from tiny images (2009)"},{"key":"26_CR13","first-page":"6465","volume":"33","author":"A Levine","year":"2020","unstructured":"Levine, A., Feizi, S.: (de)randomized smoothing for certifiable defense against patch attacks. Adv. Neural. Inf. Process. Syst. 33, 6465\u20136475 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"26_CR14","doi-asserted-by":"publisher","unstructured":"Li, J., Zhang, H., Xie, C.: VIP: unified certified detection and recovery for patch attack with vision transformers. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) European Conference on Computer Vision, pp. 573\u2013587. Springer, Cham. (2022). https:\/\/doi.org\/10.1007\/978-3-031-19806-9_33","DOI":"10.1007\/978-3-031-19806-9_33"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Liu, Z., Mao, H., Wu, C.Y., Feichtenhofer, C., Darrell, T., Xie, S.: A convnet for the 2020s. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 11976\u201311986 (2022)","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"26_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1007\/978-3-030-61638-0_31","volume-title":"Applied Cryptography and Network Security Workshops","author":"M McCoyd","year":"2020","unstructured":"McCoyd, M., et al.: Minority reports defense: defending against adversarial patches. In: Zhou, J., et al. (eds.) ACNS 2020. LNCS, vol. 12418, pp. 564\u2013582. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-61638-0_31"},{"key":"26_CR17","unstructured":"Metzen, J.H., Yatsura, M.: Efficient certified defenses against patch attacks on image classifiers. In: International Conference on Learning Representations (2021)"},{"key":"26_CR18","unstructured":"Saha, A., Yu, S., Norouzzadeh, M.S., Lin, W.Y., Mummadi, C.K.: Revisiting image classifier training for improved certified robust defense against adversarial patches. Trans. Mach. Learn. Res. (2023)"},{"issue":"4","key":"26_CR19","doi-asserted-by":"publisher","first-page":"5314","DOI":"10.1109\/TPAMI.2022.3206148","volume":"45","author":"H Touvron","year":"2022","unstructured":"Touvron, H., et al.: ResMLP: feedforward networks for image classification with data-efficient training. IEEE Trans. Pattern Anal. Mach. Intell. 45(4), 5314\u20135321 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"26_CR20","unstructured":"Wightman, R.: PyTorch image models (2019). https:\/\/github.com\/rwightman\/pytorch-image-models"},{"key":"26_CR21","unstructured":"Xiang, C., Mahloujifar, S., Mittal, P.: $$\\{$$PatchCleanser$$\\}$$: Certifiably robust defense against adversarial patches for any image classifier. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 2065\u20132082 (2022)"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Xiang, C., Valtchanov, A., Mahloujifar, S., Mittal, P.: ObjectSeeker: certifiably robust object detection against patch hiding attacks via patch-agnostic masking. In: 2023 IEEE Symposium on Security and Privacy (SP), pp. 1329\u20131347. IEEE (2023)","DOI":"10.1109\/SP46215.2023.10179319"},{"key":"26_CR23","unstructured":"Xiang, C., Wu, T., Dai, S., Petit, J., Jana, S., Mittal, P.: PatchCURE: improving certifiable robustness, model utility, and computation efficiency of adversarial patch defenses. arXiv preprint arXiv:2310.13076 (2023)"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yuan, B., McCoyd, M., Wagner, D.: Clipped BagNet: defending against sticker attacks with clipped bag-of-features. In: 2020 IEEE Security and Privacy Workshops (SPW), pp. 55\u201361. IEEE (2020)","DOI":"10.1109\/SPW50608.2020.00026"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-6579-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T12:06:52Z","timestamp":1750680412000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-6579-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819665785","9789819665792"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-6579-2_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"24 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Auckland","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Zealand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iconip2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}