{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:20Z","timestamp":1740122660163,"version":"3.37.3"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T00:00:00Z","timestamp":1724889600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T00:00:00Z","timestamp":1724889600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["no. 62072106"],"award-info":[{"award-number":["no. 62072106"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"General Project of Natural Science Foundation in Fujian Province","award":["no. 2020J01168"],"award-info":[{"award-number":["no. 2020J01168"]}]},{"name":"Open Project of Fujian Key Laboratory of Severe Weather","award":["no. 2020KFKT04"],"award-info":[{"award-number":["no. 2020KFKT04"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s10489-024-05735-0","type":"journal-article","created":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T01:02:01Z","timestamp":1724893321000},"page":"10819-10832","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PatchBreaker: defending against adversarial attacks by cutting-inpainting patches and joint adversarial training"],"prefix":"10.1007","volume":"54","author":[{"given":"Shiyu","family":"Huang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5163-3006","authenticated-orcid":false,"given":"Feng","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Zuchao","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Tianqiang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Liqing","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,29]]},"reference":[{"key":"5735_CR1","doi-asserted-by":"crossref","unstructured":"Ren J, Shi M, Chen J, Wang R, Wang X (2022) Hyperspectral image classification using multi-level features fusion capsule network with a dense structure. Appl Intell pp 1\u201320","DOI":"10.1007\/s10489-022-04232-6"},{"key":"5735_CR2","doi-asserted-by":"crossref","unstructured":"Tong K, Wu Y (2022) Deep learning-based detection from the perspective of small or tiny objects: A survey. Image Vis Comput 104471","DOI":"10.1016\/j.imavis.2022.104471"},{"key":"5735_CR3","doi-asserted-by":"crossref","unstructured":"Jhaldiyal A, Chaudhary N (2022) Semantic segmentation of 3d lidar data using deep learning: a review of projection-based methods. Appl Intell pp 1\u201312","DOI":"10.1007\/s10489-022-03930-5"},{"key":"5735_CR4","doi-asserted-by":"crossref","unstructured":"Wang J, Wang C, Lin Q, Luo C, Wu C, Li J (2022) Adversarial attacks and defenses in deep learning for image recognition: A survey. Neurocomputing","DOI":"10.1016\/j.neucom.2022.09.004"},{"key":"5735_CR5","doi-asserted-by":"crossref","unstructured":"Zhang B, Tondi B, Barni M (2020) Adversarial examples for replay attacks against cnn-based face recognition with anti-spoofing capability. Comput Vis Image Underst 197 102988","DOI":"10.1016\/j.cviu.2020.102988"},{"key":"5735_CR6","doi-asserted-by":"crossref","first-page":"3541","DOI":"10.1109\/TIP.2022.3172845","volume":"31","author":"Z Wang","year":"2022","unstructured":"Wang Z, Guo Y, Zuo W (2022) Deepfake forensics via an adversarial game. IEEE Trans Image Process 31:3541\u20133552","journal-title":"IEEE Trans Image Process"},{"key":"5735_CR7","doi-asserted-by":"crossref","unstructured":"Zhang Q, Hu S, Sun J, Chen QA, Mao ZM (2022) On adversarial robustness of trajectory prediction for autonomous vehicles. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, IEEE, pp 15159\u201315168","DOI":"10.1109\/CVPR52688.2022.01473"},{"key":"5735_CR8","doi-asserted-by":"crossref","unstructured":"Naseer M, Khan S, Porikli F (2019) Local gradients smoothing: Defense against localized adversarial attacks. In: 2019 IEEE Winter conference on applications of computer vision (WACV), IEEE, pp 1300\u20131307","DOI":"10.1109\/WACV.2019.00143"},{"key":"5735_CR9","doi-asserted-by":"crossref","unstructured":"Hayes J (2018) On visible adversarial perturbations & digital watermarking. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, IEEE, pp 1597\u20131604","DOI":"10.1109\/CVPRW.2018.00210"},{"key":"5735_CR10","doi-asserted-by":"crossref","unstructured":"Xu Z, Yu F, Chen X (2020) Lance: A comprehensive and lightweight cnn defense methodology against physical adversarial attacks on embedded multimedia applications. In: 2020 25th Asia and South Pacific design automation conference (ASP-DAC), IEEE, pp 470\u2013475","DOI":"10.1109\/ASP-DAC47756.2020.9045584"},{"key":"5735_CR11","doi-asserted-by":"crossref","unstructured":"Chou E, Tramer F, Pellegrino G (2020) Sentinet: Detecting localized universal attacks against deep learning systems. In: 2020 IEEE Security and privacy workshops (SPW), IEEE, pp 48\u201354","DOI":"10.1109\/SPW50608.2020.00025"},{"key":"5735_CR12","doi-asserted-by":"crossref","unstructured":"Chen Z, Dash P, Pattabiraman K (2023) Jujutsu: A two-stage defense against adversarial patch attacks on deep neural networks. In: Proceedings of the 2023 ACM Asia conference on computer and communications security, ACM, pp 689\u2013703","DOI":"10.1145\/3579856.3582816"},{"key":"5735_CR13","doi-asserted-by":"crossref","unstructured":"Yin L, Wang S, Wang Z, Wang C, Zhan D (2024) Attribution guided purification against adversarial patch. Displays 83:102720","DOI":"10.1016\/j.displa.2024.102720"},{"key":"5735_CR14","doi-asserted-by":"crossref","unstructured":"Liu J, Levine A, Lau CP, Chellappa R, Feizi S (2022) Segment and complete: Defending object detectors against adversarial patch attacks with robust patch detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, IEEE, pp 14973\u201314982","DOI":"10.1109\/CVPR52688.2022.01455"},{"key":"5735_CR15","doi-asserted-by":"crossref","unstructured":"Xu K, Xiao Y, Zheng Z, Cai K, Nevatia R (2023) Patchzero: Defending against adversarial patch attacks by detecting and zeroing the patch. In: Proceedings of the IEEE\/CVF winter conference on applications of computer vision, IEEE, pp 4632\u20134641","DOI":"10.1109\/WACV56688.2023.00461"},{"key":"5735_CR16","doi-asserted-by":"crossref","unstructured":"Tarchoun B, Ben\u00a0Khalifa A, Mahjoub MA, Abu-Ghazaleh N, Alouani I (2023) Jedi: entropy-based localization and removal of adversarial patches. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, IEEE, pp 4087\u20134095","DOI":"10.1109\/CVPR52729.2023.00398"},{"key":"5735_CR17","doi-asserted-by":"crossref","unstructured":"Rao S, Stutz D, Schiele B (2020) Adversarial training against location-optimized adversarial patches. In: European conference on computer vision, Springer, pp 429\u2013448","DOI":"10.1007\/978-3-030-68238-5_32"},{"key":"5735_CR18","doi-asserted-by":"crossref","unstructured":"Gittings T, Schneider S, Collomosse J (2020) Vax-a-net: Training-time defence against adversarial patch attacks. In: Proceedings of the Asian conference on computer vision. AFCV","DOI":"10.1007\/978-3-030-69538-5_15"},{"key":"5735_CR19","unstructured":"Metzen JH, Finnie N, Hutmacher R (2021) Meta adversarial training against universal patches. In: ICML 2021 Workshop on adversarial machine learning. IMLS"},{"key":"5735_CR20","doi-asserted-by":"crossref","unstructured":"Zhang Z, Yuan B, McCoyd M, Wagner D (2020) Clipped bagnet: Defending against sticker attacks with clipped bag-of-features. In: 2020 IEEE Security and privacy workshops (SPW), IEEE, pp 55\u201361","DOI":"10.1109\/SPW50608.2020.00026"},{"key":"5735_CR21","unstructured":"Xiang C, Bhagoji AN, Sehwag V, Mittal P (2021) $$\\{$$PatchGuard$$\\}$$: A provably robust defense against adversarial patches via small receptive fields and masking. In: 30th USENIX security symposium (USENIX security 21), pp 2237\u20132254. USENIX"},{"key":"5735_CR22","doi-asserted-by":"crossref","unstructured":"Yu C, Chen J, Xue Y, Liu Y, Wan W, Bao J, Ma H (2021) Defending against universal adversarial patches by clipping feature norms. In: Proceedings of the IEEE\/CVF international conference on computer vision, IEEE, pp 16434\u201316442","DOI":"10.1109\/ICCV48922.2021.01612"},{"key":"5735_CR23","unstructured":"Xiang C, Mahloujifar S, Mittal P (2022) $$\\{$$PatchCleanser$$\\}$$: Certifiably robust defense against adversarial patches for any image classifier. In: 31st USENIX security symposium (USENIX Security 22), pp 2065\u20132082. USENIX"},{"key":"5735_CR24","doi-asserted-by":"crossref","unstructured":"Salman H, Jain S, Wong E, Madry A (2022) Certified patch robustness via smoothed vision transformers. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, IEEE, pp 15137\u201315147","DOI":"10.1109\/CVPR52688.2022.01471"},{"key":"5735_CR25","unstructured":"Brown TB, Man\u00e9 D, Roy A, Abadi M, Gilmer J (2017) Adversarial patch. In: Conference and workshop on neural information processing systems. NIPS"},{"key":"5735_CR26","unstructured":"Karmon D, Zoran D, Goldberg Y (2018) Lavan: Localized and visible adversarial noise. In: International conference on machine learning, pp 2507\u20132515. PMLR"},{"key":"5735_CR27","doi-asserted-by":"crossref","unstructured":"Eykholt K, Evtimov I, Fernandes E, Li B, Rahmati A, Xiao C, Prakash A, Kohno T, Song D (2018) Robust physical-world attacks on deep learning visual classification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, IEEE, pp 1625\u20131634","DOI":"10.1109\/CVPR.2018.00175"},{"key":"5735_CR28","doi-asserted-by":"crossref","unstructured":"Subramanya A, Pillai V, Pirsiavash H (2019) Fooling network interpretation in image classification. In: Proceedings of the IEEE\/CVF international conference on computer vision, IEEE, pp 2020\u20132029","DOI":"10.1109\/ICCV.2019.00211"},{"key":"5735_CR29","doi-asserted-by":"crossref","unstructured":"Selvaraju RR, Cogswell M, Das A, Vedantam R, Parikh D, Batra D (2017) Grad-cam: Visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE international conference on computer vision, IEEE, pp 618\u2013626","DOI":"10.1109\/ICCV.2017.74"},{"key":"5735_CR30","doi-asserted-by":"crossref","unstructured":"Chindaudom A, Siritanawan P, Sumongkayothin K, Kotani K (2020) Adversarialqr: An adversarial patch in qr code format. In: 2020 Joint 9th international conference on informatics, electronics & vision (ICIEV) and 2020 4th international conference on imaging, vision & pattern recognition (icIVPR), IEEE, pp 1\u20136","DOI":"10.1109\/ICIEVicIVPR48672.2020.9306675"},{"issue":"3","key":"5735_CR31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00138-021-01194-6","volume":"32","author":"X Zhou","year":"2021","unstructured":"Zhou X, Pan Z, Duan Y, Zhang J, Wang S (2021) A data independent approach to generate adversarial patches. Mach Vis Appl 32(3):1\u20139","journal-title":"Mach Vis Appl"},{"key":"5735_CR32","doi-asserted-by":"crossref","unstructured":"Yang C, Kortylewski A, Xie C, Cao Y, Yuille A (2020) Patchattack: A black-box texture-based attack with reinforcement learning. In: European conference on computer vision, Springer, pp 681\u2013698","DOI":"10.1007\/978-3-030-58574-7_41"},{"key":"5735_CR33","doi-asserted-by":"crossref","unstructured":"Liu A, Liu X, Fan J, Ma Y, Zhang A, Xie H, Tao D (2019) Perceptual-sensitive gan for generating adversarial patches. In: Proceedings of the AAAI conference on artificial intelligence, AAAI, vol 33, pp 1028\u20131035","DOI":"10.1609\/aaai.v33i01.33011028"},{"key":"5735_CR34","unstructured":"Liu X, Yang H, Liu Z, Song L, Li H, Chen Y (2019) Dpatch: An adversarial patch attack on object detectors. In: AAAI Workshop on artificial intelligence safety (SafeAI 2019) AAAI"},{"key":"5735_CR35","unstructured":"Lee M, Kolter Z (2019) On physical adversarial patches for object detection. In: ICML 2019 workshop on security and privacy of machine learning. IMLS"},{"key":"5735_CR36","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2018) Towards deep learning models resistant to adversarial attacks. In: International conference on learning representations. ICLR"},{"key":"5735_CR37","doi-asserted-by":"crossref","unstructured":"Huang H, Wang Y, Chen Z, Tang Z, Zhang W, Ma K-K (2021) Rpattack: Refined patch attack on general object detectors. In: 2021 IEEE International Conference on Multimedia and Expo (ICME), IEEE, pp 1\u20136","DOI":"10.1109\/ICME51207.2021.9428443"},{"key":"5735_CR38","doi-asserted-by":"crossref","first-page":"27217","DOI":"10.1109\/ACCESS.2022.3215762","volume":"11","author":"X Lei","year":"2022","unstructured":"Lei X, Cai X, Lu C, Jiang Z, Gong Z, Lu L (2022) Using frequency attention to make adversarial patch powerful against person detector. IEEE Access 11:27217\u201327225","journal-title":"IEEE Access"},{"key":"5735_CR39","doi-asserted-by":"crossref","unstructured":"Yang X, Wei F, Zhang H, Zhu J (2020) Design and interpretation of universal adversarial patches in face detection. In: European conference on computer vision, Springer, pp 174\u2013191","DOI":"10.1007\/978-3-030-58520-4_11"},{"key":"5735_CR40","doi-asserted-by":"crossref","unstructured":"Hu Y-C-T, Kung B-H, Tan DS, Chen J-C, Hua K-L, Cheng W-H (2021) Naturalistic physical adversarial patch for object detectors. In: Proceedings of the IEEE\/CVF international conference on computer vision, IEEE, pp 7848\u20137857","DOI":"10.1109\/ICCV48922.2021.00775"},{"issue":"11","key":"5735_CR41","doi-asserted-by":"crossref","first-page":"3051","DOI":"10.1007\/s11263-021-01515-2","volume":"129","author":"C Yu","year":"2021","unstructured":"Yu C, Gao C, Wang J, Yu G, Shen C, Sang N (2021) Bisenet v2: Bilateral network with guided aggregation for real-time semantic segmentation. Int J Comput Vision 129(11):3051\u20133068","journal-title":"Int J Comput Vision"},{"key":"5735_CR42","doi-asserted-by":"crossref","unstructured":"Guo X, Yang H, Huang D (2021) Image inpainting via conditional texture and structure dual generation. In: Proceedings of the IEEE\/CVF international conference on computer vision, IEEE, pp 14134\u201314143","DOI":"10.1109\/ICCV48922.2021.01387"},{"key":"5735_CR43","doi-asserted-by":"crossref","unstructured":"Isola P, Zhu J-Y, Zhou T, Efros AA (2017) Image-to-image translation with conditional adversarial networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, IEEE, pp 1125\u20131134","DOI":"10.1109\/CVPR.2017.632"},{"key":"5735_CR44","unstructured":"Sundararajan M, Taly A, Yan Q (2017) Axiomatic attribution for deep networks. In: International conference on machine learning, pp 3319\u20133328. PMLR"},{"key":"5735_CR45","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. In: International conference on learning representations, ICLR"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-024-05735-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-024-05735-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-024-05735-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T14:16:11Z","timestamp":1726668971000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-024-05735-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,29]]},"references-count":45,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["5735"],"URL":"https:\/\/doi.org\/10.1007\/s10489-024-05735-0","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2024,8,29]]},"assertion":[{"value":"4 August 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}