{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:33:44Z","timestamp":1763811224169,"version":"3.37.3"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Major Program of the National Natural Science Foundation of China","award":["62192733","62192730"],"award-info":[{"award-number":["62192733","62192730"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17355-w","type":"journal-article","created":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T08:17:50Z","timestamp":1698135470000},"page":"45575-45601","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An adversarial defense algorithm based on robust U-net"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9079-3889","authenticated-orcid":false,"given":"Dian","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yunwei","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Hongji","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,24]]},"reference":[{"key":"17355_CR1","doi-asserted-by":"publisher","unstructured":"Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 IEEE symposium on security and privacy (SP), pp 39\u201357, https:\/\/doi.org\/10.1109\/SP.2017.49","DOI":"10.1109\/SP.2017.49"},{"issue":"1","key":"17355_CR2","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1049\/cit2.12028","volume":"6","author":"A Chakraborty","year":"2021","unstructured":"Chakraborty A, Alam M, Dey V et al (2021) A survey on adversarial attacks and defences. CAAI Trans Intell Technol 6(1):25\u201345. https:\/\/doi.org\/10.1049\/cit2.12028","journal-title":"CAAI Trans Intell Technol"},{"key":"17355_CR3","unstructured":"Chen T, Zhang Z, Wang P et al (2022) Sparsity winning twice: Better robust generalization from more efficient training. In: The tenth international conference on learning representations, ICLR"},{"key":"17355_CR4","unstructured":"Croce F, Hein M (2020) Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In: Proceedings of the 37th international conference on machine learning, ICML, pp 2206\u20132216 http:\/\/proceedings.mlr.press\/v119\/croce20b.html"},{"issue":"3","key":"17355_CR5","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1049\/ell2.12070","volume":"57","author":"B Esmaeili","year":"2021","unstructured":"Esmaeili B, Akhavanpour A, Sabokrou M (2021) Maximising robustness and diversity for improving the deep neural network safety. Electron Lett 57(3):116\u2013118. https:\/\/doi.org\/10.1049\/ell2.12070","journal-title":"Electron Lett"},{"key":"17355_CR6","first-page":"21480","volume":"34","author":"L Fan","year":"2021","unstructured":"Fan L, Liu S, Chen PY et al (2021) When does contrastive learning preserve adversarial robustness from pretraining to finetuning? Adv Neural Inf Process Syst 34:21480\u201321492","journal-title":"Adv Neural Inf Process Syst"},{"key":"17355_CR7","doi-asserted-by":"publisher","unstructured":"Fu C, Jin J, Ding F et al (2021) Spatial reliability enhanced correlation filter: An efficient approach for real-time UAV tracking. IEEE Trans Multimed 1\u20131. https:\/\/doi.org\/10.1109\/TMM.2021.3118891","DOI":"10.1109\/TMM.2021.3118891"},{"key":"17355_CR8","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M et al (2014) Generative adversarial nets. In: Advances in neural information processing systems"},{"key":"17355_CR9","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. In: 3rd international conference on learning representations, ICLR, arXiv:1412.6572"},{"key":"17355_CR10","doi-asserted-by":"publisher","unstructured":"He K, Zhang X, Ren S et al (2016) Deep residual learning for image recognition. In: 2016 IEEE conference on computer vision and pattern recognition, CVPR, pp 770\u2013778, https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"17355_CR11","doi-asserted-by":"publisher","unstructured":"Isola P, Zhu J, Zhou T et al (2017) Image-to-image translation with conditional adversarial networks. In: 2017 IEEE conference on computer vision and pattern recognition, CVPR, pp 5967\u20135976, https:\/\/doi.org\/10.1109\/CVPR.2017.632","DOI":"10.1109\/CVPR.2017.632"},{"key":"17355_CR12","doi-asserted-by":"publisher","unstructured":"Jin G, Shen S, Zhang D et al (2019) APE-GAN: adversarial perturbation elimination with GAN. In: IEEE international conference on acoustics, speech and signal processing, ICASSP, pp 3842\u20133846, https:\/\/doi.org\/10.1109\/ICASSP.2019.8683044","DOI":"10.1109\/ICASSP.2019.8683044"},{"key":"17355_CR13","doi-asserted-by":"crossref","unstructured":"Kabiraj A, Meena T, Reddy PB et al (2022) Detection and classification of lung disease using deep learning architecture from x-ray images. In: International symposium on visual computing, Springer, pp 444\u2013455","DOI":"10.1007\/978-3-031-20713-6_34"},{"issue":"9","key":"17355_CR14","doi-asserted-by":"publisher","first-page":"13837","DOI":"10.1007\/s11042-022-14018-0","volume":"82","author":"A Kabiraj","year":"2023","unstructured":"Kabiraj A, Pal D, Ganguly D et al (2023) Number plate recognition from enhanced super-resolution using generative adversarial network. Multimed Tools Appl 82(9):13837\u201313853","journal-title":"Multimed Tools Appl"},{"key":"17355_CR15","doi-asserted-by":"publisher","first-page":"102266","DOI":"10.1109\/ACCESS.2022.3208131","volume":"10","author":"SY Khamaiseh","year":"2022","unstructured":"Khamaiseh SY, Bagagem D, Al-Alaj A et al (2022) Adversarial deep learning: A survey on adversarial attacks and defense mechanisms on image classification. IEEE Access 10:102266\u2013102291. https:\/\/doi.org\/10.1109\/ACCESS.2022.3208131","journal-title":"IEEE Access"},{"key":"17355_CR16","unstructured":"Kim H (2020) Torchattacks : A pytorch repository for adversarial attacks. CoRR abs\/2010.01950. arXiv:2010.01950"},{"key":"17355_CR17","first-page":"2983","volume":"33","author":"M Kim","year":"2020","unstructured":"Kim M, Tack J, Hwang SJ (2020) Adversarial self-supervised contrastive learning. Adv Neural Inf Process Syst 33:2983\u20132994","journal-title":"Adv Neural Inf Process Syst"},{"key":"17355_CR18","unstructured":"Kingma DP, Welling M (2014) Auto-encoding variational bayes. In: 2nd international conference on learning representations, ICLR, arXiv:1312.6114"},{"key":"17355_CR19","unstructured":"Krizhevsky A (2009) Learning multiple layers of features from tiny images pp 32\u201333"},{"key":"17355_CR20","unstructured":"Krizhevsky A (2014) One weird trick for parallelizing convolutional neural networks. CoRR abs\/1404.5997. arXiv:1404.5997"},{"key":"17355_CR21","doi-asserted-by":"crossref","unstructured":"Kurakin A, Goodfellow IJ, Bengio S (2018) Adversarial examples in the physical world. In: Artificial intelligence safety and security. p 99\u2013112","DOI":"10.1201\/9781351251389-8"},{"key":"17355_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2022.116659","volume":"103","author":"Q Liang","year":"2022","unstructured":"Liang Q, Li Q, Nie W (2022) Ld-gan: Learning perturbations for adversarial defense based on gan structure. Signal Process Image Commun 103:116659","journal-title":"Signal Process Image Commun"},{"key":"17355_CR23","doi-asserted-by":"publisher","first-page":"5769","DOI":"10.1109\/TIP.2021.3082317","volume":"30","author":"A Liu","year":"2021","unstructured":"Liu A, Liu X, Yu H et al (2021) Training robust deep neural networks via adversarial noise propagation. IEEE Trans Image Process 30:5769\u20135781. https:\/\/doi.org\/10.1109\/TIP.2021.3082317","journal-title":"IEEE Trans Image Process"},{"key":"17355_CR24","doi-asserted-by":"publisher","unstructured":"Liu S, Zhang Q, Huang L (2023) Graphic image classification method based on an attention mechanism and fusion of multilevel and multiscale deep features. Comput Commun 209:230\u2013238. https:\/\/doi.org\/10.1016\/j.comcom.2023.07.001www.sciencedirect.com\/science\/article\/pii\/S0140366423002281","DOI":"10.1016\/j.comcom.2023.07.001"},{"key":"17355_CR25","doi-asserted-by":"crossref","unstructured":"Liu X, Hsieh CJ (2019) Rob-gan: Generator, discriminator, and adversarial attacker. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 11234\u201311243","DOI":"10.1109\/CVPR.2019.01149"},{"key":"17355_CR26","doi-asserted-by":"publisher","unstructured":"Liu X, Cheng M, Zhang H et al (2018) Towards robust neural networks via random self-ensemble. In: Computer vision - ECCV, pp 381\u2013397, https:\/\/doi.org\/10.1007\/978-3-030-01234-2_23","DOI":"10.1007\/978-3-030-01234-2_23"},{"key":"17355_CR27","unstructured":"Madry A, Makelov A, Schmidt L et al (2018) Towards deep learning models resistant to adversarial attacks. In: 6th international conference on learning representations, ICLR, https:\/\/openreview.net\/forum?id=rJzIBfZAb"},{"key":"17355_CR28","doi-asserted-by":"publisher","unstructured":"Meng D, Chen H (2017) Magnet: A two-pronged defense against adversarial examples. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, CCS, pp 135\u2013147, https:\/\/doi.org\/10.1145\/3133956.3134057","DOI":"10.1145\/3133956.3134057"},{"key":"17355_CR29","doi-asserted-by":"publisher","unstructured":"Moosavi-Dezfooli S, Fawzi A, Frossard P (2016) Deepfool: A simple and accurate method to fool deep neural networks. In: 2016 IEEE conference on computer vision and pattern recognition, CVPR, pp 2574\u20132582, https:\/\/doi.org\/10.1109\/CVPR.2016.282","DOI":"10.1109\/CVPR.2016.282"},{"key":"17355_CR30","unstructured":"Nicolae M, Sinn M, Minh TN et al (2018) Adversarial robustness toolbox v0.2.2. CoRR abs\/1807.01069. arXiv:1807.01069"},{"key":"17355_CR31","doi-asserted-by":"publisher","first-page":"106083","DOI":"10.1016\/j.compbiomed.2022.106083","volume":"150","author":"D Pal","year":"2022","unstructured":"Pal D, Reddy PB, Roy S (2022) Attention uw-net: A fully connected model for automatic segmentation and annotation of chest x-ray. Comput Biol Med 150:106083","journal-title":"Comput Biol Med"},{"key":"17355_CR32","doi-asserted-by":"publisher","unstructured":"Papernot N, McDaniel PD, Wu X et al (2016) Distillation as a defense to adversarial perturbations against deep neural networks. In: IEEE symposium on security and privacy, SP, pp 582\u2013597, https:\/\/doi.org\/10.1109\/SP.2016.41","DOI":"10.1109\/SP.2016.41"},{"key":"17355_CR33","doi-asserted-by":"crossref","unstructured":"Rombach R, Blattmann A, Lorenz D et al (2022) High-resolution image synthesis with latent diffusion models. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 10684\u201310695","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"17355_CR34","doi-asserted-by":"publisher","unstructured":"Ronneberger O, Fischer P, Brox T (2015) U-Net: Convolutional networks for biomedical image segmentation. In: Medical image computing and computer-assisted intervention - MICCAI, pp 234\u2013241, https:\/\/doi.org\/10.1007\/978-3-319-24574-4_28","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"17355_CR35","doi-asserted-by":"publisher","unstructured":"Sahay KB, Balachander B, Jagadeesh B et al (2022) A real time crime scene intelligent video surveillance systems in violence detection framework using deep learning techniques. Comput Electric Eng 103:108319. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108319www.sciencedirect.com\/science\/article\/pii\/S0045790622005419","DOI":"10.1016\/j.compeleceng.2022.108319"},{"key":"17355_CR36","unstructured":"Shen S, Jin G, Gao K et al (2017) Ape-gan: Adversarial perturbation elimination with gan. arXiv:1707.05474"},{"key":"17355_CR37","unstructured":"Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. In: 3rd international conference on learning representations, ICLR, arXiv:1409.1556"},{"key":"17355_CR38","unstructured":"Szegedy C, Zaremba W, Sutskever I et al (2014) Intriguing properties of neural networks. In: 2nd international conference on learning representations, ICLR, arXiv:1312.6199"},{"key":"17355_CR39","doi-asserted-by":"publisher","unstructured":"Szegedy C, Vanhoucke V, Ioffe S et al (2016) Rethinking the inception architecture for computer vision. In: 2016 IEEE conference on computer vision and pattern recognition, CVPR, pp 2818\u20132826. https:\/\/doi.org\/10.1109\/CVPR.2016.308","DOI":"10.1109\/CVPR.2016.308"},{"key":"17355_CR40","first-page":"99","volume":"24","author":"A Vysogorets","year":"2023","unstructured":"Vysogorets A, Kempe J (2023) Connectivity matters: Neural network pruning through the lens of effective sparsity. J Mach Learn Res 24:99\u20131","journal-title":"J Mach Learn Res"},{"key":"17355_CR41","unstructured":"Wang C, Zhang G, Grosse RB (2020) Picking winning tickets before training by preserving gradient flow. In: 8th international conference on learning representations, ICLR. https:\/\/openreview.net\/forum?id=SkgsACVKPH"},{"key":"17355_CR42","doi-asserted-by":"crossref","unstructured":"Wang D, Jin W, Wu Y et\u00a0al (2023) Atgan: Adversarial training-based gan for improving adversarial robustness generalization on image classification. Appl Intell 1\u201317","DOI":"10.1007\/s10489-023-04847-3"},{"key":"17355_CR43","unstructured":"Wong E, Rice L, Kolter JZ (2020) Fast is better than free: Revisiting adversarial training. In: 8th international conference on learning representations, ICLR. https:\/\/openreview.net\/forum?id=BJx040EFvH"},{"key":"17355_CR44","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1109\/TIP.2022.3228497","volume":"32","author":"X Wu","year":"2022","unstructured":"Wu X, Hong D, Chanussot J (2022) Uiu-net: U-net in u-net for infrared small object detection. IEEE Trans Image Process 32:364\u2013376","journal-title":"IEEE Trans Image Process"},{"key":"17355_CR45","doi-asserted-by":"crossref","unstructured":"Xu W, Evans D, Qi Y (2018) Feature squeezing: Detecting adversarial examples in deep neural networks. In: 25th annual network and distributed system security symposium, NDSS","DOI":"10.14722\/ndss.2018.23198"},{"key":"17355_CR46","doi-asserted-by":"publisher","unstructured":"Zantedeschi V, Nicolae M, Rawat A (2017) Efficient defenses against adversarial attacks. In: Proceedings of the 10th ACM workshop on artificial intelligence and security, AISec, pp 39\u201349, https:\/\/doi.org\/10.1145\/3128572.3140449","DOI":"10.1145\/3128572.3140449"},{"key":"17355_CR47","doi-asserted-by":"publisher","unstructured":"Zheng S, Song Y, Leung T et al (2016) Improving the robustness of deep neural networks via stability training. In: 2016 IEEE conference on computer vision and pattern recognition, CVPR, pp 4480\u20134488, https:\/\/doi.org\/10.1109\/CVPR.2016.485","DOI":"10.1109\/CVPR.2016.485"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17355-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17355-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17355-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T11:07:11Z","timestamp":1714388831000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17355-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,24]]},"references-count":47,"journal-issue":{"issue":"15","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["17355"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17355-w","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,10,24]]},"assertion":[{"value":"24 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest. The datasets generated during and analysed during the current study are available in the cifar10 and Tiny ImageNet repository, [cifar10: , Tiny ImageNet: ].","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}