{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T21:44:43Z","timestamp":1768254283499,"version":"3.49.0"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evolving Systems"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s12530-024-09643-z","type":"journal-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T13:08:09Z","timestamp":1734008889000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["AFLF: a defensive framework to defeat multi-faceted adversarial attacks via attention feature fusion"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6428-1997","authenticated-orcid":false,"given":"Lovi","family":"Dhamija","sequence":"first","affiliation":[]},{"given":"Urvashi","family":"Bansal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"9643_CR1","doi-asserted-by":"crossref","unstructured":"Akyon FC, Altinuc SO, Temizel A (2022) Slicing aided hyper inference and fine-tuning for small object detection. In: 2022 IEEE international conference on image processing (ICIP). IEEE, pp 966\u2013970","DOI":"10.1109\/ICIP46576.2022.9897990"},{"key":"9643_CR2","doi-asserted-by":"crossref","unstructured":"Alazab M, Tang MJ (2019) Deep learning applications for cyber security. Springer, Berlin","DOI":"10.1007\/978-3-030-13057-2"},{"issue":"1","key":"9643_CR3","doi-asserted-by":"publisher","first-page":"48","DOI":"10.35940\/ijitee.A3910.119119","volume":"9","author":"PV Anusha","year":"2019","unstructured":"Anusha PV, Anuradha C, Murty PC, Kiran CS (2019) Detecting outliers in high dimensional data sets using Z-score methodology. Int J Innov Technol Explor Eng 9(1):48\u201353","journal-title":"Int J Innov Technol Explor Eng"},{"key":"9643_CR4","unstructured":"Athalye A, Carlini N, Wagner D (2018) Obfuscated gradients give a false sense of security: circumventing defenses to adversarial examples. In: International conference on machine learning. PMLR, pp 274\u2013283"},{"key":"9643_CR5","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.neucom.2022.10.034","volume":"516","author":"\u0130M Bayta\u015f","year":"2023","unstructured":"Bayta\u015f \u0130M, Deb D (2023) Robustness-via-synthesis: robust training with generative adversarial perturbations. Neurocomputing 516:49\u201360","journal-title":"Neurocomputing"},{"key":"9643_CR6","unstructured":"Carlini N (2019) Is ami (attacks meet interpretability) robust to adversarial examples? arXiv preprint arXiv:1902.02322"},{"key":"9643_CR7","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 IEEE symposium on security and privacy (sp). IEEE, pp 39\u201357","DOI":"10.1109\/SP.2017.49"},{"key":"9643_CR8","doi-asserted-by":"crossref","unstructured":"Chen C, Seff A, Kornhauser A, Xiao J (2015) Deepdriving: learning affordance for direct perception in autonomous driving. In: Proceedings of the IEEE international conference on computer vision, Santiago, Chile, pp 2722\u20132730","DOI":"10.1109\/ICCV.2015.312"},{"issue":"20","key":"9643_CR9","doi-asserted-by":"publisher","first-page":"8355","DOI":"10.3390\/s23208355","volume":"23","author":"H Chen","year":"2023","unstructured":"Chen H, Chen Z, Yu H (2023) Enhanced YOLOv5: an efficient road object detection method. Sensors 23(20):8355","journal-title":"Sensors"},{"key":"9643_CR10","doi-asserted-by":"crossref","unstructured":"Chiang P-H, Chan C-S, Wu S-H (2021) Adversarial pixel masking: a defense against physical attacks for pre-trained object detectors. In: Proceedings of the 29th ACM international conference on multimedia. pp 1856\u20131865","DOI":"10.1145\/3474085.3475338"},{"key":"9643_CR11","unstructured":"Cohen J, Rosenfeld E, Kolter Z (2019) Certified adversarial robustness via randomized smoothing. In: International conference on machine learning. PMLR, pp 1310\u20131320"},{"key":"9643_CR12","first-page":"2958","volume":"33","author":"W Dongxian","year":"2020","unstructured":"Dongxian W, Xia S-T, Wang Y (2020) Adversarial weight perturbation helps robust generalization. Adv Neural Inf Process Syst 33:2958\u20132969","journal-title":"Adv Neural Inf Process Syst"},{"key":"9643_CR13","doi-asserted-by":"crossref","unstructured":"Drichel A, Meyer U (2023) False sense of security: leveraging XAI to analyze the reasoning and true performance of context-less DGA classifiers. In: Proceedings of the 26th international symposium on research in attacks, intrusions and defenses. pp 330\u2013345","DOI":"10.1145\/3607199.3607231"},{"key":"9643_CR14","doi-asserted-by":"crossref","unstructured":"Ertler C, Mislej J, Ollmann T, Porzi L, Neuhold G, Kuang Y (2020) The mapillary traffic sign dataset for detection and classification on a global scale. In: European Conference on Computer Vision. Springer International Publishing,  Cham, pp 68\u201384","DOI":"10.1007\/978-3-030-58592-1_5"},{"key":"9643_CR15","unstructured":"Farnia F, Zhang JM, Tse D (2018) Generalizable adversarial training via spectral normalization. arXiv preprint arXiv:1811.07457"},{"key":"9643_CR16","unstructured":"Feinman R, Curtin RR, Shintre S, Gardner AB (2017) Detecting adversarial samples from artifacts. arXiv preprint arXiv:1703.00410"},{"key":"9643_CR17","doi-asserted-by":"crossref","unstructured":"Freitas S, Chen ST, Wang ZJ, Chau DH (2020) Unmask: Adversarial detection and defense through robust feature alignment. In: 2020 IEEE International Conference on Big Data (Big Data), IEEE, pp 1081\u20131088","DOI":"10.1109\/BigData50022.2020.9378303"},{"key":"9643_CR18","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572"},{"key":"9643_CR19","unstructured":"Guo C, Rana M, Cisse M, Van Der Maaten (2017) Countering adversarial images using input transformations. arXiv preprint arXiv:1711.00117"},{"key":"9643_CR20","unstructured":"Guo Y, Zhang C, Zhang C, Chen Y (2018) Sparse dnns with improved adversarial robustness. In: Proceedings of the 32nd International Conference on Neural Information Processing Systems.\n vol 31, pp 1\u201310"},{"key":"9643_CR21","doi-asserted-by":"crossref","unstructured":"Gupta A, Eppner C, Levine S, Abbeel P (2016) Learning dexterous manipulation for a soft robotic hand from human demonstrations. In: 2016 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS), Daejeon, Korea (South), IEEE, pp 3786\u20133793","DOI":"10.1109\/IROS.2016.7759557"},{"key":"9643_CR22","doi-asserted-by":"crossref","unstructured":"Hu J, Shen L, Sun G (2018) Squeeze-and-excitation networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, USA. pp 7132\u20137141","DOI":"10.1109\/CVPR.2018.00745"},{"key":"9643_CR23","unstructured":"Karmon D, Zoran D, Goldberg Y (2018) Lavan: localized and visible adversarial noise. In: International conference on machine learning. PMLR, pp 2507\u20132515"},{"issue":"1","key":"9643_CR24","doi-asserted-by":"publisher","first-page":"2468","DOI":"10.1038\/s41467-021-22364-0","volume":"12","author":"G Karunaratne","year":"2021","unstructured":"Karunaratne G, Schmuck M, Le Gallo M, Cherubini G, Benini L, Sebastian A, Rahimi A (2021) Robust high-dimensional memory-augmented neural networks. Nat Commun 12(1):2468","journal-title":"Nat Commun"},{"key":"9643_CR25","unstructured":"Kingma DP, Ba J (2014) Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980"},{"key":"9643_CR26","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/j.neucom.2021.05.103","volume":"470","author":"I Lauriola","year":"2022","unstructured":"Lauriola I, Lavelli A, Aiolli F (2022) An introduction to deep learning in natural language processing: models, techniques, and tools. Neurocomputing 470:443\u2013456","journal-title":"Neurocomputing"},{"issue":"9","key":"9643_CR27","doi-asserted-by":"publisher","first-page":"3031","DOI":"10.3390\/s21093031","volume":"21","author":"J Lian","year":"2021","unstructured":"Lian J, Yin Y, Li, L, Wang Z, Zhou Y (2021) Small object detection in traffic scenes based on attention feature fusion. Sensors 21(9):3031","journal-title":"Sensors"},{"key":"9643_CR28","doi-asserted-by":"crossref","unstructured":"Lin T-Y et al (2014) Microsoft coco: common objects in context. In: Computer vision-ECCV 2014: 13th European conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part V 13. Springer, pp 740\u2013755","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"9643_CR29","doi-asserted-by":"publisher","unstructured":"Liu X, Cheng M, Zhang H, Hsieh CJ (2018) Towards robust neural networks via random self-ensemble. In: Ferrari V, Hebert M, Sminchisescu C, Weiss Y (eds) Computer Vision \u2013 ECCV 2018. ECCV 2018. Lecture Notes in Computer Science(), vol 11211. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-01234-2_23","DOI":"10.1007\/978-3-030-01234-2_23"},{"key":"9643_CR30","unstructured":"Luo T, Cai T, Zhang M, Chen S, Wang L (2020) Random mask: Towards robust convolutional neural networks. arXiv preprint arXiv:2007.14249"},{"key":"9643_CR31","unstructured":"Madaan D, Shin J, Ju HS (2020) Adversarial neural pruning with latent vulnerability suppression. In: International conference on machine learning. PMLR, pp 6575\u20136585"},{"key":"9643_CR32","unstructured":"M\u0105dry A, Makelov A, Schmidt L, Tsipras D,  Vladu A (2017) Towards deep learning models resistant to adversarial attacks. Stat 1050(9)"},{"key":"9643_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.paerosci.2015.10.002","volume":"80","author":"A Mcfadyen","year":"2016","unstructured":"Mcfadyen A, Mejias L (2016) A survey of autonomous vision-based see and avoid for unmanned aircraft systems. Prog Aerosp Sci 80:1\u201317","journal-title":"Prog Aerosp Sci"},{"key":"9643_CR34","doi-asserted-by":"crossref","unstructured":"Naseer M, Khan S, Porikli F (2019) Local gradients smoothing: Defense against localized adversarial attacks. In: 2019 IEEE Winter conference on applications of computer vision (WACV). IEEE, pp 1300\u20131307","DOI":"10.1109\/WACV.2019.00143"},{"issue":"3","key":"9643_CR35","doi-asserted-by":"publisher","first-page":"2698","DOI":"10.1109\/TPAMI.2022.3174724","volume":"45","author":"M Picot","year":"2022","unstructured":"Picot M, Messina F, Boudiaf M, Labeau F, Ayed IB, Piantanida P (2022) Adversarial robustness via fisher-rao regularization. IEEE Trans Pattern Anal Mach Intell 45(3):2698\u20132710","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"9643_CR36","unstructured":"Qin C, Martens J, Gowal S, Krishnan D, Dvijotham K, Fawzi A, Kohli P (2019) Adversarial robustness through local linearization. Adv Neu Info Process syst 32:1\u201317"},{"issue":"6","key":"9643_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3417978","volume":"53","author":"J Qiu","year":"2020","unstructured":"Qiu J, Zhang J, Luo W, Pan L, Nepal S, Xiang Y (2020) A survey of android malware detection with deep neural models. ACM Computing Surveys (CSUR) 53(6):1\u201336","journal-title":"ACM Comput Surv (CSUR)"},{"key":"9643_CR38","unstructured":"Quiring E, Klein D, Arp D, Johns M, Rieck K (2020) Adversarial preprocessing: understanding and preventing {Image-Scaling} attacks in machine learning. In: 29th USENIX Security Symposium (USENIX Security 20), pp 1363\u20131380"},{"key":"9643_CR39","doi-asserted-by":"crossref","unstructured":"Rao S, Stutz D, Schiele B (2020) Adversarial training against location-optimized adversarial patches. In: European conference on computer vision. Springer, pp 429\u2013448","DOI":"10.1007\/978-3-030-68238-5_32"},{"key":"9643_CR41","unstructured":"Song D, Eykholt K, Evtimov I, Fernandes E, Li B, Rahmati A, Kohno T (2018) Physical adversarial examples for object detectors. In: 12th USENIX workshop on offensive technologies (WOOT 18), Baltimore, MD"},{"key":"9643_CR40","unstructured":"Song C, He K, Lin J, Wang L, Hopcroft JE (2019) Robust local features for improving the generalization of adversarial training. arXiv preprint arXiv:1909.10147"},{"key":"9643_CR42","doi-asserted-by":"crossref","unstructured":"Stallkamp J, Schlipsing M, Salmen J, Igel C (2011) The German traffic sign recognition benchmark: a multi-class classification competition. In: The 2011 international joint conference on neural networks, USA, IEEE, pp 1453\u20131460","DOI":"10.1109\/IJCNN.2011.6033395"},{"key":"9643_CR43","unstructured":"Strauss T, Hanselmann M, Junginger A, Ulmer H (2017) Ensemble methods as a defense to adversarial perturbations against deep neural networks. arXiv preprint arXiv:1709.03423"},{"key":"9643_CR44","unstructured":"Szegedy C et al (2013) Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199"},{"key":"9643_CR45","unstructured":"Tu J, Li H, Yan X, Ren M, Chen Y, Liang M, Urtasun R (2021) Exploring adversarial robustness of multi-sensor perception systems in self driving. arXiv preprint arXiv:2101.06784"},{"key":"9643_CR46","unstructured":"Wang H, Wang J, Yin Z (2019) An efficient pre-processing method to eliminate adversarial effects. arXiv preprint arXiv:1905.08614"},{"key":"9643_CR48","unstructured":"Wu T, Tong L, Vorobeychik Y (2019) Defending against physically realizable attacks on image classification. arXiv preprint arXiv:1909.09552"},{"key":"9643_CR49","doi-asserted-by":"crossref","unstructured":"Xie C, Tan M, Gong B, Wang J, Yuille AL, Le QV (2020) Adversarial examples improve image recognition. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, USA, pp 819\u2013828","DOI":"10.1109\/CVPR42600.2020.00090"},{"key":"9643_CR50","unstructured":"Xie JH, Luo Y, Lu J (2023) A Random-patch based defense strategy against physical attacks for face recognition systems. arXiv preprint arXiv:2304.07822"},{"key":"9643_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103345","volume":"132","author":"LI Yufeng","year":"2023","unstructured":"Yufeng LI, Fengyu YANG, Qi LIU, Jiangtao LI, Chenhong CAO (2023) Light can be dangerous: Stealthy and effective physical-world adversarial attack by spot light. Comput Sec 132:103345","journal-title":"Comput Sec"},{"key":"9643_CR54","doi-asserted-by":"crossref","unstructured":"Zhang H, Wang J (2019) Towards adversarially robust object detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision. Seoul, Korea (South), pp 421\u2013430","DOI":"10.1109\/ICCV.2019.00051"},{"key":"9643_CR52","unstructured":"Zhang H, Yu Y, Jiao J, Xing E, El Ghaoui L, Jordan M (2019) Theoretically principled trade-off between robustness and accuracy. In: International conference on machine learning, PMLR,  pp 7472\u20137482"},{"key":"9643_CR53","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.ins.2020.12.042","volume":"560","author":"X Zhang","year":"2021","unstructured":"Zhang X, Wang J, Wang T, Jiang R, Xu J, Zhao L (2021) Robust feature learning for adversarial defense via hierarchical feature alignment. Inf Sci 560:256\u2013270","journal-title":"Inf Sci"},{"key":"9643_CR55","doi-asserted-by":"crossref","unstructured":"Zhong Y, Liu X, Zhai D, Jiang J, Ji X (2022) Shadows can be dangerous: Stealthy and effective physical-world adversarial attack by natural phenomenon. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. USA, pp 15345\u201315354","DOI":"10.1109\/CVPR52688.2022.01491"},{"key":"9643_CR56","doi-asserted-by":"crossref","unstructured":"Zhu Z, Liang D, Zhang S, Huang X, Li B, Hu S (2016) Traffic-sign detection and classification in the wild. In: Proceedings of the IEEE conference on computer vision and pattern recognition. Singapore, pp 2110\u20132118","DOI":"10.1109\/CVPR.2016.232"}],"updated-by":[{"DOI":"10.1007\/s12530-025-09676-y","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T00:00:00Z","timestamp":1742342400000}}],"container-title":["Evolving Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-024-09643-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12530-024-09643-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-024-09643-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T09:29:34Z","timestamp":1742376574000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12530-024-09643-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["9643"],"URL":"https:\/\/doi.org\/10.1007\/s12530-024-09643-z","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s12530-025-09676-y","asserted-by":"object"}]},"ISSN":["1868-6478","1868-6486"],"issn-type":[{"value":"1868-6478","type":"print"},{"value":"1868-6486","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"18 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2025","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original online version of this article was revised due to incorrect author name.","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2025","order":7,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":8,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":9,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s12530-025-09676-y","URL":"https:\/\/doi.org\/10.1007\/s12530-025-09676-y","order":10,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors confirm that they have no known financial or interpersonal conflicts that would have appeared to impact the research presented in this study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"20"}}