{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:18:38Z","timestamp":1758845918370,"version":"3.44.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62362016"],"award-info":[{"award-number":["62362016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s40747-025-02005-5","type":"journal-article","created":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T08:20:32Z","timestamp":1757578832000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Defending deep learning models: a hybrid algorithm employing de-noising and coordinate-disruption techniques against adversarial attacks"],"prefix":"10.1007","volume":"11","author":[{"given":"Lihua","family":"He","sequence":"first","affiliation":[]},{"given":"Shiwei","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Huiyi","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Qinghui","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,11]]},"reference":[{"issue":"2","key":"2005_CR1","doi-asserted-by":"publisher","first-page":"1112","DOI":"10.1109\/TITS.2023.3315070","volume":"25","author":"HY Yatbaz","year":"2023","unstructured":"Yatbaz HY, Dianati M, Woodman R (2023) Introspection of dnn-based perception functions in automated driving systems: state-of-the-art and open research challenges. IEEE Trans Intell Transp Syst 25(2):1112\u20131130","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"9","key":"2005_CR2","doi-asserted-by":"publisher","first-page":"6227","DOI":"10.1109\/TWC.2023.3240969","volume":"22","author":"Z Weng","year":"2023","unstructured":"Weng Z, Qin Z, Tao X, Pan C, Liu G, Li GY (2023) Deep learning enabled semantic communications with speech recognition and synthesis. IEEE Trans Wirel Commun 22(9):6227\u20136240","journal-title":"IEEE Trans Wirel Commun"},{"issue":"1","key":"2005_CR3","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TNET.2023.3277810","volume":"32","author":"A Khochare","year":"2023","unstructured":"Khochare A, Sorbelli FB, Simmhan Y, Das SK (2023) Improved algorithms for co-scheduling of edge analytics and routes for uav fleet missions. IEEE\/ACM Trans Netw 32(1):17\u201333","journal-title":"IEEE\/ACM Trans Netw"},{"key":"2005_CR4","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/TIP.2023.3335830","volume":"33","author":"M Zhang","year":"2023","unstructured":"Zhang M, Liu R, Deguchi D, Murase H (2023) Texture-guided transfer learning for low-quality face recognition. IEEE Trans Image Process 33:95\u2013107","journal-title":"IEEE Trans Image Process"},{"key":"2005_CR5","doi-asserted-by":"crossref","unstructured":"Liao F, Liang M, Dong Y, Pang T, Hu X, Zhu J (2018) Defense against adversarial attacks using high-level representation guided denoiser. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1778\u20131787","DOI":"10.1109\/CVPR.2018.00191"},{"issue":"9","key":"2005_CR6","doi-asserted-by":"publisher","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","volume":"30","author":"X Yuan","year":"2019","unstructured":"Yuan X, He P, Zhu Q, Li X (2019) Adversarial examples: attacks and defenses for deep learning. IEEE Trans Neural Netw Learn Syst 30(9):2805\u20132824","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"2005_CR7","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. Comput Sci"},{"key":"2005_CR8","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199"},{"key":"2005_CR9","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 IEEE symposium on security and privacy (SP). IEEE, pp 39\u201357","DOI":"10.1109\/SP.2017.49"},{"key":"2005_CR10","doi-asserted-by":"crossref","unstructured":"Chen P-Y, Sharma Y, Zhang H, Yi J, Hsieh C-J (2018) Ead: elastic-net attacks to deep neural networks via adversarial examples. In: Thirty-second AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v32i1.11302"},{"key":"2005_CR11","unstructured":"Uesato J, O\u2019donoghue B, Kohli P, Oord A (2018) Adversarial risk and the dangers of evaluating against weak attacks. In: International conference on machine learning. PMLR, pp 5025\u20135034"},{"key":"2005_CR12","doi-asserted-by":"crossref","unstructured":"Papernot N, McDaniel P, Jha S, Fredrikson M, Celik ZB, Swami A (2016) The limitations of deep learning in adversarial settings. In: 2016 IEEE European symposium on security and privacy (EuroS &P). IEEE, pp 372\u2013387","DOI":"10.1109\/EuroSP.2016.36"},{"issue":"5","key":"2005_CR13","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","volume":"23","author":"J Su","year":"2017","unstructured":"Su J, Vargas DV, Kouichi S (2017) One pixel attack for fooling deep neural networks. IEEE Trans Evol Comput 23(5):828\u2013841","journal-title":"IEEE Trans Evol Comput"},{"key":"2005_CR14","doi-asserted-by":"publisher","first-page":"9572","DOI":"10.1109\/TMM.2023.3255742","volume":"25","author":"C Wan","year":"2023","unstructured":"Wan C, Huang F, Zhao X (2023) Average gradient-based adversarial attack. IEEE Trans Multimed 25:9572\u20139585","journal-title":"IEEE Trans Multimed"},{"key":"2005_CR15","doi-asserted-by":"crossref","unstructured":"Li B, Liu W (2023) Wat: improve the worst-class robustness in adversarial training. In: Proceedings of the AAAI conference on artificial intelligence, vol 37, pp 14982\u201314990","DOI":"10.1609\/aaai.v37i12.26749"},{"issue":"8","key":"2005_CR16","doi-asserted-by":"publisher","first-page":"9174","DOI":"10.1007\/s10489-022-03991-6","volume":"53","author":"G Ryu","year":"2023","unstructured":"Ryu G, Choi D (2023) A hybrid adversarial training for deep learning model and denoising network resistant to adversarial examples. Appl Intell 53(8):9174\u20139187","journal-title":"Appl Intell"},{"key":"2005_CR17","doi-asserted-by":"publisher","first-page":"107141","DOI":"10.1016\/j.knosys.2021.107141","volume":"226","author":"L Wang","year":"2021","unstructured":"Wang L, Chen X, Tang R, Yue Y, Zhu Y, Zeng X, Wang W (2021) Improving adversarial robustness of deep neural networks by using semantic information. Knowl-Based Syst 226:107141","journal-title":"Knowl-Based Syst"},{"key":"2005_CR18","doi-asserted-by":"crossref","unstructured":"Xie C, Wu Y, Maaten Lvd, Yuille AL, He K (2019) Feature denoising for improving adversarial robustness. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 501\u2013509","DOI":"10.1109\/CVPR.2019.00059"},{"key":"2005_CR19","unstructured":"Wu T, Tong L, Vorobeychik Y (2019) Defending against physically realizable attacks on image classification. arXiv preprint arXiv:1909.09552"},{"key":"2005_CR20","doi-asserted-by":"crossref","unstructured":"Borkar T, Heide F, Karam L (2020) Defending against universal attacks through selective feature regeneration. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 709\u2013719","DOI":"10.1109\/CVPR42600.2020.00079"},{"issue":"6","key":"2005_CR21","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/s11263-019-01160-w","volume":"127","author":"G Goswami","year":"2019","unstructured":"Goswami G, Agarwal A, Ratha N, Singh R, Vatsa M (2019) Detecting and mitigating adversarial perturbations for robust face recognition. Int J Comput Vis 127(6):719\u2013742","journal-title":"Int J Comput Vis"},{"issue":"12","key":"2005_CR22","doi-asserted-by":"publisher","first-page":"10193","DOI":"10.1002\/int.22458","volume":"37","author":"D Ye","year":"2022","unstructured":"Ye D, Chen C, Liu C, Wang H, Jiang S (2022) Detection defense against adversarial attacks with saliency map. Int J Intell Syst 37(12):10193\u201310210","journal-title":"Int J Intell Syst"},{"key":"2005_CR23","doi-asserted-by":"crossref","unstructured":"Akhtar N, Liu J, Mian A (2018) Defense against universal adversarial perturbations. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 3389\u20133398","DOI":"10.1109\/CVPR.2018.00357"},{"issue":"4","key":"2005_CR24","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1093\/bib\/bbae344","volume":"25","author":"O Tutsoy","year":"2024","unstructured":"Tutsoy O, Sumbul HE (2024) A novel deep machine learning algorithm with dimensionality and size reduction approaches for feature elimination: thyroid cancer diagnoses with randomly missing data. Brief Bioinform 25(4):344","journal-title":"Brief Bioinform"},{"key":"2005_CR25","doi-asserted-by":"crossref","unstructured":"Prakash A, Moran N, Garber S, DiLillo A, Storer J (2018) Protecting jpeg images against adversarial attacks. In: 2018 Data compression conference. IEEE, pp 137\u2013146","DOI":"10.1109\/DCC.2018.00022"},{"key":"2005_CR26","unstructured":"Xie C, Wang J, Zhang Z, Ren Z, Yuille A (2017) Mitigating adversarial effects through randomization. In: International conference on learning representations"},{"issue":"3","key":"2005_CR27","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/TC.2021.3076826","volume":"73","author":"H Qiu","year":"2021","unstructured":"Qiu H, Zeng Y, Zheng Q, Guo S, Zhang T, Li H (2021) An efficient preprocessing-based approach to mitigate advanced adversarial attacks. IEEE Trans Comput 73(3):645\u2013655","journal-title":"IEEE Trans Comput"},{"key":"2005_CR28","doi-asserted-by":"crossref","unstructured":"Prakash A, Moran N, Garber S, DiLillo A, Storer J (2018) Deflecting adversarial attacks with pixel deflection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 8571\u20138580","DOI":"10.1109\/CVPR.2018.00894"},{"issue":"12","key":"2005_CR29","doi-asserted-by":"publisher","first-page":"0167662","DOI":"10.1371\/journal.pone.0167662","volume":"11","author":"Y Xiang","year":"2016","unstructured":"Xiang Y, Wang X, He L, Wang W, Moran W (2016) Spatial-temporal analysis of environmental data of north beijing district using hilbert\u2013huang transform. PLoS ONE 11(12):0167662","journal-title":"PLoS ONE"},{"key":"2005_CR30","doi-asserted-by":"crossref","unstructured":"Li J, Xiang Y, Fang J, Wang W, Pi Y (2019) Research on multiple sensors vehicle detection with emd-based denoising. IEEE Internet Things J 6(4):6262\u20136270","DOI":"10.1109\/JIOT.2018.2890541"},{"issue":"4","key":"2005_CR31","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1109\/TSP.2009.2013885","volume":"57","author":"Y Kopsinis","year":"2009","unstructured":"Kopsinis Y, McLaughlin S (2009) Development of emd-based denoising methods inspired by wavelet thresholding. IEEE Trans Signal Process 57(4):1351\u20131362","journal-title":"IEEE Trans Signal Process"},{"key":"2005_CR32","doi-asserted-by":"crossref","unstructured":"Xiang Y, Gou L, He L, Xia S, Wang W (2018) A SVR-ANN combined model based on ensemble EMD for rainfall prediction. Appl Soft Comput 73:874\u2013883","DOI":"10.1016\/j.asoc.2018.09.018"},{"key":"2005_CR33","doi-asserted-by":"publisher","first-page":"108490","DOI":"10.1016\/j.measurement.2020.108490","volume":"169","author":"Y Jia","year":"2021","unstructured":"Jia Y, Li G, Dong X, He K (2021) A novel denoising method for vibration signal of hob spindle based on eemd and grey theory. Measurement 169:108490","journal-title":"Measurement"},{"key":"2005_CR34","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli S-M, Fawzi A, Frossard P (2016) Deepfool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2574\u20132582","DOI":"10.1109\/CVPR.2016.282"},{"key":"2005_CR35","doi-asserted-by":"crossref","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 2818\u20132826","DOI":"10.1109\/CVPR.2016.308"},{"key":"2005_CR36","doi-asserted-by":"crossref","unstructured":"Chollet F (2017) Xception: deep learning with depthwise separable convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 1251\u20131258","DOI":"10.1109\/CVPR.2017.195"},{"key":"2005_CR37","doi-asserted-by":"crossref","unstructured":"Szegedy C, Ioffe S, Vanhoucke V, Alemi AA (2017) Inception-v4, inception-ResNet and the impact of residual connections on learning. In: Thirty-first AAAI Conference on Artificial Intelligence","DOI":"10.1609\/aaai.v31i1.11231"},{"issue":"01","key":"2005_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S1793536909000047","volume":"1","author":"Z Wu","year":"2011","unstructured":"Wu Z, Huang NE (2011) Ensemble empirical mode decomposition: a noise-assisted data analysis method. Adv Adapt Data Anal 1(01):1\u201341","journal-title":"Adv Adapt Data Anal"},{"key":"2005_CR39","unstructured":"Song S, Chen Y, Cheung N-M, Kuo C-CJ (2018) Defense against adversarial attacks with Saak transform. arXiv preprint arXiv:1808.01785"},{"issue":"5","key":"2005_CR40","doi-asserted-by":"publisher","first-page":"3371","DOI":"10.1007\/s10064-018-1298-2","volume":"78","author":"M Azarafza","year":"2019","unstructured":"Azarafza M, Ghazifard A, Akg\u00fcn H, Asghari-Kaljahi E (2019) Development of a 2d and 3d computational algorithm for discontinuity structural geometry identification by artificial intelligence based on image processing techniques. Bull Eng Geol Env 78(5):3371\u20133383","journal-title":"Bull Eng Geol Env"},{"issue":"1","key":"2005_CR41","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/0031-3203(81)90028-5","volume":"13","author":"K-S Fu","year":"1981","unstructured":"Fu K-S, Mui J (1981) A survey on image segmentation. Pattern Recogn 13(1):3\u201316","journal-title":"Pattern Recogn"},{"key":"2005_CR42","unstructured":"Papernot N, Faghri F, Carlini N, Goodfellow I, Feinman R, Kurakin A, Xie C, Sharma Y, Brown T, Roy A, Matyasko A, Behzadan V, Hambardzumyan K, Zhang Z, Juang Y-L, Li Z, Sheatsley R, Garg A, Uesato J, Gierke W, Dong Y, Berthelot D, Hendricks P, Rauber J, Long R (2018) Technical report on the cleverhans v2.1.0 adversarial examples library. arXiv preprint arXiv:1610.00768"},{"key":"2005_CR43","unstructured":"Zheng-Jia HE, Yong-Gang XU, Tai-Yong W (2004) Empirical mode decomposition and complexity measurement of mechanical vibration signals. In: International symposium on instrumentation science and technology"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-02005-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-025-02005-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-02005-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T13:31:57Z","timestamp":1758807117000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-025-02005-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,11]]},"references-count":43,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2005"],"URL":"https:\/\/doi.org\/10.1007\/s40747-025-02005-5","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2025,9,11]]},"assertion":[{"value":"9 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}}],"article-number":"450"}}