{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T04:07:14Z","timestamp":1768277234705,"version":"3.49.0"},"reference-count":36,"publisher":"Tsinghua University Press","issue":"2","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,25]],"date-time":"2021-01-25T00:00:00Z","timestamp":1611532800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comp. Visual. Med."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s41095-021-0202-3","type":"journal-article","created":{"date-parts":[[2021,1,25]],"date-time":"2021-01-25T10:05:04Z","timestamp":1611569104000},"page":"217-227","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["An end-to-end convolutional network for joint detecting and denoising adversarial perturbations in vehicle classification"],"prefix":"10.26599","volume":"7","author":[{"given":"Peng","family":"Liu","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Huiyuan","family":"Fu","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Huadong","family":"Ma","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]}],"member":"11138","reference":[{"key":"202_CR1","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.neucom.2018.02.111","volume":"395","author":"H Y Fu","year":"2020","unstructured":"Fu, H. Y.; Ma, H. D.; Wang, G. Y.; Zhang, X. M.; Zhang, Y. F. MCFF-CNN: Multiscale comprehensive feature fusion convolutional neural network for vehicle color recognition based on residual learning. Neurocomputing Vol. 395, 178\u2013187, 2020.","journal-title":"Neurocomputing"},{"key":"202_CR2","doi-asserted-by":"crossref","unstructured":"He, K. M.; Zhang, X. Y.; Ren, S. Q.; Sun, J. Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 770\u2013778, 2016.","DOI":"10.1109\/CVPR.2016.90"},{"key":"202_CR3","doi-asserted-by":"crossref","unstructured":"Szegedy, C.; Vanhoucke, V.; Ioffe, S.; Shlens, J.; Wojna, Z. Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2818\u20132826, 2016.","DOI":"10.1109\/CVPR.2016.308"},{"issue":"1","key":"202_CR4","doi-asserted-by":"publisher","first-page":"158","DOI":"10.3390\/electronics9010158","volume":"9","author":"M Oh","year":"2020","unstructured":"Oh, M.; Cha, B.; Bae, I.; Choi, G.; Lim, Y. An urban autodriving algorithm based on a sensor-weighted integration field with deep learning. Electronics Vol. 9, No. 1, 158, 2020.","journal-title":"Electronics"},{"key":"202_CR5","first-page":"234","volume-title":"Medical Image Computing and Computer-Assisted Intervention \u2014 MICCAI 2015. Lecture Notes in Computer Science, Vol. 9351","author":"O Ronneberger","year":"2015","unstructured":"Ronneberger, O.; Fischer, P.; Brox, T. U-Net: Convolutional networks for biomedical image segmentation. In: Medical Image Computing and Computer-Assisted Intervention \u2014 MICCAI 2015. Lecture Notes in Computer Science, Vol. 9351. Navab, N.; Hornegger, J.; Wells, W.; Frangi, A. Eds. Springer Cham, 234\u2013241, 2015."},{"key":"202_CR6","doi-asserted-by":"crossref","unstructured":"Liu, X. C.; Liu, W.; Ma, H. D.; Fu, H. Y. Large-scale vehicle re-identification in urban surveillance videos. In: Proceedings of the IEEE International Conference on Multimedia and Expo, 1\u20136, 2016.","DOI":"10.1109\/ICME.2016.7553002"},{"issue":"7","key":"202_CR7","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1007\/s00138-017-0846-2","volume":"28","author":"L Zhuo","year":"2017","unstructured":"Zhuo, L.; Jiang, L. Y.; Zhu, Z. Q.; Li, J. F.; Zhang, J.; Long, H. X. Vehicle classification for large-scale traffic surveillance videos using Convolutional Neural Networks. Machine Vision and Applications Vol. 28, No. 7, 793\u2013802, 2017.","journal-title":"Machine Vision and Applications"},{"key":"202_CR8","doi-asserted-by":"publisher","first-page":"73340","DOI":"10.1109\/ACCESS.2020.2987634","volume":"8","author":"M Won","year":"2020","unstructured":"Won, M. Intelligent traffic monitoring systems for vehicle classification: A survey. IEEE Access Vol. 8, 73340\u201373358, 2020.","journal-title":"IEEE Access"},{"key":"202_CR9","unstructured":"Kurakin, A.; Goodfellow, I.; Bengio, S. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533, 2016."},{"key":"202_CR10","unstructured":"Liu, Y.; Chen, X.; Liu, C.; Song, D. Delving into transferable adversarial examples and black-box attacks. arXiv preprint arXiv:1611.02770, 2016."},{"key":"202_CR11","doi-asserted-by":"crossref","unstructured":"Papernot, N.; McDaniel, P.; Jha, S.; Fredrikson, M.; Celik, Z. B.; Swami, A. The limitations of deep learning in adversarial settings. In: Proceedings of the IEEE European Symposiumon Security and Privacy, 372\u2013387, 2016.","DOI":"10.1109\/EuroSP.2016.36"},{"key":"202_CR12","doi-asserted-by":"crossref","unstructured":"Carrara, F.; Falchi, F.; Caldelli, R.; Amato, G.; Fumarola, R.; Becarelli, R. Detecting adversarial example attacks to deep neural networks. In: Proceedings of the 15th International Workshop on Content-based Multimedia Indexing, Article No. 38, 2017.","DOI":"10.1145\/3095713.3095753"},{"key":"202_CR13","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.ins.2019.05.084","volume":"501","author":"F Guo","year":"2019","unstructured":"Guo, F.; Zhao, Q. J.; Li, X.; Kuang, X. H.; Zhang, J. W.; Han, Y. H.; Tan, Y.-A. Detecting adversarial examples via prediction difference for deep neural networks. Information Sciences Vol. 501, 182\u2013192, 2019.","journal-title":"Information Sciences"},{"key":"202_CR14","unstructured":"Rakin, A. S.; Fan, D. L. Defense-net: Defend against a wide range of adversarial attacks through adversarial detector. In: Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 332\u2013337, 2019."},{"key":"202_CR15","doi-asserted-by":"crossref","unstructured":"Liao, F. Z.; Liang, M.; Dong, Y. P.; Pang, T.; Hu, X. L.; Zhu, J. Defense against adversarial attacks using highlevel representation guided denoiser. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 1778\u20131787, 2018.","DOI":"10.1109\/CVPR.2018.00191"},{"key":"202_CR16","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.1109\/TIP.2019.2940533","volume":"29","author":"A Mustafa","year":"2020","unstructured":"Mustafa, A.; Khan, S. H.; Hayat, M.; Shen, J. B.; Shao, L. Image super-resolution as a defense against adversarial attacks. IEEE Transactions on Image Processing Vol. 29, 1711\u20131724, 2020.","journal-title":"IEEE Transactions on Image Processing"},{"key":"202_CR17","doi-asserted-by":"crossref","unstructured":"Prakash, A.; Moran, N.; Garber, S.; DiLillo, A.; Storer, J. Detecting adversarial attacks with pixel detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 8571\u20138580, 2018.","DOI":"10.1109\/CVPR.2018.00894"},{"key":"202_CR18","doi-asserted-by":"crossref","unstructured":"Xie, C. H.; Wu, Y. X.; van der Maaten, L.; Yuille, A. L.; He, K. M. Feature denoising for improving adversarial robustness. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 501\u2013509, 2019.","DOI":"10.1109\/CVPR.2019.00059"},{"key":"202_CR19","unstructured":"Szegedy, C.; Zaremba, W.; Sutskever, I.; Bruna, J.; Erhan, D.; Goodfellow, I.; Fergus, R. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199, 2013."},{"key":"202_CR20","unstructured":"Goodfellow, I. J.; Shlens, J.; Szegedy, C. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572, 2014."},{"key":"202_CR21","unstructured":"Moosavi-Dezfooli, S. M.; Fawzi, A.; Frossard, P. DeepFool: A simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2574\u20132582, 2016."},{"key":"202_CR22","unstructured":"Madry, A.; Makelov, A.; Schmidt, L.; Tsipras, D.; Vladu, A. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083, 2017."},{"key":"202_CR23","unstructured":"Metzen, J. H.; Genewein, T.; Fischer, V.; Bischofi, B. On detecting adversarial perturbations. arXiv preprint arXiv:1702.04267, 2017."},{"key":"202_CR24","unstructured":"Feinman, R.; Curtin, R. R.; Shintre, S.; Gardner, A. B. Detecting adversarial samples from artifacts. arXiv preprint arXiv:1703.00410, 2017."},{"issue":"1","key":"202_CR25","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/TDSC.2018.2874243","volume":"18","author":"B Liang","year":"2019","unstructured":"Liang, B.; Li, H. C.; Su, M. Q.; Li, X. R.; Shi, W. C.; Wang, X. F. Detecting adversarial image examples in deep neural networks with adaptive noise reduction. IEEE Transactions on Dependable and Secure Computing Vol. 18, No. 1, 72\u201385, 2019.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"202_CR26","doi-asserted-by":"crossref","unstructured":"Papernot, N.; McDaniel, P.; Wu, X.; Jha, S.; Swami, A. Distillation as a defense to adversarial perturbations against deep neural networks. In: Proceedings of the IEEE Symposium on Security and Privacy, 582\u2013597, 2016.","DOI":"10.1109\/SP.2016.41"},{"key":"202_CR27","doi-asserted-by":"crossref","unstructured":"Carlini, N.; Wagner, D. Towards evaluating the robustness of neural networks. In: Proceedings of the IEEE Symposium on Security and Privacy, 39\u201357, 2017.","DOI":"10.1109\/SP.2017.49"},{"key":"202_CR28","unstructured":"Samangouei, P.; Kabkab, M.; Chellappa, R. Defense-GAN: Protecting classifiers against adversarial attacks using generative models. arXiv preprint arXiv:1805.06605, 2018."},{"issue":"11","key":"202_CR29","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y.; Bottou, L.; Bengio, Y.; Haffner, P. Gradient-based learning applied to document recognition. Proceedings of the IEEE Vol. 86, No. 11, 2278\u20132324, 1998.","journal-title":"Proceedings of the IEEE"},{"key":"202_CR30","unstructured":"Santhanam G. K.; Grnarova, P. Defending against adversarial attacks by leveraging an entire GAN. arXiv preprint arXiv:1805.10652, 2018."},{"key":"202_CR31","unstructured":"Howard, A. G.; Zhu, M.; Chen, B.; Kalenichenko, D.; Wang, W.; Weyand, T.; Andreetto, M.; Adam, H. MobileNets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861, 2017."},{"key":"202_CR32","doi-asserted-by":"crossref","unstructured":"Vincent, P.; Larochelle, H.; Bengio, Y.; Manzagol, P. A. Extracting and composing robust features with denoising auto encoders. In: Proceedings of the 25th International Conference on Machine Learning, 1096\u20131103, 2008.","DOI":"10.1145\/1390156.1390294"},{"issue":"7","key":"202_CR33","doi-asserted-by":"publisher","first-page":"3142","DOI":"10.1109\/TIP.2017.2662206","volume":"26","author":"K Zhang","year":"2017","unstructured":"Zhang, K.; Zuo, W. M.; Chen, Y. J.; Meng, D. Y.; Zhang, L. Beyond a Gaussian denoiser: Residual learning of deep CNN for image denoising. IEEE Transactions on Image Processing Vol. 26, No. 7, 3142\u20133155, 2017.","journal-title":"IEEE Transactions on Image Processing"},{"key":"202_CR34","doi-asserted-by":"crossref","unstructured":"Dong, Z.; Pei, M. T.; He, Y.; Liu, T.; Dong, Y. M.; Jia, Y. D. Vehicle type classification using unsupervised convolutional neural network. In: Proceedings of the 22nd International Conference on Pattern Recognition, 172\u2013177, 2014.","DOI":"10.1109\/ICPR.2014.39"},{"key":"202_CR35","doi-asserted-by":"crossref","unstructured":"Yang, L. J.; Luo, P.; Loy, C. C.; Tang, X. O. A large-scale car dataset for fine-grained categorization and verification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 3973\u20133981, 2015.","DOI":"10.1109\/CVPR.2015.7299023"},{"key":"202_CR36","doi-asserted-by":"crossref","unstructured":"Zhou, B. L.; Khosla, A.; Lapedriza, A.; Oliva, A.; Torralba, A. Learning deep features for discriminative localization. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2921\u20132929, 2016.","DOI":"10.1109\/CVPR.2016.319"}],"container-title":["Computational Visual Media"],"original-title":[],"link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41095-021-0202-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41095-021-0202-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41095-021-0202-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10750449\/10897551\/10897557.pdf?arnumber=10897557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T18:38:40Z","timestamp":1762367920000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10897557\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":36,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1007\/s41095-021-0202-3","relation":{},"ISSN":["2096-0662","2096-0433"],"issn-type":[{"value":"2096-0662","type":"electronic"},{"value":"2096-0433","type":"print"}],"subject":[],"published":{"date-parts":[[2021,6]]},"assertion":[{"value":"3 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}