{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T04:55:42Z","timestamp":1772600142403,"version":"3.50.1"},"reference-count":64,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100012154","name":"Graduate Research and Innovation Projects of Jiangsu Province","doi-asserted-by":"publisher","award":["KYCX25_1147"],"award-info":[{"award-number":["KYCX25_1147"]}],"id":[{"id":"10.13039\/501100012154","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010014","name":"Six Talent Peaks Project in Jiangsu Province","doi-asserted-by":"publisher","award":["RJFW-111"],"award-info":[{"award-number":["RJFW-111"]}],"id":[{"id":"10.13039\/501100010014","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.eswa.2026.131509","type":"journal-article","created":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T00:26:20Z","timestamp":1770683180000},"page":"131509","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["PaDe: Towards robust adversarial patch defense via trigger-space feature decoupling and orthogonal representation learning"],"prefix":"10.1016","volume":"313","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-1017-4365","authenticated-orcid":false,"given":"Wenlong","family":"Zheng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4536-7919","authenticated-orcid":false,"given":"Heng","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1294-2005","authenticated-orcid":false,"given":"Yuhao","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5026-5347","authenticated-orcid":false,"given":"Peng","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2809-2237","authenticated-orcid":false,"given":"He","family":"Xu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2026.131509_bib0001","series-title":"Proceedings of the international conference on machine learning","first-page":"274","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","author":"Athalye","year":"2018"},{"issue":"7","key":"10.1016\/j.eswa.2026.131509_bib0002","first-page":"1532","article-title":"Rademacher and gaussian complexities: Risk bounds and structural results","volume":"3","author":"Bartlett","year":"2003","journal-title":"Journal of Machine Learning Research"},{"key":"10.1016\/j.eswa.2026.131509_bib0003","series-title":"Convex optimization","author":"Boyd","year":"2004"},{"key":"10.1016\/j.eswa.2026.131509_bib0004","series-title":"Adversarial patch","author":"Brown","year":"2017"},{"issue":"6","key":"10.1016\/j.eswa.2026.131509_bib0005","first-page":"10164","article-title":"End-to-end autonomous driving: Challenges and frontiers","volume":"46","author":"Chen","year":"2023","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"10.1016\/j.eswa.2026.131509_bib0006","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"696","article-title":"Adversarial robustness: From self-supervised pre-training to fine-tuning","author":"Chen","year":"2020"},{"key":"10.1016\/j.eswa.2026.131509_bib0007","series-title":"Proceedings of the international conference on machine learning","first-page":"1310","article-title":"Certified adversarial robustness via randomized smoothing","author":"Cohen","year":"2019"},{"key":"10.1016\/j.eswa.2026.131509_bib0008","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"886","article-title":"Histograms of oriented gradients for human detection","author":"Dalal","year":"2005"},{"key":"10.1016\/j.eswa.2026.131509_bib0009","series-title":"Proceedings of the advances in neural information processing systems","first-page":"17556","article-title":"Label noise in adversarial training: A novel perspective to study robust overfitting","author":"Dong","year":"2022"},{"issue":"7","key":"10.1016\/j.eswa.2026.131509_bib0010","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/s11263-009-0275-4","article-title":"The pascal visual object classes (voc) challenge","volume":"88","author":"Everingham","year":"2010","journal-title":"International Journal of Computer Vision"},{"key":"10.1016\/j.eswa.2026.131509_bib0011","series-title":"Proceedings of the IEEE symposium on security and privacy","first-page":"2133","article-title":"Fight fire with fire: Combating adversarial patch attacks using pattern-randomized defensive patches","author":"Feng","year":"2025"},{"key":"10.1016\/j.eswa.2026.131509_bib0012","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"13364","article-title":"Learned two-plane perspective prior based image resampling for efficient object detection","author":"Ghosh","year":"2023"},{"key":"10.1016\/j.eswa.2026.131509_bib0013","volume":"8","author":"Glenn","year":"2023","journal-title":"Ultralytics YOLOv"},{"key":"10.1016\/j.eswa.2026.131509_bib0014","series-title":"Proceedings of the international conference on learning representations","first-page":"1","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2015"},{"key":"10.1016\/j.eswa.2026.131509_bib0015","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"24595","article-title":"DAP: A dynamic adversarial patch for evading person detectors","author":"Guesmi","year":"2024"},{"key":"10.1016\/j.eswa.2026.131509_bib0016","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops","first-page":"1678","article-title":"On visible adversarial perturbations & digital watermarking","author":"Hayes","year":"2018"},{"key":"10.1016\/j.eswa.2026.131509_bib0017","series-title":"Proceedings of the IEEE\/CVF international conference on computer vision","first-page":"13297","article-title":"Naturalistic physical adversarial patch for object detectors","author":"Hu","year":"2021"},{"key":"10.1016\/j.eswa.2026.131509_bib0018","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"7828","article-title":"Adversarial texture for fooling person detectors in the physical world","author":"Hu","year":"2022"},{"key":"10.1016\/j.eswa.2026.131509_bib0019","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"20514","article-title":"T-sea: Transfer-based self-ensemble attack on object detection","author":"Huang","year":"2023"},{"key":"10.1016\/j.eswa.2026.131509_bib0020","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"16447","article-title":"Randomized adversarial training via taylor expansion","author":"Jin","year":"2023"},{"key":"10.1016\/j.eswa.2026.131509_bib0021","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"24472","article-title":"PAD: Patch-agnostic defense against adversarial patch attacks","author":"Jing","year":"2024"},{"key":"10.1016\/j.eswa.2026.131509_bib0022","author":"Jocher","year":"2020"},{"key":"10.1016\/j.eswa.2026.131509_bib0023","series-title":"Proceedings of the international conference on learning representations","first-page":"1","article-title":"Diffender: Diffusion-based adversarial defense against patch attacks","author":"Kang","year":"2024"},{"key":"10.1016\/j.eswa.2026.131509_bib0024","series-title":"Proceedings of the international conference on machine learning","first-page":"2507","article-title":"LaVAN: Localized and visible adversarial noise","author":"Karmon","year":"2018"},{"key":"10.1016\/j.eswa.2026.131509_bib0025","series-title":"Proceedings of the AAAI conference on artificial intelligence","first-page":"1157","article-title":"Towards versatile pedestrian detector with multisensory-matching and multispectral recalling memory","author":"Kim","year":"2022"},{"key":"10.1016\/j.eswa.2026.131509_bib0026","doi-asserted-by":"crossref","first-page":"12796","DOI":"10.1109\/TCSVT.2024.3437482","article-title":"Toward attacking the localization ability of object detector","volume":"34","author":"Li","year":"2024","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10.1016\/j.eswa.2026.131509_bib0027","doi-asserted-by":"crossref","first-page":"3017","DOI":"10.1109\/TCSVT.2023.3306870","article-title":"Stabilizing multispectral pedestrian detection with evidential hybrid fusion","volume":"34","author":"Li","year":"2024","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10.1016\/j.eswa.2026.131509_bib0028","doi-asserted-by":"crossref","unstructured":"Li, T., Wu, Y., Chen, S., Fang, K., & Huang, X. (2021). In Subspace Adversarial Training the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (pp. 13399\u201313408). https:\/\/api.semanticscholar.org\/CorpusID:244527569.","DOI":"10.1109\/CVPR52688.2022.01305"},{"key":"10.1016\/j.eswa.2026.131509_bib0029","series-title":"Proceedings of the European conference on computer vision","first-page":"740","article-title":"Common objects in context","author":"Lin","year":"2014"},{"key":"10.1016\/j.eswa.2026.131509_bib0030","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"14953","article-title":"Segment and complete: Defending object detectors against adversarial patch attacks with robust patch detection","author":"Liu","year":"2022"},{"key":"10.1016\/j.eswa.2026.131509_bib0031","series-title":"Adversarial attack with raindrops","author":"Liu","year":"2023"},{"key":"10.1016\/j.eswa.2026.131509_bib0032","series-title":"DPATCH: An adversarial patch attack on object detectors","author":"Liu","year":"2018"},{"key":"10.1016\/j.eswa.2026.131509_bib0033","series-title":"Proceedings of the international conference on learning representations","first-page":"1","article-title":"Generalization bounds for deep convolutional neural networks","author":"Long","year":"2020"},{"key":"10.1016\/j.eswa.2026.131509_bib0034","doi-asserted-by":"crossref","first-page":"3395","DOI":"10.1109\/TCSVT.2023.3322465","article-title":"Instance-dictionary learning for open-world object detection in autonomous driving scenarios","volume":"34","author":"Ma","year":"2024","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10.1016\/j.eswa.2026.131509_bib0035","series-title":"Proceedings of the international conference on learning representations","first-page":"1","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2018"},{"key":"10.1016\/j.eswa.2026.131509_bib0036","series-title":"Foundations of machine learning, in","author":"Mohri","year":"2018"},{"key":"10.1016\/j.eswa.2026.131509_bib0037","series-title":"Proceedings of the IEEE winter conference on applications of computer vision","first-page":"1300","article-title":"Local gradients smoothing: Defense against localized adversarial attacks","author":"Naseer","year":"2018"},{"key":"10.1016\/j.eswa.2026.131509_bib0038","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"24786","article-title":"SlowFormer: Adversarial attack on compute and energy consumption of efficient vision transformers","author":"Navaneet","year":"2024"},{"key":"10.1016\/j.eswa.2026.131509_bib0039","series-title":"Proceedings of the international conference on learning representations","first-page":"1","article-title":"Certified defenses against adversarial examples","author":"Raghunathan","year":"2018"},{"key":"10.1016\/j.eswa.2026.131509_bib0040","doi-asserted-by":"crossref","first-page":"2289","DOI":"10.1109\/TCSVT.2023.3307150","article-title":"Cross-shaped adversarial patch attack","volume":"34","author":"Ran","year":"2024","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10.1016\/j.eswa.2026.131509_bib0041","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"779","article-title":"You only look once: Unified, real-time object detection","author":"Redmon","year":"2016"},{"key":"10.1016\/j.eswa.2026.131509_bib0042","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"6517","article-title":"Yolo9000: Better, faster, stronger","author":"Redmon","year":"2017"},{"key":"10.1016\/j.eswa.2026.131509_bib0043","series-title":"Methods of Modern Mathematical Physics","author":"Reed","year":"1972"},{"key":"10.1016\/j.eswa.2026.131509_bib0044","doi-asserted-by":"crossref","first-page":"1137","DOI":"10.1109\/TPAMI.2016.2577031","article-title":"Towards real-time object detection with region proposal networks","volume":"39","author":"Ren","year":"2017","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"10.1016\/j.eswa.2026.131509_bib0045","series-title":"Proceedings of the international conference on machine learning","first-page":"8093","article-title":"Overfitting in adversarially robust deep learning","author":"Rice","year":"2020"},{"key":"10.1016\/j.eswa.2026.131509_bib0046","series-title":"Principles of mathematical analysis","author":"Rudin","year":"1979"},{"key":"10.1016\/j.eswa.2026.131509_bib0047","series-title":"Understanding machine learning: From theory to algorithms","author":"Shai","year":"2014"},{"key":"10.1016\/j.eswa.2026.131509_bib0048","doi-asserted-by":"crossref","first-page":"12411","DOI":"10.1109\/TCSVT.2024.3427428","article-title":"Unsupervised class-imbalanced domain adaptation with pairwise adversarial training and semantic alignment","volume":"34","author":"Shi","year":"2024","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10.1016\/j.eswa.2026.131509_bib0049","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"4087","article-title":"Entropy-based localization and removal of adversarial patches","author":"Tarchoun","year":"2023"},{"key":"10.1016\/j.eswa.2026.131509_bib0050","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops","first-page":"49","article-title":"Fooling automated surveillance cameras: Adversarial patches to attack person detection","author":"Thys","year":"2019"},{"key":"10.1016\/j.eswa.2026.131509_bib0051","series-title":"Deep learning and the information bottleneck principle","author":"Tishby","year":"2015"},{"issue":"5","key":"10.1016\/j.eswa.2026.131509_bib0052","first-page":"691","article-title":"You only learn one representation: Unified network for multiple tasks","volume":"39","author":"Wang","year":"2021","journal-title":"Journal of Information Science and Engineering"},{"key":"10.1016\/j.eswa.2026.131509_bib0053","series-title":"Proceedings of the IEEE\/CVF international conference on computer vision","first-page":"4422","article-title":"Unified adversarial patch for cross-modal attacks in the physical world","author":"Wei","year":"2023"},{"key":"10.1016\/j.eswa.2026.131509_bib0054","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"12291","article-title":"Black-box sparse adversarial attack via multi-objective optimisation CVPR proceedings","author":"Williams","year":"2023"},{"key":"10.1016\/j.eswa.2026.131509_bib0055","series-title":"Proceedings of the international conference on machine learning","first-page":"5286","article-title":"Provable defenses against adversarial examples via the convex outer adversarial polytope","author":"Wong","year":"2018"},{"key":"10.1016\/j.eswa.2026.131509_bib0056","series-title":"Proceedings of the ACM sigsac conference on computer and communications security","first-page":"3177","article-title":"Detectorguard: Provably securing object detectors against localized patch hiding attacks","author":"Xiang","year":"2021"},{"key":"10.1016\/j.eswa.2026.131509_bib0057","series-title":"Proceedings of the IEEE symposium on security and privacy","first-page":"1329","article-title":"ObjectSeeker: Certifiably robust object detection against patch hiding attacks via patch-agnostic masking","author":"Xiang","year":"2022"},{"key":"10.1016\/j.eswa.2026.131509_bib0058","series-title":"Proceedings of the network and distributed systems security symposium","first-page":"1","article-title":"Feature squeezing: Detecting adversarial examples in deep neural networks","author":"Xu","year":"2018"},{"key":"10.1016\/j.eswa.2026.131509_bib0059","doi-asserted-by":"crossref","first-page":"13190","DOI":"10.1109\/TCSVT.2024.3452475","article-title":"Diffusion patch attack with spatial-temporal cross-evolution for video recognition","volume":"34","author":"Yang","year":"2024","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"11","key":"10.1016\/j.eswa.2026.131509_bib0060","doi-asserted-by":"crossref","first-page":"6976","DOI":"10.1109\/TIP.2022.3217375","article-title":"Defending person detection against adversarial patch attack by using universal defensive frame","volume":"31","author":"Yu","year":"2022","journal-title":"IEEE Transactions on Image Processing"},{"key":"10.1016\/j.eswa.2026.131509_bib0061","series-title":"Proceedings of the AAAI conference on artificial intelligence","first-page":"10077","article-title":"Adversarial framing for image and video classification","author":"Zajac","year":"2019"},{"key":"10.1016\/j.eswa.2026.131509_bib0062","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"24452","article-title":"Physical 3D adversarial attacks against monocular depth estimation in autonomous driving","author":"Zheng","year":"2024"},{"key":"10.1016\/j.eswa.2026.131509_bib0063","article-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","author":"Zheng","year":"2021"},{"key":"10.1016\/j.eswa.2026.131509_bib0064","series-title":"Proceedings of the international conference on learning representations","first-page":"1","article-title":"Fast adversarial training against sparse attacks requires loss smoothing","author":"Zhong","year":"2025"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417426004227?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417426004227?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T03:58:26Z","timestamp":1772596706000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417426004227"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":64,"alternative-id":["S0957417426004227"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2026.131509","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"PaDe: Towards robust adversarial patch defense via trigger-space feature decoupling and orthogonal representation learning","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2026.131509","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"131509"}}