{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T10:05:39Z","timestamp":1766138739390,"version":"3.37.3"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100009392","name":"via funding from Prince Sattam Bin Abdulaziz University","doi-asserted-by":"publisher","award":["PSAU\/2024\/R\/1445"],"award-info":[{"award-number":["PSAU\/2024\/R\/1445"]}],"id":[{"id":"10.13039\/100009392","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3418614","type":"journal-article","created":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T20:08:16Z","timestamp":1719259696000},"page":"88913-88926","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing Security in Real-Time Video Surveillance: A Deep Learning-Based Remedial Approach for Adversarial Attack Mitigation"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2173-2545","authenticated-orcid":false,"given":"Gyana","family":"Ranjana Panigrahi","sequence":"first","affiliation":[{"name":"Department of Electronics, Sambalpur University, Sambalpur, Odisha, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3477-6715","authenticated-orcid":false,"given":"Prabira","family":"Kumar Sethy","sequence":"additional","affiliation":[{"name":"Department of Electronics, Sambalpur University, Sambalpur, Odisha, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4857-7821","authenticated-orcid":false,"given":"Santi","family":"Kumari Behera","sequence":"additional","affiliation":[{"name":"Department of CSE, VSSUT Burla, Burla, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4274-4927","authenticated-orcid":false,"given":"Manoj","family":"Gupta","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, SOS-Engineering and Technology, Guru Ghasidas Vishwavidyalaya, Bilaspur, Chhattisgarh, India"}]},{"given":"Farhan A.","family":"Alenizi","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, College of Engineering, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1618-6001","authenticated-orcid":false,"given":"Aziz","family":"Nanthaamornphong","sequence":"additional","affiliation":[{"name":"College of Computing, Prince of Songkla University, Phuket, Thailand"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"ImageNet classification with deep convolutional neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"25","author":"Krizhevsky"},{"key":"ref2","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv:1409.1556"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/34.824819"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S2213-2600(20)30134-X"},{"volume-title":"Advice on the Use of Masks in the Context of COVID-19: Interim Guidance","year":"2020","key":"ref5"},{"issue":"1","key":"ref6","first-page":"23873","article-title":"Untargeted white-box adversarial attack to break into deep leaning based COVID-19 monitoring face mask detection system","volume":"83","author":"Zafar","year":"2024","journal-title":"Multimedia Tools Appl."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103379"},{"key":"ref8","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"Chen","year":"2017","journal-title":"arXiv:1712.05526"},{"issue":"3","key":"ref9","first-page":"1100","article-title":"Model inversion attack: Analysis under gray-box scenario on deep learning based face recognition system","volume":"15","author":"Khosravy","year":"2021","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243757"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2019.12.012"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33018973"},{"key":"ref13","article-title":"Adversarial perturbations against real-time video classification systems","author":"Li","year":"2018","journal-title":"arXiv:1807.00458"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.53"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2023.3242085"},{"volume-title":"Github\u2014Prajnasb\/observations","year":"2024","key":"ref17"},{"volume-title":"Face Mask Detection","year":"2024","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.smhl.2020.100144"},{"volume-title":"Github\u2014X-Zhangyang\/Real-World-Masked-Face-Dataset: Real-World Masked Face Dataset","year":"2024","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE54056.2021.9721520"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2017.8078500"},{"key":"ref24","article-title":"MobileNets: Efficient convolutional neural networks for mobile vision applications","author":"Howard","year":"2017","journal-title":"arXiv:1704.04861"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2023.106791"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/s20185236"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/icsgrc49013.2020.9232610"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.22214\/ijraset.2020.30560"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102600"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102692"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19390-8_16"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108450"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.12.202"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc8010009"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15405-x"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10570164.pdf?arnumber=10570164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T07:07:01Z","timestamp":1725606421000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10570164\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3418614","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2024]]}}}