{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:09:57Z","timestamp":1730246997716,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100007225","name":"Ministry of Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007225","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100016292","name":"National Applied Research Laboratories","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016292","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1109\/icip51287.2024.10647385","type":"proceedings-article","created":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T18:34:45Z","timestamp":1727462085000},"page":"563-567","source":"Crossref","is-referenced-by-count":0,"title":["LFGN: Low-Level Feature-Guided Network For Adversarial Defense"],"prefix":"10.1109","author":[{"given":"Chih-Chung","family":"Hsu","sequence":"first","affiliation":[{"name":"National Cheng Kung University Institute of Data Science and Department of Statistics No. 1, University Rd.,Tainan,Taiwan"}]},{"given":"Ming-Hsuan","family":"Wu","sequence":"additional","affiliation":[{"name":"National Cheng Kung University Institute of Data Science and Department of Statistics No. 1, University Rd.,Tainan,Taiwan"}]},{"given":"En-Chao","family":"Liu","sequence":"additional","affiliation":[{"name":"National Cheng Kung University Institute of Data Science and Department of Statistics No. 1, University Rd.,Tainan,Taiwan"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv preprint arXiv:1706.06083"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-019-1211-x"},{"key":"ref4","first-page":"274","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","author":"Athalye","year":"2018","journal-title":"ICML"},{"key":"ref5","article-title":"Intriguing properties of neural networks","author":"Sutskever","year":"2013","journal-title":"arXiv preprint arXiv:1312.6199"},{"key":"ref6","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv preprint arXiv:1412.6572"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref8","article-title":"Maximal jacobian-based saliency map attack","author":"Wiyatno","year":"2018","journal-title":"arXiv"},{"key":"ref9","first-page":"2206","article-title":"Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks","author":"Croce","year":"2020","journal-title":"ICML"},{"key":"ref10","article-title":"Effect of jpg compression on adversarial images","author":"Dziugaite","year":"2016","journal-title":"arXiv"},{"key":"ref11","article-title":"Protecting and vaccinating deep learning with jpeg compression","author":"Das","year":"2017","journal-title":"arXiv"},{"key":"ref12","article-title":"Countering adversarial images using input transformations","author":"Guo","year":"2017","journal-title":"arXiv"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11504"},{"key":"ref14","article-title":"Formal guarantees on the robustness of a classifier against adversarial manipulation","volume":"30","author":"Hein","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01258-8_32"},{"key":"ref16","article-title":"Enhancing adversarial defense by k-winners-take-all","author":"Xiao","year":"2019","journal-title":"arXiv"},{"key":"ref17","first-page":"5025","article-title":"Adversarial risk and the dangers of evaluating against weak attacks","author":"Uesato","year":"2018","journal-title":"ICML"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108249"},{"key":"ref19","article-title":"Smooth adversarial training","author":"Xie","year":"2020","journal-title":"arXiv preprint arXiv:2006.14536"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00059"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1974.223784"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(92)90121-X"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0477(1998)079<0061:APGTWA>2.0.CO;2"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2044957"},{"issue":"1","key":"ref25","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/0031-3203(95)00067-4","article-title":"ainen, and D. Harwood","volume":"29","author":"Ojala","year":"1996","journal-title":"Pattern recognition"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2042645"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.5555\/2999134.2999257"},{"year":"2021","key":"ref28","article-title":"Third-party implementation of feature denoising"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"ref31","article-title":"Ensemble adversarial training: Attacks and defenses","author":"Tram\u2019er","year":"2017","journal-title":"arXiv preprint arXiv:1705.07204"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11021-5_5"}],"event":{"name":"2024 IEEE International Conference on Image Processing (ICIP)","start":{"date-parts":[[2024,10,27]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2024,10,30]]}},"container-title":["2024 IEEE International Conference on Image Processing (ICIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10647221\/10647122\/10647385.pdf?arnumber=10647385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T05:36:17Z","timestamp":1727501777000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10647385\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icip51287.2024.10647385","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]}}}