{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T09:31:21Z","timestamp":1775899881976,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1109\/icip51287.2024.10647435","type":"proceedings-article","created":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T18:34:45Z","timestamp":1727462085000},"page":"3896-3902","source":"Crossref","is-referenced-by-count":4,"title":["Defending Against Physical Adversarial Patch attacks On Infrared Human Detection"],"prefix":"10.1109","author":[{"given":"Lukas","family":"Strack","sequence":"first","affiliation":[{"name":"University of Freiburg,Germany"}]},{"given":"Futa","family":"Waseda","sequence":"additional","affiliation":[{"name":"The University of Tokyo,Japan"}]},{"given":"Huy H.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"National Institute of Informatics,Japan"}]},{"given":"Yinqiang","family":"Zheng","sequence":"additional","affiliation":[{"name":"The University of Tokyo,Japan"}]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[{"name":"The University of Tokyo,Japan"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2014","journal-title":"ICLR"},{"key":"ref2","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2015","journal-title":"ICLR"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref4","article-title":"Adversarial patch","author":"Brown","year":"2017","journal-title":"arXiv preprint arXiv:1712.09665"},{"key":"ref5","article-title":"Physical adversarial examples for object detectors","volume-title":"12th USENIX workshop on offensive technologies (WOOT 18)","author":"Song"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref7","article-title":"Physical adversarial examples for object detectors","volume-title":"12th USENIX workshop on offensive technologies (WOOT 18)","author":"Eykholt"},{"key":"ref8","article-title":"On physical adversarial patches for object detection","author":"Lee","year":"2019","journal-title":"arXiv preprint arXiv:1906.11897"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i4.16477"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01296"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26777"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01187"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2006.1689629"},{"key":"ref15","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv preprint arXiv:1412.6572"},{"key":"ref16","article-title":"Adversarial yolo: Defense human detection patch attacks via detecting adversarial patches","author":"Ji","year":"2021","journal-title":"arXiv preprint arXiv:2103.08860"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00081"},{"key":"ref18","article-title":"Resolving class imbalance in object detection with weighted cross entropy losses","author":"Phan","year":"2020","journal-title":"arXiv preprint arXiv:2006.01413"},{"key":"ref19","article-title":"Free - flir thermal dataset for algorithm training \u2014 teledyne flir"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/s16060820"},{"key":"ref21","article-title":"ultralytics\/yolov5: v6.0 - YOLOv5n \u2018Nano\u2019 models, Roboflow integration, TensorFlow export, OpenCV DNN support","author":"Jocher","year":"2021"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"ref23","first-page":"8093","article-title":"Overfitting in adversarially robust deep learning","volume-title":"International Conference on Machine Learning.","author":"Rice"},{"key":"ref24","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv preprint arXiv:1706.06083"},{"key":"ref25","first-page":"7472","article-title":"Theoretically principled trade-off between robustness and accuracy","volume-title":"International conference on machine learning.","author":"Zhang"}],"event":{"name":"2024 IEEE International Conference on Image Processing (ICIP)","location":"Abu Dhabi, United Arab Emirates","start":{"date-parts":[[2024,10,27]]},"end":{"date-parts":[[2024,10,30]]}},"container-title":["2024 IEEE International Conference on Image Processing (ICIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10647221\/10647122\/10647435.pdf?arnumber=10647435","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T05:52:29Z","timestamp":1727502749000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10647435\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icip51287.2024.10647435","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]}}}