{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T04:03:46Z","timestamp":1727582626243},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1109\/icip51287.2024.10648147","type":"proceedings-article","created":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T18:34:45Z","timestamp":1727462085000},"page":"794-800","source":"Crossref","is-referenced-by-count":0,"title":["SegGuard: Defending Scene Segmentation Against Adversarial Patch Attack"],"prefix":"10.1109","author":[{"given":"Thomas","family":"Gittings","sequence":"first","affiliation":[{"name":"University of Surrey,Centre for Vision Speech and Signal Processing (CVSSP),UK"}]},{"given":"Steve","family":"Schneider","sequence":"additional","affiliation":[{"name":"University of Surrey,Centre for Vision Speech and Signal Processing (CVSSP),UK"}]},{"given":"John","family":"Collomosse","sequence":"additional","affiliation":[{"name":"University of Surrey,Centre for Vision Speech and Signal Processing (CVSSP),UK"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv preprint arXiv:1312.6199"},{"key":"ref2","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv preprint arXiv:1412.6572"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref4","article-title":"Adversarial patch","author":"Brown","year":"2017","journal-title":"arXiv preprint arXiv:1712.09665"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"article-title":"Robust synthesis of adversarial visual examples using a deep image prior","volume-title":"Proc. BMVC","author":"Gittings","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00288"},{"key":"ref8","article-title":"Deep dual-resolution networks for real-time and accurate semantic segmentation of road scenes","author":"Hong","year":"2021","journal-title":"arXiv preprint arXiv:2101.06085"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_20"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01219-9_25"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref12","article-title":"Dpatch: An adversarial patch attack on object detectors","author":"Liu","year":"2018","journal-title":"arXiv preprint arXiv:1806.02299"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-10925-7_4","article-title":"Shapeshifter: Robust physical adversarial attack on faster r-cnn object detector","volume-title":"Proc. Joint European Conference on Machine Learning and Knowledge Discovery in Databases","author":"Chen"},{"article-title":"Physical adversarial examples for object detectors","volume-title":"Proc. USENIX Workshop on Offensive Technologies","author":"Song","key":"ref14"},{"article-title":"Adversarial machine learning at scale","volume-title":"Proc. ICLR","author":"Kurakin","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"article-title":"Defense-GAN: Protecting classifiers against adversarial attacks using generative models","volume-title":"Proc. ICLR","author":"Samangouei","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00210"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2019.00143"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0213-4"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-69538-5_15","article-title":"Vax-a-net: Training-time defence against adversarial patch attacks","volume-title":"Proceedings of the Asian Conference on Computer Vision","author":"Gittings"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.350"},{"key":"ref24","first-page":"274","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","volume-title":"International conference on machine learning","author":"Athalye"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-023-00145-0"}],"event":{"name":"2024 IEEE International Conference on Image Processing (ICIP)","start":{"date-parts":[[2024,10,27]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2024,10,30]]}},"container-title":["2024 IEEE International Conference on Image Processing (ICIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10647221\/10647122\/10648147.pdf?arnumber=10648147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T05:26:00Z","timestamp":1727501160000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10648147\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icip51287.2024.10648147","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]}}}