{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:58:40Z","timestamp":1730249920446,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/icmew46912.2020.9105983","type":"proceedings-article","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T21:39:52Z","timestamp":1591738792000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Information Distribution Based Defense Against Physical Attacks on Object Detection"],"prefix":"10.1109","author":[{"given":"Guangzhi","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Hongchao","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jiao","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Jizhong","family":"Han","sequence":"additional","affiliation":[]},{"given":"Ruixuan","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref11","article-title":"Local gradients smoothing: Defense against localized adversarial attacks","author":"muzammal","year":"2019","journal-title":"2019 IEEE Winter Conference on Applications of Computer Vision (WACV)"},{"article-title":"Sentinet: Detecting physical attacks against deep learning systems","year":"2018","author":"chou","key":"ref12"},{"key":"ref13","article-title":"On visible adversarial perturbations & digital watermarking","author":"jamie","year":"2018","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops"},{"article-title":"Deep inside convolutional networks: Visualising image classification models and saliency maps","year":"2013","author":"simonyan","key":"ref14"},{"key":"ref15","first-page":"818","article-title":"Visualizing and understanding convolutional networks","author":"zeiler","year":"2014","journal-title":"European Conference on Computer Vision"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7970-4"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14257\/ijseia.2013.7.5.11"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-009-0275-4"},{"key":"ref4","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"Computer Science"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref6","article-title":"Deepfool: a simple and accurate method to fool deep neural networks","author":"seyed-mohsen","year":"2016","journal-title":"In Proceedings of 2016 IEEE Conference on Computer Vision and Pattern Recognition"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"goodfellow ian","key":"ref5"},{"article-title":"Adversarial patch","year":"2017","author":"brown","key":"ref8"},{"key":"ref7","first-page":"4","article-title":"Shapeshifter: Robust physical adversarial attack on faster r-cnn object detector","volume":"2","author":"chen","year":"2018"},{"key":"ref2","article-title":"Fooling automated surveillance cameras: adversarial patches to attack person detection","author":"thys","year":"2019","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops"},{"article-title":"Advhat:real-world adversarial attack on arcface face id system","year":"2019","author":"stepan","key":"ref1"},{"article-title":"Lavan: Localized and visible adversarial noise","year":"2018","author":"danny","key":"ref9"}],"event":{"name":"2020 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)","start":{"date-parts":[[2020,7,6]]},"location":"London, UK","end":{"date-parts":[[2020,7,10]]}},"container-title":["2020 IEEE International Conference on Multimedia &amp; Expo Workshops (ICMEW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9099356\/9105943\/09105983.pdf?arnumber=9105983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:08:02Z","timestamp":1656374882000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9105983\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icmew46912.2020.9105983","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}