{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T05:29:01Z","timestamp":1734586141665,"version":"3.30.2"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:00:00Z","timestamp":1726358400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:00:00Z","timestamp":1726358400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,15]]},"DOI":"10.1109\/ijcb62174.2024.10744526","type":"proceedings-article","created":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T18:38:05Z","timestamp":1731350285000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Discerning the Chaos: Detecting Adversarial Perturbations while Disentangling Intentional from Unintentional Noises"],"prefix":"10.1109","author":[{"given":"Anubhooti","family":"Jain","sequence":"first","affiliation":[{"name":"IIT Jodhpur"}]},{"given":"Susim","family":"Roy","sequence":"additional","affiliation":[{"name":"IIT Jodhpur"}]},{"given":"Kwanit","family":"Gupta","sequence":"additional","affiliation":[{"name":"IIT Jodhpur"}]},{"given":"Mayank","family":"Vatsa","sequence":"additional","affiliation":[{"name":"IIT Jodhpur"}]},{"given":"Richa","family":"Singh","sequence":"additional","affiliation":[{"name":"IIT Jodhpur"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00759"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2019.05.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00395"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12028"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01446"},{"key":"ref7","first-page":"2206","article-title":"Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks","author":"Croce","year":"2020","journal-title":"ICML"},{"key":"ref8","article-title":"Quality resilient deep neural networks","author":"Dodge","year":"2017","journal-title":"CoRR"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3636460"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref11","article-title":"An image is worth 16x16 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2021","journal-title":"ICLR"},{"key":"ref12","first-page":"3564","article-title":"Maximum mean discrepancy test is aware of adversarial attacks","author":"Gao","year":"2021","journal-title":"ICML"},{"key":"ref13","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2015","journal-title":"ICLR"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-019-01160-w"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.12341"},{"key":"ref16","first-page":"723","article-title":"A kernel two-sample test","volume":"13","author":"Gretton","year":"2012","journal-title":"J. Mach. Learn. Res"},{"key":"ref17","article-title":"GRIT: general robust image task benchmark","author":"Gupta","year":"2022","journal-title":"CoRR"},{"key":"ref18","article-title":"Benchmarking neural network robustness to common corruptions and perturbations","author":"Hendrycks","year":"2019","journal-title":"ICLR"},{"key":"ref19","first-page":"1633","article-title":"A new defense against adversarial images: Turning a weakness into a strength","author":"Hu","year":"2019","journal-title":"NeurIPS"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4408858"},{"article-title":"Progressive growing of gans for improved quality, stability, and variation","volume-title":"6th International Conference on Learning Representations, ICLR","author":"Karras","key":"ref21"},{"key":"ref22","article-title":"Learning multiple layers of features from tiny images","volume-title":"Master\u2019s thesis","author":"Krizhevsky","year":"2009"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1201\/9781351251389-8","article-title":"Adversarial examples in the physical world","volume-title":"5th International Conference on Learning Representations, ICLR, Workshop Track Proceedings","author":"Kurakin"},{"key":"ref24","first-page":"7167","article-title":"A simple unified framework for detecting out-of-distribution samples and adversarial attacks","author":"Lee","year":"2018","journal-title":"NeurIPS"},{"article-title":"Enhancing the reliability of out-of-distribution image detection in neural networks","volume-title":"6th International Conference on Learning Representations, ICLR","author":"Liang","key":"ref25"},{"key":"ref26","article-title":"Nesterov accelerated gradient and scale invariance for adversarial attacks","author":"Lin","year":"2020","journal-title":"ICLR"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.5220\/0011586500003417"},{"key":"ref29","article-title":"Characterizing adversarial subspaces using local intrinsic dimensionality","author":"Ma","year":"2018","journal-title":"ICLR"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3138338"},{"key":"ref32","article-title":"On detecting adversarial perturbations","author":"Metzen","year":"2017","journal-title":"ICLR"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00930"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19806-9_36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.250"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892966"},{"key":"ref38","article-title":"Adversarial patch attacks and defences in vision-based tasks: A survey","author":"Sharma","year":"2022","journal-title":"CoRR"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.241"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref41","first-page":"144","article-title":"React: Out-of-distribution detection with rectified activations. In M. Ranzato, A. Beygelzimer, Y. N. Dauphin, P. Liang, and J. W. Vaughan, editors","author":"Sun","year":"2021","journal-title":"NeurIPS"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i11.17187"},{"key":"ref43","article-title":"Ensemble adversarial training: Attacks and defenses","author":"Tram\u00e8r","year":"2018","journal-title":"ICLR"},{"key":"ref44","article-title":"Examining the impact of blur on recognition by convolutional networks","author":"Vasiljevic","year":"2016","journal-title":"CoRR"},{"key":"ref45","article-title":"Continual adversarial defense","author":"Wang","year":"2023","journal-title":"CoRR"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2023\/165"},{"key":"ref47","article-title":"Fast is better than free: Revisiting adversarial training","author":"Wong","year":"2020","journal-title":"ICLR"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23198"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/635"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00713"}],"event":{"name":"2024 IEEE International Joint Conference on Biometrics (IJCB)","start":{"date-parts":[[2024,9,15]]},"location":"Buffalo, NY, USA","end":{"date-parts":[[2024,9,18]]}},"container-title":["2024 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10744408\/10744424\/10744526.pdf?arnumber=10744526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T19:22:30Z","timestamp":1734549750000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10744526\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,15]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/ijcb62174.2024.10744526","relation":{},"subject":[],"published":{"date-parts":[[2024,9,15]]}}}