{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:10:37Z","timestamp":1740100237959,"version":"3.37.3"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100010418","name":"IITP(Institute for Information & communications Technology Planning & Evaluation)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,18]]},"DOI":"10.1109\/ijcnn52387.2021.9533322","type":"proceedings-article","created":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T21:27:41Z","timestamp":1632173261000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["CAP-GAN: Towards Adversarial Robustness with Cycle-consistent Attentional Purification"],"prefix":"10.1109","author":[{"given":"Mingu","family":"Kang","sequence":"first","affiliation":[]},{"given":"Trung Quang","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Seungju","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Daeyoung","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140449"},{"key":"ref10","article-title":"Defense-gan: Protecting classifiers against adversarial attacks using generative models","author":"samangouei","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00049"},{"key":"ref12","first-page":"1989","article-title":"Cycada: Cycle-consistent adversarial domain adaptation","author":"hoffman","year":"0","journal-title":"Int Conference on Machine Learning"},{"key":"ref13","article-title":"Ape-gan: Adversarial perturbation elimination with gan","author":"shen","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref14","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref16","article-title":"U-gat-it: unsupervised generative attentional networks with adaptive layer-instance normalization for image-to-image translation","author":"kim","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.319"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref19","article-title":"Adversarial risk and the dangers of evaluating against weak attacks","author":"uesato","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref28","article-title":"Thermometer encoding: One hot way to resist adversarial examples","author":"buckman","year":"0","journal-title":"International Conference on Learning Representations"},{"key":"ref4","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"ArXiv Preprint"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref3","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"ArXiv Preprint"},{"key":"ref6","article-title":"Pixelde-fend: Leveraging generative models to understand and defend against adversarial examples","author":"song","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref29","article-title":"A study of the effect of jpg compression on adversarial images","author":"dziugaite","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref5","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00059"},{"key":"ref7","first-page":"1778","article-title":"Defense against adversarial attacks using high-level representation guided de-noiser","author":"liao","year":"0","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref2","article-title":"Inception-v4, inception-resnet and the impact of residual connections on learning","author":"szegedy","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref9","article-title":"Countering adversarial images using input transformations","author":"guo","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"ref22","article-title":"Theoretically principled trade-off between robustness and accuracy","author":"zhang","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref21","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","author":"athalye","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.304"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref26","article-title":"Delving into transferable adversarial examples and black-box attacks","author":"liu","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref25","article-title":"Distilling the knowledge in a neural network","author":"hinton","year":"2015","journal-title":"ArXiv Preprint"}],"event":{"name":"2021 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2021,7,18]]},"location":"Shenzhen, China","end":{"date-parts":[[2021,7,22]]}},"container-title":["2021 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9533266\/9533267\/09533322.pdf?arnumber=9533322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:45:58Z","timestamp":1652197558000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9533322\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,18]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/ijcnn52387.2021.9533322","relation":{},"subject":[],"published":{"date-parts":[[2021,7,18]]}}}