{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T14:45:04Z","timestamp":1751035504142,"version":"3.37.3"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Shandong Provincial Taishan Scholar Program, China","award":["tsqn202312133"],"award-info":[{"award-number":["tsqn202312133"]}]},{"name":"Shandong Provincial Natural Science Foundation, China","award":["ZR2022YQ61","ZR2023ZD32"],"award-info":[{"award-number":["ZR2022YQ61","ZR2023ZD32"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772551","62111530052"],"award-info":[{"award-number":["61772551","62111530052"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Qilu University of Technology","award":["2023ZD017"],"award-info":[{"award-number":["2023ZD017"]}]},{"DOI":"10.13039\/501100001809","name":"Graduate Innovation Projects of China University of Petroleum","doi-asserted-by":"publisher","award":["YCX2021119"],"award-info":[{"award-number":["YCX2021119"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tce.2024.3413720","type":"journal-article","created":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T17:48:26Z","timestamp":1718300906000},"page":"7044-7055","source":"Crossref","is-referenced-by-count":1,"title":["Image-Scaling Attack on Image Signal Processing Pipelines in Deep Neural Networks-Based Outdoor Vision Applications"],"prefix":"10.1109","volume":"70","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5319-517X","authenticated-orcid":false,"given":"Junjian","family":"Li","sequence":"first","affiliation":[{"name":"College of Control Science and Engineering, China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0739-6338","authenticated-orcid":false,"given":"Honglong","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Control Science and Engineering, China University of Petroleum (East China), Qingdao, China"}]},{"given":"Zhichen","family":"Ni","sequence":"additional","affiliation":[{"name":"College of Control Science and Engineering, China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0264-6545","authenticated-orcid":false,"given":"Yudong","family":"Gao","sequence":"additional","affiliation":[{"name":"College of Control Science and Engineering, China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5388-9080","authenticated-orcid":false,"given":"Weifeng","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Control Science and Engineering, China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1712-1872","authenticated-orcid":false,"given":"Nan","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Information Engineering, East China Jiaotong University, Nanchang, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2017.014971"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2021.3127494"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3266506"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3247901"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2023.3309852"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01400"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3295411"},{"key":"ref9","article-title":"End to end learning for self-driving cars","author":"Bojarski","year":"2016","journal-title":"arXiv:1604.07316"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2019.2959593"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2022.3190069"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2022.3228679"},{"key":"ref13","first-page":"1","article-title":"Intriguing properties of neural networks","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Szegedy"},{"key":"ref14","first-page":"1","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Goodfellow"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423362"},{"key":"ref17","first-page":"443","article-title":"Seeing is not believing: Camouflage attacks on image scaling algorithms","volume-title":"Proc. USENIX Secur. Symp.","author":"Xiao"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01579"},{"key":"ref19","first-page":"1","article-title":"Countering adversarial images using input transformations","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Guo"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2020.2994010"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2017.015096"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2023.3342035"},{"key":"ref23","first-page":"1505","article-title":"Blind backdoors in deep learning models","volume-title":"Proc. USENIX Secur. Symp.","author":"Bagdasaryan"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/int.22720"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.07.157"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3139902"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2021.3079723"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109037"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2018.8451818"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00182"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00347"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2872858"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00180"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3051486"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-67070-2_11"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00276"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1603.08155"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025068"},{"volume-title":"Fire-smoke-dataset","year":"2019","author":"Dou","key":"ref42"},{"volume-title":"CameraISP","year":"2017","key":"ref43"},{"volume-title":"OpenISP","year":"2019","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00357"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3092582"},{"key":"ref47","first-page":"1","article-title":"Diffusion models for adversarial purification","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Nie"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/30\/10820880\/10556697.pdf?arnumber=10556697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T19:30:26Z","timestamp":1736191826000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10556697\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":47,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tce.2024.3413720","relation":{},"ISSN":["0098-3063","1558-4127"],"issn-type":[{"type":"print","value":"0098-3063"},{"type":"electronic","value":"1558-4127"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}