{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:45:17Z","timestamp":1762508717330,"version":"3.37.3"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFA0908700"],"award-info":[{"award-number":["2020YFA0908700"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62073225","61806130","61972263","62072315","62002239"],"award-info":[{"award-number":["62073225","61806130","61972263","62072315","62002239"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province-Outstanding Youth Program","doi-asserted-by":"publisher","award":["2019B151502018"],"award-info":[{"award-number":["2019B151502018"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2021A1515011153"],"award-info":[{"award-number":["2021A1515011153"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Pearl River Talent Recruitment Program","award":["2019ZT08X603"],"award-info":[{"award-number":["2019ZT08X603"]}]},{"DOI":"10.13039\/501100010877","name":"Shenzhen Science and Technology Innovation Commission","doi-asserted-by":"publisher","award":["20200805142159001","R2020A045"],"award-info":[{"award-number":["20200805142159001","R2020A045"]}],"id":[{"id":"10.13039\/501100010877","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Joint Funds of the National Natural Science Foundation of China under Key Program","doi-asserted-by":"publisher","award":["U2013201"],"award-info":[{"award-number":["U2013201"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1109\/tits.2022.3146038","type":"journal-article","created":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T01:01:25Z","timestamp":1644886885000},"page":"9543-9553","source":"Crossref","is-referenced-by-count":14,"title":["CSG: Classifier-Aware Defense Strategy Based on Compressive Sensing and Generative Networks for Visual Recognition in Autonomous Vehicle Systems"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2308-2259","authenticated-orcid":false,"given":"Jia","family":"Wang","sequence":"first","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3750-458X","authenticated-orcid":false,"given":"Wuqiang","family":"Su","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0293-0781","authenticated-orcid":false,"given":"Chengwen","family":"Luo","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9811-1694","authenticated-orcid":false,"given":"Jie","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2631-9223","authenticated-orcid":false,"given":"Houbing","family":"Song","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Security and Optimization for Networked Globe Laboratory (SONG Lab), Embry-Riddle Aeronautical University, Daytona Beach, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2208-962X","authenticated-orcid":false,"given":"Jianqiang","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2962338"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3430505"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108146"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3025687"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref6","first-page":"1","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. 3rd Int. Conf. Learn. Represent.","author":"Goodfellow"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref8","first-page":"1","article-title":"Adversarial patch","volume":"abs\/1712.09665","author":"Brown","year":"2017","journal-title":"CoRR"},{"key":"ref9","first-page":"1","article-title":"Adversarial examples in the physical world","volume-title":"Proc. ICLR","author":"Kurakin"},{"key":"ref10","article-title":"NO need to worry about adversarial examples in object detection in autonomous vehicles","volume-title":"arXiv:1707.03501","author":"Lu","year":"2017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref12","first-page":"1","article-title":"Countering adversarial images using input transformations","volume-title":"Proc. 6th Int. Conf. Learn. Represent.","author":"Guo"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23198"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2019.00143"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66415-2_13"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2019.12.012"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219910"},{"key":"ref18","first-page":"284","article-title":"Synthesizing robust adversarial examples","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Athalye"},{"key":"ref19","first-page":"1","article-title":"Intriguing properties of neural networks","volume-title":"Proc. 2nd Int. Conf. Learn. Represent. (ICLR)","author":"Szegedy"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33012253"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"ref24","article-title":"Towards deep learning models resistant to adversarial attacks","volume-title":"arXiv:1706.06083","author":"Madry","year":"2017"},{"key":"ref25","article-title":"Ensemble adversarial training: Attacks and defenses","volume-title":"arXiv:1705.07204","author":"Tram\u00e8r","year":"2017"},{"key":"ref26","article-title":"Mitigating adversarial effects through randomization","volume-title":"arXiv:1711.01991","author":"Xie","year":"2017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_23"},{"key":"ref28","article-title":"Stochastic activation pruning for robust adversarial defense","volume-title":"arXiv:1803.01442","author":"Dhillon","year":"2018"},{"key":"ref29","first-page":"10096","article-title":"Thwarting adversarial examples: An L\u2080-robust sparse Fourier transform","volume-title":"Proc. 32nd Int. Conf. Neural Inf. Process. Syst.","author":"Bafna"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207670"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952561"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2012.2209421"},{"key":"ref33","first-page":"1","article-title":"Cleverhans v0.1: An adversarial machine learning library","volume":"abs\/1610.00768","author":"Goodfellow","year":"2016","journal-title":"CoRR"},{"volume-title":"TensorFlow-Slim Image Classification Model Library","year":"2016","author":"Silberman","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11883"},{"key":"ref36","first-page":"1","article-title":"Adam: A method for stochastic optimization","volume-title":"Proc. 3rd Int. Conf. Learn. Represent.","author":"Kingma"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6979\/9826234\/09713747.pdf?arnumber=9713747","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T23:46:31Z","timestamp":1705535191000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9713747\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":36,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tits.2022.3146038","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"type":"print","value":"1524-9050"},{"type":"electronic","value":"1558-0016"}],"subject":[],"published":{"date-parts":[[2022,7]]}}}