{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T19:00:49Z","timestamp":1769022049259,"version":"3.49.0"},"reference-count":81,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62236001"],"award-info":[{"award-number":["62236001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62176212"],"award-info":[{"award-number":["62176212"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62276212"],"award-info":[{"award-number":["62276212"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61871470"],"award-info":[{"award-number":["61871470"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Basic Research Strengthening Program of China","award":["2020-JCJQ-ZD-015-00-02"],"award-info":[{"award-number":["2020-JCJQ-ZD-015-00-02"]}]},{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["2023-JC-QN-0702"],"award-info":[{"award-number":["2023-JC-QN-0702"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Neural Netw. Learning Syst."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tnnls.2023.3321606","type":"journal-article","created":{"date-parts":[[2023,10,17]],"date-time":"2023-10-17T18:00:58Z","timestamp":1697565658000},"page":"18784-18798","source":"Crossref","is-referenced-by-count":8,"title":["Toward Robust Discriminative Projections Learning Against Adversarial Patch Attacks"],"prefix":"10.1109","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4814-1115","authenticated-orcid":false,"given":"Zheng","family":"Wang","sequence":"first","affiliation":[{"name":"School of Artificial Intelligence, Optics and Electronics (iOPEN), Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0871-6519","authenticated-orcid":false,"given":"Feiping","family":"Nie","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Optics and Electronics (iOPEN), Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5986-7413","authenticated-orcid":false,"given":"Hua","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Colorado School of Mines, Golden, CO, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3483-8333","authenticated-orcid":false,"given":"Heng","family":"Huang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Pittsburgh, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3462-8472","authenticated-orcid":false,"given":"Fei","family":"Wang","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Visual Information Processing and Applications and the Institute of Artificial Intelligence and Robotics, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2022.3224577"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-1809.1936.tb02137.x"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.10.004"},{"key":"ref4","first-page":"483","article-title":"Characterization of a family of algorithms for generalized discriminant analysis on undersampled problems","volume":"6","author":"Ye","year":"2005","journal-title":"Mach. Learn. Res."},{"key":"ref5","first-page":"719","article-title":"Multi-class discriminant kernel learning via convex programming","volume":"9","author":"Ye","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref6","first-page":"581","article-title":"Computational and theoretical analysis of null space and orthogonal linear discriminant analysis","volume":"7","author":"Ye","year":"2006","journal-title":"J. Mach. Learn. Res."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273633"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972795.77"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2018.2838045"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2904952"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.07.022"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2910751"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.382983"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2009.2015760"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107673"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3369870"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/306"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-009-5125-7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2011.2178037"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3049371"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04898-2_594"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2003.10089"},{"key":"ref23","first-page":"97","article-title":"Robust Fisher discriminant analysis","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Kim"},{"key":"ref24","first-page":"581","article-title":"Classification efficiencies for robust linear discriminant analysis","volume":"18","author":"Croux","year":"2008","journal-title":"Statistica Sinica"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-61159-9_32"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2007.11-06-397"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2005.309"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143880"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.114"},{"key":"ref30","first-page":"116","article-title":"Robust principal component analysis: Exact recovery of corrupted","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Wright"},{"key":"ref31","first-page":"1062","article-title":"Optimal mean robust principal component analysis","volume-title":"Proc. 31st Int. Conf. Mach. Learn. (ICML)","author":"Nie"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2015.01.003"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2621667"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2596158"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2253476"},{"key":"ref36","first-page":"1836","article-title":"Robust distance metric learning via simultaneous \u21131-norm minimization and maximization","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Wang"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2014.2314698"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/icpr.2014.281"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2018.05.020"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00211"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.330110077"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.153"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01249-6_14"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3092582"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2940533"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01167"},{"key":"ref48","article-title":"DPatch: An adversarial patch attack on object detectors","author":"Liu","year":"2018","journal-title":"arXiv:1806.02299"},{"key":"ref49","article-title":"Fooling detection alone is not enough: First adversarial attack against multiple object tracking","author":"Jia","year":"2019","journal-title":"arXiv:1905.11026"},{"key":"ref50","first-page":"199","article-title":"Efficient and robust feature selection via joint l2,1-norms minimization","volume-title":"Proc. NIPS","author":"Nie"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s40305-020-00295-9"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2910991"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2961877"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2799214"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3409478"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3442347"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.066"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2021.3075150"},{"key":"ref59","first-page":"4016","article-title":"Max-mahalanobis linear discriminant analysis networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Pang"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3106702"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108422"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.12.026"},{"key":"ref63","article-title":"Adversarial patch","author":"Brown","year":"2017","journal-title":"arXiv:1712.09665"},{"key":"ref64","article-title":"Defending against physically realizable attacks on image classification","author":"Wu","year":"2019","journal-title":"arXiv:1909.09552"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ACV.1994.341300"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/34.927464"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1251154"},{"key":"ref68","first-page":"153","article-title":"Locality preserving projections","volume-title":"Proc. NIPS","author":"He"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/tnn.2005.860852"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v24i1.7662"},{"key":"ref71","first-page":"16821","article-title":"Ratio trace formulation of Wasserstein discriminant analysis","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Liu"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2010.2064176"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.03.013"},{"issue":"10","key":"ref74","first-page":"1319","article-title":"The IMM face database","volume":"22","author":"Nordstr\u00f8m","year":"2003","journal-title":"Environment"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.18772\/10539\/20690"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2006.12.022"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220016"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298832"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126281"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011139631724"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2842023"}],"container-title":["IEEE Transactions on Neural Networks and Learning Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962385\/10772360\/10286885.pdf?arnumber=10286885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T19:05:58Z","timestamp":1733252758000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10286885\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":81,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tnnls.2023.3321606","relation":{},"ISSN":["2162-237X","2162-2388"],"issn-type":[{"value":"2162-237X","type":"print"},{"value":"2162-2388","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}