{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:17Z","timestamp":1750221017169,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T00:00:00Z","timestamp":1563494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFB1002502"],"award-info":[{"award-number":["2017YFB1002502"]}]},{"name":"National Natural Science Foundation of China","award":["No. 61701089, No.61601518"],"award-info":[{"award-number":["No. 61701089, No.61601518"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,19]]},"DOI":"10.1145\/3351917.3351987","type":"proceedings-article","created":{"date-parts":[[2019,9,23]],"date-time":"2019-09-23T12:10:23Z","timestamp":1569240623000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Unsupervised Adversarial Perturbation Eliminating via Disentangled Representations"],"prefix":"10.1145","author":[{"given":"Lingyun","family":"Jiang","sequence":"first","affiliation":[{"name":"National Digital Switching System Engineering and Technological Research Center, Zhengzhou China"}]},{"given":"Kai","family":"Qiao","sequence":"additional","affiliation":[{"name":"National Digital Switching System Engineering and Technological Research Center, Zhengzhou China"}]},{"given":"Ruoxi","family":"Qin","sequence":"additional","affiliation":[{"name":"National Digital Switching System Engineering and Technological Research Center, Zhengzhou China"}]},{"given":"Jian","family":"Chen","sequence":"additional","affiliation":[{"name":"National Digital Switching System Engineering and Technological Research Center, Zhengzhou China"}]},{"given":"Haibing","family":"Bu","sequence":"additional","affiliation":[{"name":"National Digital Switching System Engineering and Technological Research Center, Zhengzhou China"}]},{"given":"Bin","family":"Yan","sequence":"additional","affiliation":[{"name":"National Digital Switching System Engineering and Technological Research Center, Zhengzhou China"}]}],"member":"320","published-online":{"date-parts":[[2019,7,19]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1097","volume-title":"ImageNet Classification with Deep Convolutional Neural Networks,\" in Advances in Neural Information Processing Systems 25","author":"Krizhevsky I.","year":"2012","unstructured":"A. Krizhevsky , I. Sutskever , and G. E. Hinton . ImageNet Classification with Deep Convolutional Neural Networks,\" in Advances in Neural Information Processing Systems 25 , F. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger, Eds. Curran Associates, Inc. , 2012 , pp. 1097 -- 1105 . A. Krizhevsky, I. Sutskever, and G. E. Hinton. ImageNet Classification with Deep Convolutional Neural Networks,\" in Advances in Neural Information Processing Systems 25, F. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger, Eds. Curran Associates, Inc., 2012, pp. 1097--1105."},{"key":"e_1_3_2_1_2_1","volume-title":"Neural machine translation by jointly learning to align and translate[J]. arXiv preprint arXiv: 1409.0473","author":"Bahdanau D","year":"2014","unstructured":"Bahdanau D , Cho K , Bengio Y. Neural machine translation by jointly learning to align and translate[J]. arXiv preprint arXiv: 1409.0473 , 2014 Bahdanau D, Cho K, Bengio Y. Neural machine translation by jointly learning to align and translate[J]. arXiv preprint arXiv: 1409.0473, 2014"},{"key":"e_1_3_2_1_3_1","volume-title":"Deep neural networks for acoustic modeling in speech recognition[J]","author":"Hinton G","year":"2012","unstructured":"Hinton G , Deng L , Yu D , Deep neural networks for acoustic modeling in speech recognition[J] . IEEE Signal processing magazine, 2012 , 29. Hinton G, Deng L, Yu D, et al. Deep neural networks for acoustic modeling in speech recognition[J]. IEEE Signal processing magazine, 2012, 29."},{"key":"e_1_3_2_1_4_1","volume-title":"Intriguing properties of adversarial examples[J]. arXiv preprint arXiv:1711.02846","author":"Cubuk E D","year":"2017","unstructured":"Cubuk E D , Zoph B , Schoenholz S S , Intriguing properties of adversarial examples[J]. arXiv preprint arXiv:1711.02846 , 2017 . Cubuk E D, Zoph B, Schoenholz S S, et al. Intriguing properties of adversarial examples[J]. arXiv preprint arXiv:1711.02846, 2017."},{"key":"e_1_3_2_1_5_1","volume-title":"Ape-gan: Adversarial perturbation elimination with gan[J]. arXiv preprint arXiv:1707.05474","author":"Shen S","year":"2017","unstructured":"Shen S , Jin G , Gao K , Ape-gan: Adversarial perturbation elimination with gan[J]. arXiv preprint arXiv:1707.05474 , 2017 . Shen S, Jin G, Gao K, et al. Ape-gan: Adversarial perturbation elimination with gan[J]. arXiv preprint arXiv:1707.05474, 2017."},{"doi-asserted-by":"crossref","unstructured":"Zhu J Y Park T Isola P etal Unpaired image-to-image translation using cycle-consistent adversarial networks[C]\/\/Proceedings of the IEEE international conference on computer vision. 2017: 2223--2232.  Zhu J Y Park T Isola P et al. Unpaired image-to-image translation using cycle-consistent adversarial networks[C]\/\/Proceedings of the IEEE international conference on computer vision. 2017: 2223--2232.","key":"e_1_3_2_1_6_1","DOI":"10.1109\/ICCV.2017.244"},{"key":"e_1_3_2_1_7_1","volume-title":"Unsupervised Domain-Specific Deblurring via Disentangled Representations[J]. arXiv preprint arXiv:1903.01594","author":"Lu B","year":"2019","unstructured":"Lu B , Chen J C , Chellappa R. Unsupervised Domain-Specific Deblurring via Disentangled Representations[J]. arXiv preprint arXiv:1903.01594 , 2019 . Lu B, Chen J C, Chellappa R. Unsupervised Domain-Specific Deblurring via Disentangled Representations[J]. arXiv preprint arXiv:1903.01594, 2019."},{"key":"e_1_3_2_1_8_1","volume-title":"Explaining and harnessing adversarial examples[J]. arXiv preprint arXiv:1412.6572","author":"Goodfellow I J","year":"2014","unstructured":"Goodfellow I J , Shlens J , Szegedy C. Explaining and harnessing adversarial examples[J]. arXiv preprint arXiv:1412.6572 , 2014 . Kurakin A, Goodfellow I, Bengio S. Adversarial examples in the physical world[J]. arXiv preprint arXiv:1607.02533, 2016. Goodfellow I J, Shlens J, Szegedy C. Explaining and harnessing adversarial examples[J]. arXiv preprint arXiv:1412.6572, 2014. Kurakin A, Goodfellow I, Bengio S. Adversarial examples in the physical world[J]. arXiv preprint arXiv:1607.02533, 2016."},{"key":"e_1_3_2_1_9_1","volume-title":"Adversarial examples in the physical world[J]. arXiv preprint arXiv:1607.02533","author":"Kurakin A","year":"2016","unstructured":"Kurakin A , Goodfellow I , Bengio S. Adversarial examples in the physical world[J]. arXiv preprint arXiv:1607.02533 , 2016 . Kurakin A, Goodfellow I, Bengio S. Adversarial examples in the physical world[J]. arXiv preprint arXiv:1607.02533, 2016."},{"key":"e_1_3_2_1_10_1","volume-title":"From adversarial training to generative adversarial networks[J]. arXiv preprint arXiv","author":"Liu X","year":"1807","unstructured":"Liu X , Hsieh C J . From adversarial training to generative adversarial networks[J]. arXiv preprint arXiv : 1807 .10454, 2018. Liu X, Hsieh C J. From adversarial training to generative adversarial networks[J]. arXiv preprint arXiv: 1807.10454, 2018."},{"key":"e_1_3_2_1_11_1","first-page":"582","article-title":"Distillation as a defense to adversarial perturbations against deep neural networks[C]\/\/2016 IEEE Symposium on Security and Privacy (SP)","volume":"2016","author":"Papernot N","unstructured":"Papernot N , McDaniel P , Wu X , Distillation as a defense to adversarial perturbations against deep neural networks[C]\/\/2016 IEEE Symposium on Security and Privacy (SP) . IEEE , 2016 : 582 -- 597 . Papernot N, McDaniel P, Wu X, et al. Distillation as a defense to adversarial perturbations against deep neural networks[C]\/\/2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016: 582--597.","journal-title":"IEEE"},{"key":"e_1_3_2_1_12_1","volume-title":"Generative adversarial trainer: Defense to adversarial perturbations with gan[J]. arXiv preprint arXiv:1705.03387","author":"Lee H","year":"2017","unstructured":"Lee H , Han S , Lee J. Generative adversarial trainer: Defense to adversarial perturbations with gan[J]. arXiv preprint arXiv:1705.03387 , 2017 . Lee H, Han S, Lee J. Generative adversarial trainer: Defense to adversarial perturbations with gan[J]. arXiv preprint arXiv:1705.03387, 2017."},{"doi-asserted-by":"crossref","unstructured":"Lee H Y Tseng H Y Huang J B etal Diverse image-to-image translation via disentangled representations[C]\/\/Proceedings of the European Conference on Computer Vision (ECCV). 2018: 35--51.  Lee H Y Tseng H Y Huang J B et al. Diverse image-to-image translation via disentangled representations[C]\/\/Proceedings of the European Conference on Computer Vision (ECCV). 2018: 35--51.","key":"e_1_3_2_1_13_1","DOI":"10.1007\/978-3-030-01246-5_3"},{"key":"e_1_3_2_1_14_1","volume-title":"Automatic differentiation in pytorch[J]","author":"Paszke A","year":"2017","unstructured":"Paszke A , Gross S , Chintala S , Automatic differentiation in pytorch[J] . 2017 . Paszke A, Gross S, Chintala S, et al. Automatic differentiation in pytorch[J]. 2017."},{"key":"e_1_3_2_1_15_1","volume-title":"Ba J. Adam: A method for stochastic optimization[J]. arXiv preprint arXiv:1412.6980","author":"Kingma D P","year":"2014","unstructured":"Kingma D P , Ba J. Adam: A method for stochastic optimization[J]. arXiv preprint arXiv:1412.6980 , 2014 . Kingma D P, Ba J. Adam: A method for stochastic optimization[J]. arXiv preprint arXiv:1412.6980, 2014."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_17_1","volume-title":"Learning multiple layers of features from tiny images[R]. Technical report","author":"Krizhevsky A","year":"2009","unstructured":"Krizhevsky A , Hinton G. Learning multiple layers of features from tiny images[R]. Technical report , University of Toronto , 2009 . Krizhevsky A, Hinton G. Learning multiple layers of features from tiny images[R]. Technical report, University of Toronto, 2009."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.5555\/2627435.2670313"},{"doi-asserted-by":"crossref","unstructured":"He K Zhang X Ren S etal Deep residual learning for image recognition[C]\/\/Proceedings of the IEEE conference on computer vision and pattern recognition. 2016: 770--778.  He K Zhang X Ren S et al. Deep residual learning for image recognition[C]\/\/Proceedings of the IEEE conference on computer vision and pattern recognition. 2016: 770--778.","key":"e_1_3_2_1_19_1","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_20_1","volume-title":"Very deep convolutional networks for large-scale image recognition[J]. arXiv preprint arXiv: 1409.1556","author":"Simonyan K","year":"2014","unstructured":"Simonyan K , Zisserman A. Very deep convolutional networks for large-scale image recognition[J]. arXiv preprint arXiv: 1409.1556 , 2014 . Simonyan K, Zisserman A. Very deep convolutional networks for large-scale image recognition[J]. arXiv preprint arXiv: 1409.1556, 2014."}],"event":{"sponsor":["Sichuan University"],"acronym":"CACRE2019","name":"CACRE2019: 2019 4th International Conference on Automation, Control and Robotics Engineering","location":"Shenzhen China"},"container-title":["Proceedings of the 2019 4th International Conference on Automation, Control and Robotics Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351917.3351987","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3351917.3351987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:14Z","timestamp":1750206374000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351917.3351987"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,19]]},"references-count":20,"alternative-id":["10.1145\/3351917.3351987","10.1145\/3351917"],"URL":"https:\/\/doi.org\/10.1145\/3351917.3351987","relation":{},"subject":[],"published":{"date-parts":[[2019,7,19]]},"assertion":[{"value":"2019-07-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}