{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T14:08:09Z","timestamp":1764079689047,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,14]],"date-time":"2021-08-14T00:00:00Z","timestamp":1628899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2038029,2026945,1564097"],"award-info":[{"award-number":["2038029,2026945,1564097"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,14]]},"DOI":"10.1145\/3447548.3467121","type":"proceedings-article","created":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T06:12:08Z","timestamp":1628748728000},"page":"2703-2713","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Robust Object Detection Fusion Against Deception"],"prefix":"10.1145","author":[{"given":"Ka-Ho","family":"Chow","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Ling","family":"Liu","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,8,14]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Navaneeth Bodla Bharat Singh Rama Chellappa and Larry S Davis. 2017. Soft-NMS--improving object detection with one line of code. In ICCV.  Navaneeth Bodla Bharat Singh Rama Chellappa and Larry S Davis. 2017. Soft-NMS--improving object detection with one line of code. In ICCV.","DOI":"10.1109\/ICCV.2017.593"},{"key":"e_1_3_2_2_3_1","unstructured":"Daniel Cer Yinfei Yang Sheng-yi Kong Nan Hua Nicole Limtiaco Rhomni St. John Noah Constant Mario Guajardo-Cespedes Steve Yuan Chris Tar Brian Strope and Ray Kurzweil. 2018. Universal Sentence Encoder. In EMNLP.  Daniel Cer Yinfei Yang Sheng-yi Kong Nan Hua Nicole Limtiaco Rhomni St. John Noah Constant Mario Guajardo-Cespedes Steve Yuan Chris Tar Brian Strope and Ray Kurzweil. 2018. Universal Sentence Encoder. In EMNLP."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Ka-Ho Chow Ling Liu Mehmet Emre Gursoy Stacey Truex Wenqi Wei and Yanzhao Wu. 2020 a. Understanding Object Detection Through an Adversarial Lens. In ESORICS.  Ka-Ho Chow Ling Liu Mehmet Emre Gursoy Stacey Truex Wenqi Wei and Yanzhao Wu. 2020 a. Understanding Object Detection Through an Adversarial Lens. In ESORICS.","DOI":"10.1007\/978-3-030-59013-0_23"},{"volume-title":"Stacey Truex, Wenqi Wei, and Yanzhao Wu. 2020 b. Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems","author":"Chow Ka-Ho","key":"e_1_3_2_2_5_1","unstructured":"Ka-Ho Chow , Ling Liu , Margaret Loper , Juhyun Bae , Mehmet Emre Gursoy , Stacey Truex, Wenqi Wei, and Yanzhao Wu. 2020 b. Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems . In TPS. IEEE. Ka-Ho Chow, Ling Liu, Margaret Loper, Juhyun Bae, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, and Yanzhao Wu. 2020 b. Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems. In TPS. IEEE."},{"key":"e_1_3_2_2_6_1","unstructured":"Navneet Dalal and Bill Triggs. 2005. Histograms of oriented gradients for human detection. In CVPR.  Navneet Dalal and Bill Triggs. 2005. Histograms of oriented gradients for human detection. In CVPR."},{"key":"e_1_3_2_2_7_1","volume-title":"Luc Van Gool, Christopher KI Williams, John Winn, and Andrew Zisserman.","author":"Everingham Mark","year":"2015","unstructured":"Mark Everingham , SM Ali Eslami , Luc Van Gool, Christopher KI Williams, John Winn, and Andrew Zisserman. 2015 . The pascal visual object classes challenge: A retrospective. IJCV ( 2015). Mark Everingham, SM Ali Eslami, Luc Van Gool, Christopher KI Williams, John Winn, and Andrew Zisserman. 2015. The pascal visual object classes challenge: A retrospective. IJCV (2015)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Vandit Gajjar Ayesha Gurnani and Yash Khandhediya. 2017. Human detection and tracking for video surveillance: A cognitive science approach. In ICCV.  Vandit Gajjar Ayesha Gurnani and Yash Khandhediya. 2017. Human detection and tracking for video surveillance: A cognitive science approach. In ICCV.","DOI":"10.1109\/ICCVW.2017.330"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Ross Girshick. 2015. Fast r-cnn. In CVPR.  Ross Girshick. 2015. Fast r-cnn. In CVPR.","DOI":"10.1109\/ICCV.2015.169"},{"key":"e_1_3_2_2_10_1","unstructured":"Ian J Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. In ICLR.  Ian J Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. In ICLR."},{"key":"e_1_3_2_2_11_1","unstructured":"Intel. 2019. Intel Neural Compute Stick 2. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/hardware\/neural-compute-stick.html  Intel. 2019. Intel Neural Compute Stick 2. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/hardware\/neural-compute-stick.html"},{"key":"e_1_3_2_2_12_1","unstructured":"Yanghao Li Yuntao Chen Naiyan Wang and Zhaoxiang Zhang. 2019. Scale-aware trident networks for object detection. In ICCV.  Yanghao Li Yuntao Chen Naiyan Wang and Zhaoxiang Zhang. 2019. Scale-aware trident networks for object detection. In ICCV."},{"key":"e_1_3_2_2_13_1","unstructured":"Yuezun Li Daniel Tian Xiao Bian Siwei Lyu etal 2018. Robust adversarial perturbation on deep proposal-based models. In BMVC.  Yuezun Li Daniel Tian Xiao Bian Siwei Lyu et al. 2018. Robust adversarial perturbation on deep proposal-based models. In BMVC."},{"key":"e_1_3_2_2_14_1","volume-title":"SSD: Single shot multibox detector. In ECCV.","author":"Liu Wei","year":"2016","unstructured":"Wei Liu , Dragomir Anguelov , Dumitru Erhan , Christian Szegedy , Scott Reed , Cheng-Yang Fu , and Alexander C Berg . 2016 . SSD: Single shot multibox detector. In ECCV. Wei Liu, Dragomir Anguelov, Dumitru Erhan, Christian Szegedy, Scott Reed, Cheng-Yang Fu, and Alexander C Berg. 2016. SSD: Single shot multibox detector. In ECCV."},{"key":"e_1_3_2_2_15_1","unstructured":"Xin Liu Huanrui Yang Ziwei Liu Linghao Song Hai Li and Yiran Chen. 2019. DPatch: An Adversarial Patch Attack on Object Detectors. In SafeAI.  Xin Liu Huanrui Yang Ziwei Liu Linghao Song Hai Li and Yiran Chen. 2019. DPatch: An Adversarial Patch Attack on Object Detectors. In SafeAI."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"F Ozge Unel Burak O Ozkalayci and Cevahir Cigla. 2019. The power of tiling for small object detection. In CVPRW.  F Ozge Unel Burak O Ozkalayci and Cevahir Cigla. 2019. The power of tiling for small object detection. In CVPRW.","DOI":"10.1109\/CVPRW.2019.00084"},{"key":"e_1_3_2_2_17_1","volume-title":"Distort-and-recover: Color enhancement using deep reinforcement learning. In CVPR.","author":"Park Jongchan","year":"2018","unstructured":"Jongchan Park , Joon-Young Lee , Donggeun Yoo , and In So Kweon . 2018 . Distort-and-recover: Color enhancement using deep reinforcement learning. In CVPR. Jongchan Park, Joon-Young Lee, Donggeun Yoo, and In So Kweon. 2018. Distort-and-recover: Color enhancement using deep reinforcement learning. In CVPR."},{"key":"e_1_3_2_2_18_1","volume-title":"Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767","author":"Redmon Joseph","year":"2018","unstructured":"Joseph Redmon and Ali Farhadi . 2018. Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767 ( 2018 ). Joseph Redmon and Ali Farhadi. 2018. Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767 (2018)."},{"key":"e_1_3_2_2_19_1","unstructured":"Shaoqing Ren Kaiming He Ross Girshick and Jian Sun. 2015. Faster r-cnn: Towards real-time object detection with region proposal networks. In NeurIPS.  Shaoqing Ren Kaiming He Ross Girshick and Jian Sun. 2015. Faster r-cnn: Towards real-time object detection with region proposal networks. In NeurIPS."},{"key":"e_1_3_2_2_20_1","unstructured":"Aman Sinha Hongseok Namkoong Riccardo Volpi and John Duchi. 2018. Certifying some distributional robustness with principled adversarial training. In ICLR.  Aman Sinha Hongseok Namkoong Riccardo Volpi and John Duchi. 2018. Certifying some distributional robustness with principled adversarial training. In ICLR."},{"key":"e_1_3_2_2_21_1","volume-title":"Wiebe Van Ranst, and Toon Goedem\u00e9","author":"Thys Simen","year":"2019","unstructured":"Simen Thys , Wiebe Van Ranst, and Toon Goedem\u00e9 . 2019 . Fooling automated surveillance cameras: adversarial patches to attack person detection. In CVPRW. Simen Thys, Wiebe Van Ranst, and Toon Goedem\u00e9. 2019. Fooling automated surveillance cameras: adversarial patches to attack person detection. In CVPRW."},{"key":"e_1_3_2_2_22_1","unstructured":"Paul Viola and Michael Jones. 2001. Rapid object detection using a boosted cascade of simple features. In CVPR.  Paul Viola and Michael Jones. 2001. Rapid object detection using a boosted cascade of simple features. In CVPR."},{"key":"e_1_3_2_2_23_1","volume-title":"Image quality assessment: from error visibility to structural similarity. TIP","author":"Wang Zhou","year":"2004","unstructured":"Zhou Wang , Alan C Bovik , Hamid R Sheikh , and Eero P Simoncelli . 2004. Image quality assessment: from error visibility to structural similarity. TIP ( 2004 ). Zhou Wang, Alan C Bovik, Hamid R Sheikh, and Eero P Simoncelli. 2004. Image quality assessment: from error visibility to structural similarity. TIP (2004)."},{"key":"e_1_3_2_2_24_1","unstructured":"Xingxing Wei Siyuan Liang Ning Chen and Xiaochun Cao. 2019. Transferable adversarial attacks for image and video object detection. In IJCAI.  Xingxing Wei Siyuan Liang Ning Chen and Xiaochun Cao. 2019. Transferable adversarial attacks for image and video object detection. In IJCAI."},{"key":"e_1_3_2_2_25_1","unstructured":"Tsui-Wei Weng Huan Zhang Pin-Yu Chen Jinfeng Yi Dong Su Yupeng Gao Cho-Jui Hsieh and Luca Daniel. 2018. Evaluating the robustness of neural networks: An extreme value theory approach. In ICLR.  Tsui-Wei Weng Huan Zhang Pin-Yu Chen Jinfeng Yi Dong Su Yupeng Gao Cho-Jui Hsieh and Luca Daniel. 2018. Evaluating the robustness of neural networks: An extreme value theory approach. In ICLR."},{"key":"e_1_3_2_2_26_1","unstructured":"Cihang Xie Jianyu Wang Zhishuai Zhang Yuyin Zhou Lingxi Xie and Alan Yuille. 2017. Adversarial examples for semantic segmentation and object detection. In ICCV.  Cihang Xie Jianyu Wang Zhishuai Zhang Yuyin Zhou Lingxi Xie and Alan Yuille. 2017. Adversarial examples for semantic segmentation and object detection. In ICCV."},{"key":"e_1_3_2_2_27_1","unstructured":"Pengtao Xie Yuntian Deng and Eric Xing. 2015. Diversifying restricted boltzmann machine for document modeling. In SIGKDD.  Pengtao Xie Yuntian Deng and Eric Xing. 2015. Diversifying restricted boltzmann machine for document modeling. In SIGKDD."},{"key":"e_1_3_2_2_28_1","unstructured":"Junfeng Yang and Carl Vondrick. 2020. Multitask learning strengthens adversarial robustness. In ECCV.  Junfeng Yang and Carl Vondrick. 2020. Multitask learning strengthens adversarial robustness. In ECCV."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Haichao Zhang and Jianyu Wang. 2019. Towards adversarially robust object detection. In ICCV.  Haichao Zhang and Jianyu Wang. 2019. Towards adversarially robust object detection. In ICCV.","DOI":"10.1109\/ICCV.2019.00051"}],"event":{"name":"KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Virtual Event Singapore","acronym":"KDD '21"},"container-title":["Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447548.3467121","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3447548.3467121","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447548.3467121","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447548.3467121","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:26Z","timestamp":1750191506000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447548.3467121"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,14]]},"references-count":28,"alternative-id":["10.1145\/3447548.3467121","10.1145\/3447548"],"URL":"https:\/\/doi.org\/10.1145\/3447548.3467121","relation":{},"subject":[],"published":{"date-parts":[[2021,8,14]]},"assertion":[{"value":"2021-08-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}