{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T08:00:21Z","timestamp":1761897621509,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Program","award":["2020AAA0107800"],"award-info":[{"award-number":["2020AAA0107800"]}]},{"name":"National Natural Science Foundation of China","award":["61872144"],"award-info":[{"award-number":["61872144"]}]},{"name":"National Research Foundation Singapore","award":["AISG2-RP-2020-019"],"award-info":[{"award-number":["AISG2-RP-2020-019"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,17]]},"DOI":"10.1145\/3474085.3475171","type":"proceedings-article","created":{"date-parts":[[2021,10,18]],"date-time":"2021-10-18T17:45:27Z","timestamp":1634579127000},"page":"395-403","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["AdvFilter: Predictive Perturbation-aware Filtering against Adversarial Attack via Multi-domain Learning"],"prefix":"10.1145","author":[{"given":"Yihao","family":"Huang","sequence":"first","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"given":"Qing","family":"Guo","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Felix","family":"Juefei-Xu","sequence":"additional","affiliation":[{"name":"Alibaba Group, USA, San Mateo, CA, USA"}]},{"given":"Lei","family":"Ma","sequence":"additional","affiliation":[{"name":"University of Alberta, Edmonton, BC, Canada"}]},{"given":"Weikai","family":"Miao","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanyang Technology University, Singapore, Singapore"}]},{"given":"Geguang","family":"Pu","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2021,10,17]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n.d.]. The Street View House Numbers (SVHN) Dataset. http:\/\/ufldl.stanford. edu\/housenumbers\/.  [n.d.]. The Street View House Numbers (SVHN) Dataset. http:\/\/ufldl.stanford. edu\/housenumbers\/."},{"volume-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. arXiv preprint arXiv:1802.00420","year":"2018","author":"Athalye Anish","key":"e_1_3_2_2_2_1"},{"volume-title":"Adversarial Exposure Attack on Diabetic Retinopathy Imagery. arXiv preprint arXiv:2009.09231","year":"2020","author":"Cheng Yupeng","key":"e_1_3_2_2_3_1"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2319074.2321415"},{"volume-title":"Keeping the bad guys out: Protecting and vaccinating deep learning with jpeg compression. arXiv preprint arXiv:1705.02900","year":"2017","author":"Das Nilaksh","key":"e_1_3_2_2_5_1"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSSMIC.1993.373563"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/383259.383296"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2318993.2320069"},{"volume-title":"Making Images Undiscoverable from Co-Saliency Detection. arXiv preprint arXiv:2009.09258","year":"2020","author":"Gao Ruijun","key":"e_1_3_2_2_10_1"},{"volume-title":"Advhaze: Adversarial haze attack. arXiv preprint arXiv:2104.13673","year":"2021","author":"Gao Ruijun","key":"e_1_3_2_2_11_1"},{"volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","year":"2014","author":"Goodfellow Ian J","key":"e_1_3_2_2_12_1"},{"volume-title":"Countering adversarial images using input transformations. arXiv preprint arXiv:1711.00117","year":"2017","author":"Guo Chuan","key":"e_1_3_2_2_13_1"},{"key":"e_1_3_2_2_14_1","unstructured":"Qing Guo Felix Juefei-Xu Xiaofei Xie Lei Ma Jian Wang Bing Yu Wei Feng and Yang Liu. 2020. Watch out! Motion is Blurring the Vision of Your Deep Neural Networks. In Advances in Neural Information Processing Systems (NeurIPS) .  Qing Guo Felix Juefei-Xu Xiaofei Xie Lei Ma Jian Wang Bing Yu Wei Feng and Yang Liu. 2020. Watch out! Motion is Blurring the Vision of Your Deep Neural Networks. In Advances in Neural Information Processing Systems (NeurIPS) ."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_16_1","unstructured":"Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2016b. Deep Residual Learning for Image Recognition.  Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2016b. Deep Residual Learning for Image Recognition."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.579"},{"key":"e_1_3_2_2_18_1","unstructured":"Harini Kannan Alexey Kurakin and Ian Goodfellow. 2018. Adversarial Logit Pairing. In NeurIPS.  Harini Kannan Alexey Kurakin and Ian Goodfellow. 2018. Adversarial Logit Pairing. In NeurIPS."},{"volume-title":"Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236","year":"2016","author":"Kurakin Alexey","key":"e_1_3_2_2_20_1"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94042-7_11"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00088"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00191"},{"volume-title":"Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083","year":"2017","author":"Madry Aleksander","key":"e_1_3_2_2_24_1"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00265"},{"volume-title":"Reliable Machine Learning in the Wild Workshop, 34th International Conference on Machine Learning. http:\/\/arxiv.org\/abs\/1707","year":"2017","author":"Rauber Jonas","key":"e_1_3_2_2_26_1"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(92)90242-F"},{"volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","year":"2014","author":"Simonyan Karen","key":"e_1_3_2_2_29_1"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME51207.2021.9428437"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/145"},{"volume-title":"Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204","year":"2017","author":"Tram\u00e8r Florian","key":"e_1_3_2_2_32_1"},{"volume-title":"Smooth adversarial training. arXiv preprint arXiv:2006.14536","year":"2020","author":"Xie Cihang","key":"e_1_3_2_2_33_1"},{"volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 501--509","author":"Xie Cihang","key":"e_1_3_2_2_34_1"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.634"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/3326943.3326982"},{"volume-title":"It's Raining Cats or Dogs? Adversarial Rain Attack on DNN Perception. arXiv preprint arXiv:2009.09205","year":"2020","author":"Zhai Liming","key":"e_1_3_2_2_37_1"}],"event":{"name":"MM '21: ACM Multimedia Conference","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Virtual Event China","acronym":"MM '21"},"container-title":["Proceedings of the 29th ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474085.3475171","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474085.3475171","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:47Z","timestamp":1750193327000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474085.3475171"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,17]]},"references-count":36,"alternative-id":["10.1145\/3474085.3475171","10.1145\/3474085"],"URL":"https:\/\/doi.org\/10.1145\/3474085.3475171","relation":{},"subject":[],"published":{"date-parts":[[2021,10,17]]},"assertion":[{"value":"2021-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}