{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:17:11Z","timestamp":1759331831804,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972448"],"award-info":[{"award-number":["61972448"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,17]]},"DOI":"10.1145\/3474085.3475378","type":"proceedings-article","created":{"date-parts":[[2021,10,18]],"date-time":"2021-10-18T22:11:38Z","timestamp":1634595098000},"page":"2195-2204","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards Adversarial Patch Analysis and Certified Defense against Crowd Counting"],"prefix":"10.1145","author":[{"given":"Qiming","family":"Wu","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Zhikang","family":"Zou","sequence":"additional","affiliation":[{"name":"Baidu Inc., Shenzhen, China"}]},{"given":"Pan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Xiaoqing","family":"Ye","sequence":"additional","affiliation":[{"name":"Baidu Inc., Shanghai, China"}]},{"given":"Binghui","family":"Wang","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]},{"given":"Ang","family":"Li","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,10,17]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"volume-title":"Alexander G de G Matthews, and Zoubin Ghahramani","year":"2017","author":"Bradshaw John","key":"e_1_3_2_2_2_1"},{"volume-title":"ArXiv abs\/1712.09665","year":"2017","author":"Brown Tom B.","key":"e_1_3_2_2_3_1"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.312"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.319"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00625"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"volume-title":"Optimization and global minimization methods suitable for neural networks. Neural computing surveys 2","year":"1998","author":"Korczak Jerzy","key":"e_1_3_2_2_9_1"},{"key":"e_1_3_2_2_10_1","first-page":"2","article-title":"A Dual Approach to Scalable Verification of Deep Networks","volume":"1","author":"Dvijotham Krishnamurthy","year":"2018","journal-title":"UAI"},{"volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1625--1634","year":"2018","author":"Eykholt Kevin","key":"e_1_3_2_2_11_1"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013681"},{"volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","year":"2014","author":"Goodfellow Ian J","key":"e_1_3_2_2_13_1"},{"volume-title":"On the effectiveness of interval bound propagation for training verifiably robust models. arXiv preprint arXiv:1810.12715","year":"2018","author":"Gowal Sven","key":"e_1_3_2_2_14_1"},{"volume-title":"Towards deep neural network architectures robust to adversarial examples. arXiv preprint arXiv:1412.5068","year":"2014","author":"Gu Shixiang","key":"e_1_3_2_2_15_1"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19390-8_48"},{"volume-title":"Learning with a strong adversary. arXiv preprint arXiv:1511.03034","year":"2015","author":"Huang Ruitong","key":"e_1_3_2_2_17_1"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.329"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01216-8_33"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46475-6_43"},{"volume-title":"Towards proving the adversarial robustness of deep neural networks. arXiv preprint arXiv:1709.02802","year":"2017","author":"Katz Guy","key":"e_1_3_2_2_21_1"},{"volume-title":"On physical adversarial patches for object detection. arXiv preprint arXiv:1906.11897","year":"2019","author":"Lee Mark","key":"e_1_3_2_2_22_1"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Alexander Levine and Soheil Feizi. 2020. Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation.. In AAAI. 4585--4593.  Alexander Levine and Soheil Feizi. 2020. Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation.. In AAAI. 4585--4593.","DOI":"10.1609\/aaai.v34i04.5888"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00120"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"Dongze Lian Jing Li Jia Zheng Weixin Luo and Shenghua Gao. 2019. Density Map Regression Guided Detection Network for RGB-D Crowd Counting and Localization. In Computer Vision and Pattern Recognition. 1821--1830.  Dongze Lian Jing Li Jia Zheng Weixin Luo and Shenghua Gao. 2019. Density Map Regression Guided Detection Network for RGB-D Crowd Counting and Localization. In Computer Vision and Pattern Recognition. 1821--1830.","DOI":"10.1109\/CVPR.2019.00192"},{"volume-title":"Detecting adversarial attacks on neural network policies with visual foresight. arXiv preprint arXiv:1710.00814","year":"2017","author":"Lin Yen-Chen","key":"e_1_3_2_2_26_1"},{"key":"e_1_3_2_2_27_1","unstructured":"Chenchen Liu XinyuWeng and Yadong Mu. 2019. Recurrent Attentive Zooming for Joint Crowd Counting and Precise Localization. In Computer Vision and Pattern Recognition. 1217--1226.  Chenchen Liu XinyuWeng and Yadong Mu. 2019. Recurrent Attentive Zooming for Joint Crowd Counting and Precise Localization. In Computer Vision and Pattern Recognition. 1217--1226."},{"volume-title":"Crowd Counting With Deep Structured Scale Integration Network. In International Conference on Computer Vision. 1774--1783","year":"2019","author":"Liu Lingbo","key":"e_1_3_2_2_28_1"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00524"},{"volume-title":"Using Depth for Pixel- Wise Detection of Adversarial Attacks in Crowd Counting. arXiv preprint arXiv:1911.11484","year":"2019","author":"Liu Weizhe","key":"e_1_3_2_2_30_1"},{"volume-title":"Dpatch: An adversarial patch attack on object detectors. arXiv preprint arXiv:1806.02299","year":"2018","author":"Liu Xin","key":"e_1_3_2_2_31_1"},{"volume-title":"Modeling, simulation and visual analysis of crowds","author":"Loy Chen Change","key":"e_1_3_2_2_32_1"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.56"},{"volume-title":"No need to worry about adversarial examples in object detection in autonomous vehicles. arXiv preprint arXiv:1707.03501","year":"2017","author":"Lu Jiajun","key":"e_1_3_2_2_34_1"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00624"},{"volume-title":"International Conference on Learning Representations (ICLR).","year":"2018","author":"Madry Aleksander","key":"e_1_3_2_2_36_1"},{"volume-title":"Jimmy Lei Ba, and Ruslan Salakhutdinov","year":"2015","author":"Mansimov Elman","key":"e_1_3_2_2_37_1"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"volume-title":"On detecting adversarial perturbations. arXiv preprint arXiv:1702.04267","year":"2017","author":"Metzen Jan Hendrik","key":"e_1_3_2_2_39_1"},{"volume-title":"International Conference on Machine Learning. 3578--3586","year":"2018","author":"Mirman Matthew","key":"e_1_3_2_2_40_1"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"volume-title":"On adversarial patches: real-world attack on ArcFace-100 face recognition system. In 2019 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)","author":"Pautov Mikhail","key":"e_1_3_2_2_44_1"},{"volume-title":"Semanticadv: Generating adversarial examples via attribute-conditional image editing. arXiv preprint arXiv:1906.07927","year":"2019","author":"Qiu Haonan","key":"e_1_3_2_2_45_1"},{"volume-title":"Adversarial Patches Exploiting Contextual Reasoning in Object Detection. arXiv preprint arXiv:1910.00068","year":"2019","author":"Saha Aniruddha","key":"e_1_3_2_2_46_1"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2017.8078491"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2017.07.007"},{"volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","year":"2013","author":"Szegedy Christian","key":"e_1_3_2_2_49_1"},{"volume-title":"International Conference on Learning Representations.","year":"2019","author":"Tsipras Dimitris","key":"e_1_3_2_2_50_1"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2007.83"},{"volume-title":"Fingerprint classification based on depth neural network. arXiv preprint arXiv:1409.5188","year":"2014","author":"Wang Ruxin","key":"e_1_3_2_2_52_1"},{"volume-title":"Perspective-Guided Convolution Networks for Crowd Counting. arXiv: Computer Vision and Pattern Recognition","year":"2019","author":"Yan Zhaoyi","key":"e_1_3_2_2_53_1"},{"volume-title":"Design and Interpretation of Universal Adversarial Patches in Face Detection. arXiv preprint arXiv:1912.05021","year":"2019","author":"Yang Xiao","key":"e_1_3_2_2_54_1"},{"volume-title":"Adversarial examples: Attacks and defenses for deep learning","year":"2019","author":"Yuan Xiaoyong","key":"e_1_3_2_2_55_1"},{"volume-title":"Relational Attention Network for Crowd Counting. In International Conference on Computer Vision. 6788--6797","year":"2019","author":"Zhang Anran","key":"e_1_3_2_2_56_1"},{"volume-title":"Attentional Neural Fields for Crowd Counting. In International Conference on Computer Vision.","year":"2019","author":"Zhang Anran","key":"e_1_3_2_2_57_1"},{"volume-title":"Chan","year":"2019","author":"Zhang Qi","key":"e_1_3_2_2_58_1"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.70"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.03.083"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2875495"}],"event":{"name":"MM '21: ACM Multimedia Conference","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Virtual Event China","acronym":"MM '21"},"container-title":["Proceedings of the 29th ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474085.3475378","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474085.3475378","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:49:19Z","timestamp":1750193359000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474085.3475378"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,17]]},"references-count":61,"alternative-id":["10.1145\/3474085.3475378","10.1145\/3474085"],"URL":"https:\/\/doi.org\/10.1145\/3474085.3475378","relation":{},"subject":[],"published":{"date-parts":[[2021,10,17]]},"assertion":[{"value":"2021-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}