{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T05:06:42Z","timestamp":1761541602537,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T00:00:00Z","timestamp":1634688000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,20]]},"DOI":"10.1145\/3475724.3483607","type":"proceedings-article","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T16:09:52Z","timestamp":1634918992000},"page":"42-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Real World Robustness from Systematic Noise"],"prefix":"10.1145","author":[{"given":"Yan","family":"Wang","sequence":"first","affiliation":[{"name":"SenseTime Research, Beijing, China"}]},{"given":"Yuhang","family":"Li","sequence":"additional","affiliation":[{"name":"Yale University, New Haven, NY, USA"}]},{"given":"Ruihao","family":"Gong","sequence":"additional","affiliation":[{"name":"SenseTime Research &amp; Beihang University, Beijing, China"}]},{"given":"Tianzi","family":"Xiao","sequence":"additional","affiliation":[{"name":"SenseTime Research, Beijing, China"}]},{"given":"Fengwei","family":"Yu","sequence":"additional","affiliation":[{"name":"Sensetime Research, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2021,10,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Nearest-neighbor interpolation. https:\/\/en.wikipedia.org\/wiki\/Nearestneighbor_ interpolation  2017. Nearest-neighbor interpolation. https:\/\/en.wikipedia.org\/wiki\/Nearestneighbor_ interpolation"},{"volume-title":"Proceedings of the European Conference on Computer Vision (ECCV).","year":"2018","author":"Bhagoji Arjun Nitin","key":"e_1_3_2_1_2_1"},{"volume-title":"The OpenCV Library. Dr. Dobb's Journal of Software Tools","year":"2000","author":"Bradski G.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","volume-title":"Lin (Eds.)","volume":"33","author":"Brown Tom","year":"2020"},{"volume-title":"Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp)","author":"Carlini Nicholas","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"Francesco Croce and Matthias Hein. 2020. Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In ICML.  Francesco Croce and Matthias Hein. 2020. Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In ICML."},{"volume-title":"ImageNet: A Large-Scale Hierarchical Image Database. 2009 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (Jul","year":"2009","author":"Deng J.","key":"e_1_3_2_1_7_1"},{"volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv preprint arXiv:1810.04805","year":"2018","author":"Devlin Jacob","key":"e_1_3_2_1_8_1"},{"volume-title":"andWeijia Jia","year":"2020","author":"Fu Chaohao","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2946645.2946704"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00250"},{"volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","year":"2014","author":"Goodfellow Ian J","key":"e_1_3_2_1_12_1"},{"volume-title":"Contextnet: Improving convolutional neural networks for automatic speech recognition with global context. arXiv preprint arXiv:2005.03191","year":"2020","author":"Han Wei","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"volume-title":"Proceedings of the International Conference on Learning Representations","year":"2019","author":"Hendrycks Dan","key":"e_1_3_2_1_15_1"},{"volume-title":"Natural Adversarial Examples. CVPR","year":"2021","author":"Hendrycks Dan","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2999134.2999257"},{"volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision Workshops. 0--0.","year":"2019","author":"Laugros Alfred","key":"e_1_3_2_1_18_1"},{"volume-title":"Jasper: An end-to-end convolutional neural acoustic model. arXiv preprint arXiv:1904.03288","year":"2019","author":"Li Jason","key":"e_1_3_2_1_19_1"},{"volume-title":"Proceedings of the International Conference on Learning Representations","year":"2018","author":"Madry Aleksander","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","unstructured":"Adam Paszke Sam Gross Soumith Chintala Gregory Chanan Edward Yang Zachary DeVito Zeming Lin Alban Desmaison Luca Antiga and Adam Lerer. 2017. Automatic differentiation in PyTorch. (2017).  Adam Paszke Sam Gross Soumith Chintala Gregory Chanan Edward Yang Zachary DeVito Zeming Lin Alban Desmaison Luca Antiga and Adam Lerer. 2017. Automatic differentiation in PyTorch. (2017)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01044"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/3454287.3454589"},{"volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","year":"2014","author":"Simonyan Karen","key":"e_1_3_2_1_25_1"},{"volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","year":"2013","author":"Szegedy Christian","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1134782.1134792"},{"volume-title":"Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204","year":"2017","author":"Tram\u00e8r Florian","key":"e_1_3_2_1_28_1"},{"volume-title":"Image Processing in Python. CSI Communications 23","year":"2012","author":"Umesh P","key":"e_1_3_2_1_29_1"}],"event":{"name":"MM '21: ACM Multimedia Conference","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Virtual Event China","acronym":"MM '21"},"container-title":["Proceedings of the 1st International Workshop on Adversarial Learning for Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3475724.3483607","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3475724.3483607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:18Z","timestamp":1750193298000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3475724.3483607"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,20]]},"references-count":29,"alternative-id":["10.1145\/3475724.3483607","10.1145\/3475724"],"URL":"https:\/\/doi.org\/10.1145\/3475724.3483607","relation":{},"subject":[],"published":{"date-parts":[[2021,10,20]]},"assertion":[{"value":"2021-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}