{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:30Z","timestamp":1750220070709,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T00:00:00Z","timestamp":1670457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001409","name":"Department of Science and Technology, Ministry of Science and Technology, India","doi-asserted-by":"publisher","award":["CRG\/2020\/000651"],"award-info":[{"award-number":["CRG\/2020\/000651"]}],"id":[{"id":"10.13039\/501100001409","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,8]]},"DOI":"10.1145\/3571600.3571615","type":"proceedings-article","created":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T22:17:26Z","timestamp":1683929846000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Globally-Connected and Trainable Hierarchical Fine-Attention Generative Adversarial Network based Adversarial Defense"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6605-7304","authenticated-orcid":false,"given":"Wahengbam Kanan","family":"Kumar","sequence":"first","affiliation":[{"name":"CSE, Indian Institute of Technology Guwahati, IN"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8059-8900","authenticated-orcid":false,"given":"Manoj","family":"Paidimarri","sequence":"additional","affiliation":[{"name":"CSE, Indian Institute of Technology Guwahati, IN"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9038-8138","authenticated-orcid":false,"given":"Arijit","family":"Sur","sequence":"additional","affiliation":[{"name":"CSE, Indian Institute of Technology Guwahati, IN"}]}],"member":"320","published-online":{"date-parts":[[2023,5,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International conference on machine learning. PMLR, 214\u2013223","author":"Arjovsky Martin","year":"2017","unstructured":"Martin Arjovsky, Soumith Chintala, and L\u00e9on Bottou. 2017. Wasserstein generative adversarial networks. In International conference on machine learning. PMLR, 214\u2013223."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/CVPR.2017.354"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/CISS.2018.8362326"},{"volume-title":"Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp)","author":"Carlini Nicholas","unstructured":"Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp). IEEE, 39\u201357.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","volume-title":"International Conference on Machine Learning. PMLR, 1310\u20131320","author":"Cohen Jeremy","year":"2019","unstructured":"Jeremy Cohen, Elan Rosenfeld, and Zico Kolter. 2019. Certified adversarial robustness via randomized smoothing. In International Conference on Machine Learning. PMLR, 1310\u20131320."},{"unstructured":"Nilaksh Das Madhuri Shanbhogue Shang-Tse Chen Fred Hohman Li Chen Michael\u00a0E Kounavis and Duen\u00a0Horng Chau. 2017. Keeping the bad guys out: Protecting and vaccinating deep learning with jpeg compression. arXiv preprint arXiv:1705.02900(2017).","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/CVPR.2018.00957"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/CVPR.2019.00444"},{"unstructured":"Gintare\u00a0Karolina Dziugaite Zoubin Ghahramani and Daniel\u00a0M Roy. 2016. A study of the effect of jpg compression on adversarial images. arXiv preprint arXiv:1608.00853(2016).","key":"e_1_3_2_1_9_1"},{"unstructured":"Ian\u00a0J Goodfellow Jonathon Shlens and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572(2014).","key":"e_1_3_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1609\/aaai.v32i1.12341"},{"unstructured":"Shixiang Gu and Luca Rigazio. 2014. Towards deep neural network architectures robust to adversarial examples. arXiv preprint arXiv:1412.5068(2014).","key":"e_1_3_2_1_12_1"},{"unstructured":"C Guo M Rana M Cisse and L van\u00a0der Maaten. 2018. Countering adversarial images using input transformations In: International Conference on Learning Representations.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/CVPR.2016.90"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.7557\/18.5173"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/LSP.2021.3090944"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/CVPR.2017.243"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/ICCV.2019.00283"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/CVPR.2019.00624"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1080\/02664763.2018.1441383"},{"unstructured":"Harini Kannan Alexey Kurakin and Ian Goodfellow. 2018. Adversarial logit pairing. arXiv preprint arXiv:1803.06373(2018).","key":"e_1_3_2_1_21_1"},{"unstructured":"Alex Krizhevsky Geoffrey Hinton 2009. Learning multiple layers of features from tiny images. (2009).","key":"e_1_3_2_1_22_1"},{"unstructured":"Alexey Kurakin Ian Goodfellow and Samy Bengio. 2016. Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236(2016).","key":"e_1_3_2_1_23_1"},{"volume-title":"Artificial intelligence safety and security","author":"Kurakin Alexey","unstructured":"Alexey Kurakin, Ian\u00a0J Goodfellow, and Samy Bengio. 2018. Adversarial examples in the physical world. In Artificial intelligence safety and security. Chapman and Hall\/CRC, 99\u2013112.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","first-page":"6","article-title":"Miaoqiang Su, Xirong Li, Wenchang Shi, and XiaoFeng Wang. Detecting adversarial image examples in deep neural networks with adaptive noise reduction","volume":"2","author":"Liang Bin","year":"2018","unstructured":"Bin Liang and Hongcheng Li. 2018. Miaoqiang Su, Xirong Li, Wenchang Shi, and XiaoFeng Wang. Detecting adversarial image examples in deep neural networks with adaptive noise reduction. IEEE Transactions on Dependable and Secure Computing 2 (2018), 6.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1109\/TDSC.2018.2874243"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1109\/CVPR.2018.00191"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1109\/CVPR.2019.00496"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/CVPR.2019.00095"},{"unstructured":"Aleksander Madry Aleksandar Makelov Ludwig Schmidt Dimitris Tsipras and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083(2017).","key":"e_1_3_2_1_30_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/3133956.3134057"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1109\/CVPR.2016.282"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1109\/ICCV.2019.00503"},{"key":"e_1_3_2_1_34_1","volume-title":"Deeply supervised discriminative learning for adversarial defense","author":"Mustafa Aamir","year":"2020","unstructured":"Aamir Mustafa, Salman\u00a0H Khan, Munawar Hayat, Roland Goecke, Jianbing Shen, and Ling Shao. 2020. Deeply supervised discriminative learning for adversarial defense. IEEE transactions on pattern analysis and machine intelligence 43, 9(2020), 3154\u20133166."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1109\/TIP.2019.2940533"},{"key":"e_1_3_2_1_36_1","volume-title":"Towards robust detection of adversarial examples. Advances in Neural Information Processing Systems 31","author":"Pang Tianyu","year":"2018","unstructured":"Tianyu Pang, Chao Du, Yinpeng Dong, and Jun Zhu. 2018. Towards robust detection of adversarial examples. Advances in Neural Information Processing Systems 31 (2018)."},{"key":"e_1_3_2_1_37_1","volume-title":"International Conference on Machine Learning. PMLR, 4970\u20134979","author":"Pang Tianyu","year":"2019","unstructured":"Tianyu Pang, Kun Xu, Chao Du, Ning Chen, and Jun Zhu. 2019. Improving adversarial robustness via promoting ensemble diversity. In International Conference on Machine Learning. PMLR, 4970\u20134979."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1109\/EuroSP.2016.36"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1109\/SP.2016.41"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1109\/CVPR.2018.00894"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1109\/TC.2021.3076826"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1109\/CVPR.2019.00669"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1609\/aaai.v32i1.11504"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1145\/3240765.3240791"},{"key":"e_1_3_2_1_45_1","volume-title":"Defense-gan: Protecting classifiers against adversarial attacks using generative models. arXiv preprint arXiv:1805.06605(2018).","author":"Samangouei Pouya","year":"2018","unstructured":"Pouya Samangouei, Maya Kabkab, and Rama Chellappa. 2018. Defense-gan: Protecting classifiers against adversarial attacks using generative models. arXiv preprint arXiv:1805.06605(2018)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1109\/CVPR.2018.00474"},{"key":"e_1_3_2_1_47_1","volume-title":"Ape-gan: Adversarial perturbation elimination with gan. arXiv preprint arXiv:1707.05474(2017).","author":"Shen Shiwei","year":"2017","unstructured":"Shiwei Shen, Guoqing Jin, Ke Gao, and Yongdong Zhang. 2017. Ape-gan: Adversarial perturbation elimination with gan. arXiv preprint arXiv:1707.05474(2017)."},{"unstructured":"Chuanbiao Song Kun He Liwei Wang and John\u00a0E Hopcroft. 2018. Improving the generalization of adversarial training with domain adaptation. arXiv preprint arXiv:1810.00740(2018).","key":"e_1_3_2_1_48_1"},{"key":"e_1_3_2_1_49_1","volume-title":"Pixeldefend: Leveraging generative models to understand and defend against adversarial examples. arXiv preprint arXiv:1710.10766(2017).","author":"Song Yang","year":"2017","unstructured":"Yang Song, Taesup Kim, Sebastian Nowozin, Stefano Ermon, and Nate Kushman. 2017. Pixeldefend: Leveraging generative models to understand and defend against adversarial examples. arXiv preprint arXiv:1710.10766(2017)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.1109\/CVPR.2015.7298594"},{"unstructured":"Florian Tram\u00e8r Alexey Kurakin Nicolas Papernot Ian Goodfellow Dan Boneh and Patrick McDaniel. 2017. Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204(2017).","key":"e_1_3_2_1_51_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1109\/CVPR42600.2020.00871"},{"unstructured":"Huaxia Wang and Chun-Nam Yu. 2019. A direct approach to robust deep learning using adversarial networks. arXiv preprint arXiv:1905.09591(2019).","key":"e_1_3_2_1_53_1"},{"unstructured":"Shangxi Wu Jitao Sang Kaiyuan Xu Jiaming Zhang Yanfeng Sun Liping Jing and Jian Yu. 2018. Attention please! adversarial defense via attention rectification and preservation. arXiv preprint arXiv:1811.09831(2018).","key":"e_1_3_2_1_54_1"},{"unstructured":"Han Xiao Kashif Rasul and Roland Vollgraf. 2017. Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747(2017).","key":"e_1_3_2_1_55_1"},{"key":"e_1_3_2_1_56_1","volume-title":"Mitigating adversarial effects through randomization","author":"Xie Cihang","year":"2017","unstructured":"Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, and Alan Yuille. 2018. Mitigating adversarial effects through randomization (2017). arXiv preprint arXiv:1711.01991(2018)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_57_1","DOI":"10.1109\/ICCV.2017.153"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_58_1","DOI":"10.1109\/CVPR.2019.00059"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_59_1","DOI":"10.1109\/CVPR.2019.00284"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_60_1","DOI":"10.1109\/ACCESS.2020.2969288"},{"key":"e_1_3_2_1_61_1","volume-title":"International conference on machine learning. PMLR, 7472\u20137482","author":"Zhang Hongyang","year":"2019","unstructured":"Hongyang Zhang, Yaodong Yu, Jiantao Jiao, Eric Xing, Laurent El\u00a0Ghaoui, and Michael Jordan. 2019. Theoretically principled trade-off between robustness and accuracy. In International conference on machine learning. PMLR, 7472\u20137482."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_62_1","DOI":"10.1109\/TIP.2021.3092582"},{"key":"e_1_3_2_1_63_1","volume-title":"GRIP-GAN: An Attack-Free Defense through General Robust Inverse Perturbation","author":"Zheng Haibin","year":"2021","unstructured":"Haibin Zheng, Jinyin Chen, Hang Du, Weipeng Zhu, Shouling Ji, and Xuhong Zhang. 2021. GRIP-GAN: An Attack-Free Defense through General Robust Inverse Perturbation. IEEE Transactions on Dependable and Secure Computing (2021)."}],"event":{"acronym":"ICVGIP'22","name":"ICVGIP'22: Thirteenth Indian Conference on Computer Vision, Graphics and Image Processing","location":"Gandhinagar India"},"container-title":["Proceedings of the Thirteenth Indian Conference on Computer Vision, Graphics and Image Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571600.3571615","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3571600.3571615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:09Z","timestamp":1750183749000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571600.3571615"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,8]]},"references-count":63,"alternative-id":["10.1145\/3571600.3571615","10.1145\/3571600"],"URL":"https:\/\/doi.org\/10.1145\/3571600.3571615","relation":{},"subject":[],"published":{"date-parts":[[2022,12,8]]},"assertion":[{"value":"2023-05-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}