{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T14:12:52Z","timestamp":1764079972960,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T00:00:00Z","timestamp":1697673600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272089"],"award-info":[{"award-number":["62272089"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,19]]},"DOI":"10.1145\/3631908.3631920","type":"proceedings-article","created":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T12:05:09Z","timestamp":1706875509000},"page":"80-87","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Preprocessing-based Adversarial Defense for Object Detection via Feature Filtration"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-1935-7808","authenticated-orcid":false,"given":"Ling","family":"Zhou","sequence":"first","affiliation":[{"name":"University of Electronic and Science Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8195-1304","authenticated-orcid":false,"given":"Qihe","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Electronic and Science Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8314-754X","authenticated-orcid":false,"given":"Shijie","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Electronic and Science Technology of China, China"}]}],"member":"320","published-online":{"date-parts":[[2024,2,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.12720\/jait.14.5.907-917"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.12720\/jait.14.3.411-417"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.12720\/jait.12.4.279-286"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.153"},{"key":"e_1_3_2_1_5_1","volume-title":"12th USENIX workshop on offensive technologies (WOOT 18)","author":"Song Dawn","year":"2018","unstructured":"Dawn Song, Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramer, Atul Prakash, and Tadayoshi Kohno. Physical adversarial examples for object detectors. In 12th USENIX workshop on offensive technologies (WOOT 18), 2018."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"e_1_3_2_1_7_1","volume-title":"Robust adversarial perturbation on deep proposal-based models. arXiv preprint arXiv:1809.05962","author":"Li Yuezun","year":"2018","unstructured":"Yuezun Li, Daniel Tian, Ming-Ching Chang, Xiao Bian, and Siwei Lyu. Robust adversarial perturbation on deep proposal-based models. arXiv preprint arXiv:1809.05962, 2018."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00250"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00129"},{"key":"e_1_3_2_1_10_1","volume-title":"Enhancing adversarial defense by k-winner take-all. arXiv preprint arXiv:1905.10510","author":"Xiao Chang","year":"2019","unstructured":"Chang Xiao, Peilin Zhong, and Changxi Zheng. Enhancing adversarial defense by k-winner take-all. arXiv preprint arXiv:1905.10510, 2019."},{"key":"e_1_3_2_1_11_1","volume-title":"Detecting and diagnosing adversarial images with class-conditional capsule reconstructions. arXiv preprint arXiv:1907.02957","author":"Qin Yao","year":"2019","unstructured":"Yao Qin, Nicholas Frosst, Sara Sabour, Colin Raffel, Garrison Cottrell, and Geoffrey Hinton. Detecting and diagnosing adversarial images with class-conditional capsule reconstructions. arXiv preprint arXiv:1907.02957, 2019."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00103"},{"key":"e_1_3_2_1_13_1","first-page":"413","volume-title":"Proceedings, Part XXIII 16","author":"Li Shasha","unstructured":"Shasha Li, Shitong Zhu, Sudipta Paul, Amit Roy-Chowdhury, Chengyu Song, Srikanth Krishnamurthy, Ananthram Swami, and Kevin S Chan. Connecting the dots: Detecting adversarial perturbations using context inconsistency. In Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part XXIII 16, pages 396\u2013413. Springer, 2020."},{"key":"e_1_3_2_1_14_1","volume-title":"Provable robustness against all adversarial -perturbations for . arXiv preprint arXiv:1905.11213","author":"Croce Francesco","year":"2019","unstructured":"Francesco Croce and Matthias Hein. Provable robustness against all adversarial -perturbations for . arXiv preprint arXiv:1905.11213, 2019."},{"key":"e_1_3_2_1_15_1","volume-title":"Certified robustness for top-k predictions against adversarial perturbations via randomized smoothing. arXiv preprint arXiv:1912.09899","author":"Jia Jinyuan","year":"2019","unstructured":"Jinyuan Jia, Xiaoyu Cao, Binghui Wang, and Neil Zhenqiang Gong. Certified robustness for top-k predictions against adversarial perturbations via randomized smoothing. arXiv preprint arXiv:1912.09899, 2019a."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00669"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01148"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00624"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-021-02256-6"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01028"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484757"},{"key":"e_1_3_2_1_22_1","first-page":"1275","article-title":"Detection as regression: Certified object detection with median smoothing","volume":"33","author":"Curry Michael","year":"2020","unstructured":"Ping-yeh Chiang, Michael Curry, Ahmed Abdelkader, Aounon Kumar, John Dickerson, and Tom Goldstein. Detection as regression: Certified object detection with median smoothing. Advances in Neural Information Processing Systems, 33:1275\u20131286, 2020.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01455"},{"key":"e_1_3_2_1_24_1","first-page":"21945","article-title":"A provable defense for pretrained classifiers","volume":"33","author":"Salman Hadi","year":"2020","unstructured":"Hadi Salman, Mingjie Sun, Greg Yang, Ashish Kapoor, and J Zico Kolter. Denoised smoothing: A provable defense for pretrained classifiers. Advances in Neural Information Processing Systems, 33:21945\u201321957, 2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_25_1","volume-title":"Transferable adversarial attacks for image and video object detection. arXiv preprint arXiv:1811.12641","author":"Wei Xingxing","year":"2018","unstructured":"Xingxing Wei, Siyuan Liang, Ning Chen, and Xiaochun Cao. Transferable adversarial attacks for image and video object detection. arXiv preprint arXiv:1811.12641, 2018."},{"key":"e_1_3_2_1_26_1","volume-title":"Robust adversarial perturbation on deep proposal-based models. arXiv preprint arXiv:1809.05962","author":"Li Yuezun","year":"2018","unstructured":"Yuezun Li, Daniel Tian, Ming-Ching Chang, Xiao Bian, and Siwei Lyu. Robust adversarial perturbation on deep proposal-based models. arXiv preprint arXiv:1809.05962, 2018."},{"key":"e_1_3_2_1_27_1","first-page":"272","volume-title":"2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","author":"Chow Ka-Ho","unstructured":"Ka-Ho Chow, Ling Liu, Margaret Loper, Juhyun Bae, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, and Yanzhao Wu. Adversarial objectness gradient attacks in real-time object detection systems. In 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), pages 263\u2013272. IEEE, 2020."},{"key":"e_1_3_2_1_28_1","volume-title":"Sparse adversarial attack to object detection. arXiv preprint arXiv:2012.13692","author":"Bao Jiayu","year":"2020","unstructured":"Jiayu Bao. Sparse adversarial attack to object detection. arXiv preprint arXiv:2012.13692, 2020."},{"key":"e_1_3_2_1_29_1","volume-title":"Dpatch: An adversarial patch attack on object detectors. arXiv preprint arXiv:1806.02299","author":"Liu Xin","year":"2018","unstructured":"Xin Liu, Huanrui Yang, Ziwei Liu, Linghao Song, Hai Li, and Yiran Chen. Dpatch: An adversarial patch attack on object detectors. arXiv preprint arXiv:1806.02299, 2018."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"e_1_3_2_1_31_1","first-page":"374","volume-title":"Electronics & Mobile Communication Conference (UEMCON)","author":"Yang Darren Yu","unstructured":"Darren Yu Yang, Jay Xiong, Xincheng Li, Xu Yan, John Raiti, Yuntao Wang, HuaQiang Wu, and Zhenyu Zhong. Building towards\u201d invisible cloak\u201d: Robust physical adversarial attack on yolo object detector. In 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pages 368\u2013374. IEEE, 2018."},{"key":"e_1_3_2_1_32_1","volume-title":"Object hider: Adversarial patch attack against object detectors. arXiv preprint arXiv:2010.14974","author":"Zhao Yusheng","year":"2020","unstructured":"Yusheng Zhao, Huanqian Yan, and Xingxing Wei. Object hider: Adversarial patch attack against object detectors. arXiv preprint arXiv:2010.14974, 2020."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01472"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00051"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01635"},{"key":"e_1_3_2_1_36_1","volume-title":"Adversarial examples are not bugs, they are features. Advances in neural information processing systems, 32","author":"Ilyas Andrew","year":"2019","unstructured":"Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Logan Engstrom, Brandon Tran, and Aleksander Madry. Adversarial examples are not bugs, they are features. Advances in neural information processing systems, 32, 2019."},{"key":"e_1_3_2_1_37_1","volume-title":"Luc Van Gool, Christopher KI Williams, John Winn, and Andrew Zisserman. The pascal visual object classes challenge: A retrospective. International journal of computer vision, 111:98\u2013136","author":"Everingham Mark","year":"2015","unstructured":"Mark Everingham, SM Ali Eslami, Luc Van Gool, Christopher KI Williams, John Winn, and Andrew Zisserman. The pascal visual object classes challenge: A retrospective. International journal of computer vision, 111:98\u2013136, 2015."},{"key":"e_1_3_2_1_38_1","volume-title":"Improved training of wasserstein gans. Advances in neural information processing systems, 30","author":"Gulrajani Ishaan","year":"2017","unstructured":"Ishaan Gulrajani, Faruk Ahmed, Martin Arjovsky, Vincent Dumoulin, and Aaron C Courville. Improved training of wasserstein gans. Advances in neural information processing systems, 30, 2017."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2003.1292216"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"e_1_3_2_1_41_1","volume-title":"Munich, Germany","author":"Ronneberger Olaf","year":"2015","unstructured":"Olaf Ronneberger, Philipp Fischer, and Thomas Brox. U-net: Convolutional networks for biomedical image segmentation. In Medical Image Computing and Computer-Assisted Intervention\u2013MICCAI 2015: 18th International Conference, Munich, Germany, October 5-9, 2015, Proceedings, Part III 18, pages 234\u2013241. Springer, 2015."},{"key":"e_1_3_2_1_42_1","volume-title":"Luc Van Gool, Christopher KI Williams, John Winn, and Andrew Zisserman. The pascal visual object classes challenge: A retrospective. International journal of computer vision, 111:98\u2013136","author":"Everingham Mark","year":"2015","unstructured":"Mark Everingham, SM Ali Eslami, Luc Van Gool, Christopher KI Williams, John Winn, and Andrew Zisserman. The pascal visual object classes challenge: A retrospective. International journal of computer vision, 111:98\u2013136, 2015."},{"key":"e_1_3_2_1_43_1","first-page":"755","volume-title":"European conference on computer vision (ECCV)","author":"Lin Tsung-Yi","year":"2014","unstructured":"Tsung-Yi Lin, Michael Maire, Serge Belongie, James Hays, Pietro Perona, Deva Ramanan, Piotr Doll\u00e1r, and C Lawrence Zitnick. Microsoft coco: Common objects in context. In European conference on computer vision (ECCV), pages 740\u2013 755, 2014."},{"key":"e_1_3_2_1_44_1","volume-title":"Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767","author":"Redmon Joseph","year":"2018","unstructured":"Joseph Redmon and Ali Farhadi. Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767, 2018."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"e_1_3_2_1_46_1","volume-title":"Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155","author":"Xu Weilin","year":"2017","unstructured":"Weilin Xu, David Evans, and Yanjun Qi. Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155, 2017."}],"event":{"name":"ICACS 2023: the 7th International Conference on Algorithms, Computing and Systems","acronym":"ICACS 2023","location":"Larissa Greece"},"container-title":["Proceedings of the 7th International Conference on Algorithms, Computing and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3631908.3631920","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3631908.3631920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T02:16:50Z","timestamp":1755915410000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3631908.3631920"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,19]]},"references-count":46,"alternative-id":["10.1145\/3631908.3631920","10.1145\/3631908"],"URL":"https:\/\/doi.org\/10.1145\/3631908.3631920","relation":{},"subject":[],"published":{"date-parts":[[2023,10,19]]},"assertion":[{"value":"2024-02-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}