{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:33:25Z","timestamp":1763458405092,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,23]],"date-time":"2024-06-23T00:00:00Z","timestamp":1719100800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,23]]},"DOI":"10.1145\/3649329.3656501","type":"proceedings-article","created":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T19:27:22Z","timestamp":1731007642000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Defending against Adversarial Patches using Dimensionality Reduction"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1611-9378","authenticated-orcid":false,"given":"Nandish","family":"Chattopadhyay","sequence":"first","affiliation":[{"name":"New York University Abu Dhabi, Abu Dhabi, Abu Dhabi Emirate, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8992-7958","authenticated-orcid":false,"given":"Amira","family":"Guesmi","sequence":"additional","affiliation":[{"name":"NYU Abu Dhabi, Abu Dhabi, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9841-6132","authenticated-orcid":false,"given":"Muhammad Abdullah","family":"Hanif","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi, Abu Dhabi, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6534-9295","authenticated-orcid":false,"given":"Bassem","family":"Ouni","sequence":"additional","affiliation":[{"name":"Technology Innovation Institute (TII), Abu Dhabi, Abu Dhabi Emirate, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2607-8135","authenticated-orcid":false,"given":"Muhammad","family":"Shafique","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi (NYUAD), Abu Dhabi, Abu Dhabi, United Arab Emirates"}]}],"member":"320","published-online":{"date-parts":[[2024,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/645504.656414"},{"key":"e_1_3_2_1_2_1","volume-title":"International conference on machine learning. PMLR, 284--293","author":"Athalye Anish","year":"2018","unstructured":"Anish Athalye, Logan Engstrom, Andrew Ilyas, and Kevin Kwok. 2018. Synthesizing robust adversarial examples. In International conference on machine learning. PMLR, 284--293."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/645503.656271"},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Security, Privacy, and Applied Cryptography Engineering. Springer, 226--241","author":"Chattopadhyay Nandish","year":"2021","unstructured":"Nandish Chattopadhyay, Subhrojyoti Chatterjee, and Anupam Chattopadhyay. 2021. Robustness against adversarial attacks using dimensionality. In International Conference on Security, Privacy, and Applied Cryptography Engineering. Springer, 226--241."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851795"},{"key":"e_1_3_2_1_6_1","volume-title":"Bryan Tan Bing Xing, and Anupam Chattopadhyay.","author":"Chattopadhyay Nandish","year":"2020","unstructured":"Nandish Chattopadhyay, Lionell Yip En Zhi, Bryan Tan Bing Xing, and Anupam Chattopadhyay. 2020. Spatially Correlated Patterns in Adversarial Images. arXiv preprint arXiv:2011.10794 (2020)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579856.3582816"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_9_1","volume-title":"High Dimensional Spaces, Deep Learning and Adversarial Examples. arXiv preprint arXiv:1801.00634","author":"Dube Simant","year":"2018","unstructured":"Simant Dube. 2018. High Dimensional Spaces, Deep Learning and Adversarial Examples. arXiv preprint arXiv:1801.00634 (2018)."},{"volume-title":"LaVAN: Localized and Visible Adversarial Noise. In International Conference on Machine Learning.","author":"Dan","key":"e_1_3_2_1_10_1","unstructured":"Dan Karmon et al. 2018. LaVAN: Localized and Visible Adversarial Noise. In International Conference on Machine Learning."},{"key":"e_1_3_2_1_11_1","unstructured":"Tom Brown et al. 2017. Adversarial Patch. https:\/\/arxiv.org\/pdf\/1712.09665.pdf"},{"key":"e_1_3_2_1_12_1","volume-title":"Statistics","author":"Freedman D","year":"2007","unstructured":"D Freedman, R Pisani, and R Purves. 1978. Statistics. 2007. ISBN: 0-393970-833 (1978)."},{"key":"e_1_3_2_1_13_1","volume-title":"Adversarial spheres. arXiv preprint arXiv:1801.02774","author":"Gilmer Justin","year":"2018","unstructured":"Justin Gilmer, Luke Metz, Fartash Faghri, Samuel S Schoenholz, Maithra Raghu, Martin Wattenberg, and Ian Goodfellow. 2018. Adversarial spheres. arXiv preprint arXiv:1801.02774 (2018)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3321118"},{"key":"e_1_3_2_1_15_1","unstructured":"Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2015. Deep Residual Learning for Image Recognition. arXiv:1512.03385 [cs.CV]"},{"key":"e_1_3_2_1_16_1","unstructured":"John Hopcroft and Ravi Kannan. 2014. Foundations of data science. (2014)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00791"},{"key":"e_1_3_2_1_18_1","first-page":"6465","article-title":"(De) Randomized smoothing for certifiable defense against patch attacks","volume":"33","author":"Levine Alexander","year":"2020","unstructured":"Alexander Levine and Soheil Feizi. 2020. (De) Randomized smoothing for certifiable defense against patch attacks. Advances in Neural Information Processing Systems 33 (2020), 6465--6475.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2019.00143"},{"key":"e_1_3_2_1_20_1","unstructured":"Karen Simonyan and Andrew Zisserman. 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv:1409.1556 [cs.CV]"},{"key":"e_1_3_2_1_21_1","article-title":"Visualizing data using t-SNE","volume":"9","author":"der Maaten Laurens Van","year":"2008","unstructured":"Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research 9, 11 (2008).","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_1_22_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Xiang Chong","year":"2021","unstructured":"Chong Xiang, Arjun Nitin Bhagoji, Vikash Sehwag, and Prateek Mittal. 2021. {PatchGuard}: A provably robust defense against adversarial patches via small receptive fields and masking. In 30th USENIX Security Symposium (USENIX Security 21). 2237--2254."}],"event":{"name":"DAC '24: 61st ACM\/IEEE Design Automation Conference","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE-CEDA","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"San Francisco CA USA","acronym":"DAC '24"},"container-title":["Proceedings of the 61st ACM\/IEEE Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649329.3656501","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649329.3656501","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:55Z","timestamp":1750295875000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649329.3656501"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,23]]},"references-count":22,"alternative-id":["10.1145\/3649329.3656501","10.1145\/3649329"],"URL":"https:\/\/doi.org\/10.1145\/3649329.3656501","relation":{},"subject":[],"published":{"date-parts":[[2024,6,23]]},"assertion":[{"value":"2024-11-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}