{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T20:40:03Z","timestamp":1756240803010,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T00:00:00Z","timestamp":1710374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3,14]]},"DOI":"10.1145\/3655755.3655782","type":"proceedings-article","created":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T12:19:10Z","timestamp":1717849150000},"page":"200-206","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Self-examination Mechanism: Improving Standard Accuracy in Adversarial Purification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-7107-3676","authenticated-orcid":false,"given":"Sora","family":"Suegami","sequence":"first","affiliation":[{"name":"The University of Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9384-2994","authenticated-orcid":false,"given":"Yutaro","family":"Oguri","sequence":"additional","affiliation":[{"name":"The University of Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8174-6798","authenticated-orcid":false,"given":"Zaiying","family":"Zhao","sequence":"additional","affiliation":[{"name":"The University of Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4036-0735","authenticated-orcid":false,"given":"Yu","family":"Kagaya","sequence":"additional","affiliation":[{"name":"The University of Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1784-2314","authenticated-orcid":false,"given":"Toshihiko","family":"Yamasaki","sequence":"additional","affiliation":[{"name":"The University of Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2024,6,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The mnist database of handwritten digits. http:\/\/yann. lecun.com\/exdb\/mnist\/ .."},{"key":"e_1_3_2_1_2_1","volume-title":"NeurIPS","author":"Croce F.","year":"2021","unstructured":"Croce, F., Andriushchenko, M., Sehwag, V., Debenedetti, E., Flammarion, N., Chiang, M., Mittal, P., and Hein, M. Robust-bench: a standardized adversarial robustness benchmark. In NeurIPS (2021)."},{"key":"e_1_3_2_1_3_1","volume-title":"ICML","author":"Croce F.","year":"2020","unstructured":"Croce, F., and Hein, M. Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In ICML (2020)."},{"key":"e_1_3_2_1_4_1","volume-title":"Robustness (python library)","author":"Engstrom L.","year":"2019","unstructured":"Engstrom, L., Ilyas, A., Salman, H., Santurkar, S., and Tsipras, D. Robustness (python library), 2019."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207637"},{"key":"e_1_3_2_1_6_1","volume-title":"IJCNN","author":"Gowal S.","year":"2020","unstructured":"Gowal, S., Dvijotham, K., Stanforth, R., Bunel, R., Qin, C., Uesato, J., Arandjelovic, R., Mann, T., and Kohli, P. On the effectiveness of interval bound propagation for training verifiably robust models. In NeurIPS (2018).Gil Fidel, Ron Bitton, and Asaf Shabtai, \u201cWhen explainability meets adversarial learning: Detecting adversarial examples using shap signatures\u201d, in IJCNN, 2020."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_8_1","volume-title":"Puvae: A variational autoencoder to purify adversarial examples","author":"Hwang U.","year":"2019","unstructured":"Hwang, U., Park, J., Jang, H., Yoon, S., and Cho, N. I. Puvae: A variational autoencoder to purify adversarial examples. IEEE Access (2019)."},{"key":"e_1_3_2_1_9_1","volume-title":"ICLR","author":"Kingma D. P.","year":"2015","unstructured":"Kingma, D. P., and Ba, J. L. Adam: A method for stochastic optimization. In ICLR (2015)."},{"key":"e_1_3_2_1_10_1","volume-title":"ICLR","author":"Kingma D. P.","year":"2014","unstructured":"Kingma, D. P., and Welling, M. Auto-encoding variational bayes. In ICLR (2014)."},{"volume-title":"Learning multiple layers of features from tiny images. Master's thesis","author":"Krizhevsky A.","key":"e_1_3_2_1_11_1","unstructured":"Krizhevsky, A. Learning multiple layers of features from tiny images. Master's thesis, University of Tront (2009)."},{"key":"e_1_3_2_1_12_1","volume-title":"ICLR","author":"Laidlaw C.","year":"2021","unstructured":"Laidlaw, C., Singla, S., and Feizi, S. Perceptual adversarial robustness: Defense against unseen threat models. In ICLR (2021)."},{"key":"e_1_3_2_1_13_1","volume-title":"NeurIPS","author":"Lundberg S. M.","year":"2017","unstructured":"Lundberg, S. M., and Lee, S.-I. A unified approach to interpreting model predictions. In NeurIPS (2017)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRAPI.2018.00067"},{"key":"e_1_3_2_1_15_1","volume-title":"Umap: Uniform manifold approximation and projection for dimension reduction. arXiv preprint arXiv:1802.03426","author":"McInnes L.","year":"2018","unstructured":"McInnes, L., Healy, J., and Melville, J. Umap: Uniform manifold approximation and projection for dimension reduction. arXiv preprint arXiv:1802.03426 (2018)."},{"key":"e_1_3_2_1_16_1","volume-title":"ICML","author":"Nie W.","year":"2022","unstructured":"Nie, W., Guo, B., Huang, Y., Xiao, C., Vahdat, A., and Anandkumar, A. Diffusion models for adversarial purification. In ICML (2022)."},{"key":"e_1_3_2_1_17_1","volume-title":"-Y. A survey of robust adversarial training in pattern recognition: Fundamental, theory, and methodologies. Pattern Recognition 131","author":"Qian Z.","year":"2022","unstructured":"Qian, Z., Huang, K., Wang, Q.-F., and Zhang, X.-Y. A survey of robust adversarial training in pattern recognition: Fundamental, theory, and methodologies. Pattern Recognition 131 (2022), 108889"},{"key":"e_1_3_2_1_18_1","volume-title":"Fixing data augmentation to improve adversarial robustness. arXiv preprint arXiv:2103.01946","author":"Rebuffi S.-A.","year":"2021","unstructured":"Rebuffi, S.-A., Gowal, S., Calian, D. A., Stimberg, F., Wiles, O., and Mann, T. Fixing data augmentation to improve adversarial robustness. arXiv preprint arXiv:2103.01946 (2021)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Shangzheng L. \"A Traffic Sign Image Recognition and Classification Approach Based on Convolutional Neural Network \" In ICMTMA (2019).","DOI":"10.1109\/ICMTMA.2019.00096"},{"key":"e_1_3_2_1_20_1","volume-title":"ICLR","author":"Shi C.","year":"2021","unstructured":"Shi, C., Holtz, C., and Mishne, G. Online adversarial purification based on self-supervised learning. In ICLR (2021)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.107060"},{"key":"e_1_3_2_1_22_1","volume-title":"ICLR","author":"Szegedy C.","year":"2014","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., and Fergus, R. Intriguing properties of neural networks. In ICLR (2014)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.18178\/joig.11.1.91-97"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/I4Tech48345.2020.9102699"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00673"},{"key":"e_1_3_2_1_26_1","volume-title":"ICML","author":"Yoon J.","year":"2021","unstructured":"Yoon, J., Hwang, S. J., and Lee, J. Adversarial purification with score-based generative models. In ICML (2021)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5244\/C.30.87"},{"key":"e_1_3_2_1_28_1","volume-title":"ICLR","author":"Zhang H.","year":"2020","unstructured":"Zhang, H., Chen, H., Xiao, C., Gowal, S., Stanforth, R., Li, B., Boning, D., and Hsieh, C.-J. Towards stable and efficient training of verifiably robust neural networks. In ICLR (2020)."}],"event":{"name":"IVSP 2024: 2024 6th International Conference on Image, Video and Signal Processing","acronym":"IVSP 2024","location":"Ikuta Japan"},"container-title":["2024 6th International Conference on Image Video and Signal Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3655755.3655782","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3655755.3655782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T20:06:37Z","timestamp":1756238797000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3655755.3655782"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,14]]},"references-count":28,"alternative-id":["10.1145\/3655755.3655782","10.1145\/3655755"],"URL":"https:\/\/doi.org\/10.1145\/3655755.3655782","relation":{},"subject":[],"published":{"date-parts":[[2024,3,14]]},"assertion":[{"value":"2024-06-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}