{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T01:10:25Z","timestamp":1755825025310,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100006374","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB2901500"],"award-info":[{"award-number":["2022YFB2901500"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1145\/3731715.3733469","type":"proceedings-article","created":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T18:29:43Z","timestamp":1750876183000},"page":"2008-2012","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Alternating Guided Training for Robust Adversarial Defense"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6586-4457","authenticated-orcid":false,"given":"Xinlei","family":"Liu","sequence":"first","affiliation":[{"name":"Information Engineering University, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7820-2962","authenticated-orcid":false,"given":"Chunlai","family":"Ma","sequence":"additional","affiliation":[{"name":"College of Electronic Engineering, National University of Defense Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0612-9257","authenticated-orcid":false,"given":"Bo","family":"Chen","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, China and National Key Laboratory of advanced communication networks, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7641-5622","authenticated-orcid":false,"given":"Tao","family":"Hu","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, China and Key Laboratory of Cyberspace Security, Ministry of Education of China, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2497-366X","authenticated-orcid":false,"given":"Hailong","family":"Ma","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, China and Key Laboratory of Cyberspace Security, Ministry of Education of China, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0094-5982","authenticated-orcid":false,"given":"Peng","family":"Yi","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, China and Key Laboratory of Cyberspace Security, Ministry of Education of China, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4090-1044","authenticated-orcid":false,"given":"Yiming","family":"Jiang","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, China and Key Laboratory of Cyberspace Security, Ministry of Education of China, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6522-2321","authenticated-orcid":false,"given":"Yuxiang","family":"Hu","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, China and National Key Laboratory of advanced communication networks, Zhengzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2025,6,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2022.3220190"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3652583.3658083"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASSW.2019.00012"},{"key":"e_1_3_2_1_7_1","volume-title":"Threat of Adversarial Attacks on Deep Learning in Computer Vision: Survey II. CoRR abs\/2108.00401","author":"Akhtar Naveed","year":"2021","unstructured":"Naveed Akhtar, Ajmal Mian, Navid Kardan, and Mubarak Shah. 2021. Threat of Adversarial Attacks on Deep Learning in Computer Vision: Survey II. CoRR abs\/2108.00401 (2021). arXiv:2108.00401"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111778"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-024-01455-7"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-024-01770-z"},{"key":"e_1_3_2_1_11_1","volume-title":"2017 International Conference on Learning Representations (ICLR). OpenReview.net.","author":"Kurakin Alexey","year":"2017","unstructured":"Alexey Kurakin, Ian J. Goodfellow, and Samy Bengio. 2017. Adversarial examples in the physical world. In 2017 International Conference on Learning Representations (ICLR). OpenReview.net."},{"key":"e_1_3_2_1_12_1","volume-title":"2020 International Conference on Machine Learning (ICML)","volume":"119","author":"Croce Francesco","year":"2020","unstructured":"Francesco Croce and Matthias Hein. 2020. Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In 2020 International Conference on Machine Learning (ICML), Vol. 119. PMLR, 2206--2216."},{"key":"e_1_3_2_1_13_1","volume-title":"Explaining and Harnessing Adversarial Examples. In 2015 International Conference on Learning Representations (ICLR), Yoshua Bengio and Yann LeCun (Eds.).","author":"Goodfellow Ian J.","year":"2015","unstructured":"Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In 2015 International Conference on Learning Representations (ICLR), Yoshua Bengio and Yann LeCun (Eds.)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00191"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2023.03.008"},{"key":"e_1_3_2_1_17_1","volume-title":"UNet: A Nested U-Net Architecture for Medical Image Segmentation. In 4th Deep Learning in Medical Image Analysis (DLMIA) Workshop.","author":"Zhou Zongwei","year":"2018","unstructured":"Zongwei Zhou, Md Mahfuzur Rahman Siddiquee, Nima Tajbakhsh, and Jianming Liang. 2018. UNet: A Nested U-Net Architecture for Medical Image Segmentation. In 4th Deep Learning in Medical Image Analysis (DLMIA) Workshop."},{"key":"e_1_3_2_1_18_1","volume-title":"2018 International Conference on Learning Representations (ICLR). OpenReview.net.","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In 2018 International Conference on Learning Representations (ICLR). OpenReview.net."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19772-7_35"},{"key":"e_1_3_2_1_21_1","volume-title":"The Tenth International Conference on Learning Representations, ICLR 2022","author":"Huang Yi","year":"2022","unstructured":"Yi Huang and Adams Wai-Kin Kong. 2022. Transferable Adversarial Attack based on Integrated Gradients. In The Tenth International Conference on Learning Representations, ICLR 2022, Virtual Event, April 25-29, 2022. OpenReview.net."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00414"}],"event":{"name":"ICMR '25: International Conference on Multimedia Retrieval","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Chicago IL USA","acronym":"ICMR '25"},"container-title":["Proceedings of the 2025 International Conference on Multimedia Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3731715.3733469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T04:13:41Z","timestamp":1755749621000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3731715.3733469"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":22,"alternative-id":["10.1145\/3731715.3733469","10.1145\/3731715"],"URL":"https:\/\/doi.org\/10.1145\/3731715.3733469","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]},"assertion":[{"value":"2025-06-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}