{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T16:40:18Z","timestamp":1756831218153,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,23]]},"DOI":"10.1145\/3745812.3745886","type":"proceedings-article","created":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T13:55:58Z","timestamp":1756821358000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Advancements in Defense Mechanisms against Adversarial Attacks in Computer Vision"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4159-9094","authenticated-orcid":false,"given":"Satish Shankar Rao","family":"Banait","sequence":"first","affiliation":[{"name":"Sandip University, Sandip University, Nashik, Maharashtra, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2963-0714","authenticated-orcid":false,"given":"Anish","family":"C M","sequence":"additional","affiliation":[{"name":"MCA Computer Lab, National Institute of Technology Raipur, Raipur, Chhattisgarh, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9872-0833","authenticated-orcid":false,"given":"Madhumay","family":"Sen","sequence":"additional","affiliation":[{"name":"Computer Science and Applications, Vivekananda Global University, Jaipur, Rajasthan, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3197-5583","authenticated-orcid":false,"given":"Dipannita","family":"Mondal","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence and Data Science, Dr. D.Y. Patil College of Engineering and Innovation, Nagpur, Maharashtra, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6340-2993","authenticated-orcid":false,"given":"Dharmesh","family":"Dhabliya","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Vishwakarma Institute of Technology, Pune, Maharashtra, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9870-7076","authenticated-orcid":false,"given":"Jambi Ratna Raja","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Genba Sopanrao Moze College of Engineering, Pune, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2025,9,2]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460975"},{"key":"e_1_3_3_1_2_2","volume-title":"Proceedings of the 2nd ACM","author":"Mohan S.","unstructured":"S. Mohan, S. Bak, E. Betti, H. Yun, L. Sha and M. Caccamo, \"S3a: Secure system simplex architecture for enhanced security and robustness of cyber-physical systems\", Proceedings of the 2nd ACM"},{"key":"e_1_3_3_1_3_2","volume-title":"conference on High confidence networked systems","year":"2013","unstructured":"international conference on High confidence networked systems, 2013."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01295"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2921977"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.3390\/app8122416"},{"key":"e_1_3_3_1_7_2","volume-title":"Biologically inspired protection of deep networks from adversarial attacks. arXiv","author":"Nayebi A.","year":"2017","unstructured":"Nayebi, A.; Ganguli, S. Biologically inspired protection of deep networks from adversarial attacks. arXiv, 2017; arXiv:1703.09202."},{"key":"e_1_3_3_1_8_2","volume-title":"Dense Associative Memory is Robust to Adversarial Inputs. arXiv","author":"Krotov D.","year":"2017","unstructured":"Krotov, D.; Hopfield, J.J. Dense Associative Memory is Robust to Adversarial Inputs. arXiv, 2017; arXiv:1701.00939."},{"key":"e_1_3_3_1_9_2","volume-title":"Houdini: Fooling deep structured prediction models. arXiv","author":"Cisse M.","year":"2017","unstructured":"Cisse, M.; Adi, Y.; Neverova, N.; Keshet, J. Houdini: Fooling deep structured prediction models. arXiv, 2017; arXiv:1707.05373."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2019.8794182"},{"key":"e_1_3_3_1_11_2","volume-title":"International Conference on Learning Representations","author":"Buckman A.","year":"2018","unstructured":"J. Buckman, A. Roy, C. Raffel and I. Goodfellow, \"Thermometer encoding: One hot way to resist adversarial examples\", International Conference on Learning Representations, 2018."},{"key":"e_1_3_3_1_12_2","first-page":"09","article-title":"Image super-resolution as a defense against adversarial attacks","volume":"1","author":"Mustafa S.","year":"2019","unstructured":"Mustafa, S. Khan, M. Hayat, J. Shen and L. Shao, \"Image super-resolution as a defense against adversarial attacks\", IEEE Transactions on Image Processing, vol. PP, pp. 1-1, 09 2019.","journal-title":"IEEE Transactions on Image Processing"},{"key":"e_1_3_3_1_13_2","volume-title":"16th European Conference","volume":"12350","author":"Xu G.","year":"2020","unstructured":"K. Xu, G. Zhang, S. Liu, Q. Fan, M. Sun, H. Chen, et al., \"Adversarial t-shirt! evading person detectors in a physical world\", 16th European Conference, vol. 12350, 2020."},{"key":"e_1_3_3_1_14_2","volume-title":"International Conference on Learning Representations","author":"Zhang H.","year":"2019","unstructured":"Y. Zhang, H. Foroosh, P. David and B. Gong, \"CAMOU: Learning physical vehicle camouflages to adversarially attack detectors in the wild\", International Conference on Learning Representations, 2019."},{"key":"e_1_3_3_1_15_2","volume-title":"Cybersecurity","author":"Sun M.","year":"2018","unstructured":"L. Sun, M. Tan and Z. Zhou, \"A survey of practical adversarial example attacks\", Cybersecurity, 2018."},{"key":"e_1_3_3_1_16_2","volume-title":"A survey on physical adversarial attack in computer vision\", preprint arXiv:2209.14262","author":"Wang W.","year":"2022","unstructured":"D. Wang, W. Yao, T. Jiang, G. Tang and X. Chen, \"A survey on physical adversarial attack in computer vision\", preprint arXiv:2209.14262, 2022."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01455"},{"key":"e_1_3_3_1_18_2","volume-title":"Carlagear: a dataset generator for a systematic evaluation of adversarial robustness of vision models","author":"Nesti G.","year":"2022","unstructured":"F. Nesti, G. Rossolini, G. D'Amico, A. Biondi and G. Buttazzo, \"Carlagear: a dataset generator for a systematic evaluation of adversarial robustness of vision models\", 2022."},{"key":"e_1_3_3_1_19_2","first-page":"1","article-title":"On the real-world adversarial robustness of real-time semantic segmentation models for autonomous driving","author":"Rossolini F.","year":"2023","unstructured":"G. Rossolini, F. Nesti, G. D'Amico, S. Nair, A. Biondi and G. Buttazzo, \"On the real-world adversarial robustness of real-time semantic segmentation models for autonomous driving\", IEEE Transactions on Neural Networks and Learning Systems, pp. 1-15, 2023.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"e_1_3_3_1_20_2","first-page":"283","volume-title":"Applications for Computer Vision*, vol., no","author":"Kumar M.","year":"2023","unstructured":"[19][20]Kumar M.; Bhola A.; Tiwari A.; Gulhane M., \"Face and Iris-based secured authorization model using CNN,\" *Multimodal Biometric and Machine Learning Technologies: Applications for Computer Vision*, vol., no., pp. 283-299, 2023."},{"key":"e_1_3_3_1_21_2","first-page":"269","volume-title":"Applications for Computer Vision*, vol., no","author":"Choudhary S.","year":"2023","unstructured":"Choudhary S.; Kumar S.; Gulhane M.; Kumar M., \"Secured automated certificate creation based on multimodal biometric verification,\" *Multimodal Biometric and Machine Learning Technologies: Applications for Computer Vision*, vol., no., pp. 269-281, 2023."}],"event":{"name":"ICIMMI 2024: 6th INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT & MACHINE INTELLIGENCE","location":"Jaipur RJ India","acronym":"ICIMMI 2024"},"container-title":["Proceedings of the 6th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3745812.3745886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T16:17:59Z","timestamp":1756829879000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3745812.3745886"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,23]]},"references-count":21,"alternative-id":["10.1145\/3745812.3745886","10.1145\/3745812"],"URL":"https:\/\/doi.org\/10.1145\/3745812.3745886","relation":{},"subject":[],"published":{"date-parts":[[2024,12,23]]},"assertion":[{"value":"2025-09-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}