{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:47:07Z","timestamp":1768294027180,"version":"3.49.0"},"reference-count":36,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.056075","type":"journal-article","created":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T07:55:26Z","timestamp":1727682926000},"page":"1235-1250","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["Adversarial Defense Technology for Small Infrared Targets"],"prefix":"10.32604","volume":"81","author":[{"given":"Tongan","family":"Yu","sequence":"first","affiliation":[]},{"given":"Yali","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Yiming","family":"He","sequence":"additional","affiliation":[]},{"given":"Shan","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Hong","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","series-title":"2014 Int. Conf. Learn. Rep. (ICLR)","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"Apr. 2014"},{"key":"ref2","series-title":"2019 Proc. IEEE\/CVF Int. Conf. Comput. Vis. (ICCV)","first-page":"4928","article-title":"Defending against universal perturbations with shared adversarial training","author":"Mummadi","year":"Nov. 2019"},{"key":"ref3","series-title":"2014 Int. Conf. Learn. Rep. (ICLR)","article-title":"Towards deep neural network architectures robust to adversarial examples","author":"Gu","year":"Apr. 2014"},{"key":"ref4","unstructured":"R. Feinman, R. Ryan, S. S. Curtin, and A. B. Gardner, \u201cDetecting adversarial samples from artifacts,\u201d 2017. doi: 10.48550\/arXiv.1703.00410."},{"key":"ref5","series-title":"2018 Int. Conf. Learn. Rep. (ICLR)","article-title":"Defense-GAN: Protecting classifiers against adversarial attacks using generative models","author":"Samangouei","year":"Apr. 2018"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.118957","article-title":"Collaborative Defense-GAN for protecting adversarial attacks on classification system","volume":"214","author":"Laykaviriyakul","year":"2023","journal-title":"Expert. Syst. Appl."},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1016\/j.image.2022.116659","article-title":"Learning perturbations for adversarial defense based on GAN structure","volume":"103","author":"Liang","year":"2022","journal-title":"Signal Process. Image"},{"key":"ref8","series-title":"2020 Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","first-page":"262","article-title":"A self-supervised approach for adversarial robustness","author":"Naseer","year":"Jun. 2020"},{"key":"ref9","series-title":"2014 Int. Conf. Learn. Rep. (ICLR)","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"Apr. 2015"},{"key":"ref10","series-title":"2016 Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR)","first-page":"2574","article-title":"DeepFool: A simple and accurate method to fool deep neural networks","author":"Moosavi-Dezfooli","year":"Jun. 2016"},{"key":"ref11","series-title":"2018 Int. Conf. Learn. Rep. (ICLR)","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"Apr. 2018"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1201\/9781351251389-8","article-title":"Adversarial examples in the physical world","volume":"1","author":"Kurakin","year":"2018","journal-title":"Artificial Intelligence Safety and Security"},{"key":"ref13","series-title":"2018 Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR)","first-page":"9185","article-title":"Boosting adversarial attacks with momentum","author":"Dong","year":"Jun. 2018"},{"key":"ref14","series-title":"2016 IEEE Eur. Symp. Secur. Priv. (EuroS&P)","first-page":"372","article-title":"The limitations of deep learning in adversarial settings","author":"Papernot","year":"Mar. 2016"},{"key":"ref15","series-title":"2016 IEEE Symp. Secur. Priv. (SP)","first-page":"582","article-title":"Distillation as a defense to adversarial perturbations against deep neural networks","author":"Papernot","year":"May 2016"},{"key":"ref16","series-title":"2017 IEEE Symp. Secur. Priv. (SP)","first-page":"39","article-title":"Towards evaluating the robustness of neural networks","author":"Carlini","year":"Apr. 2017"},{"key":"ref17","series-title":"2022 Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR)","first-page":"14993","article-title":"Improving adversarial transferability via neuron attribution- based attacks","author":"Zhang","year":"Jun. 2022"},{"key":"ref18","series-title":"2022 Proc. 2022 IEEE Int. Conf. Image Process. (ICIP)","first-page":"546","article-title":"Query-efficient adversarial attack based on Latin hypercube sampling","author":"Wang","year":"May 2022"},{"key":"ref19","series-title":"2019 Adv. Neural Inf. Process. Syst. (NeurIPS)","first-page":"32","article-title":"Adversarial training for free!","author":"Shafahi","year":"Dec. 2019"},{"key":"ref20","series-title":"2019 Int. Conf. Mach. Learn. (ICML)","first-page":"7472","article-title":"Theoretically principled trade-off between robustness and accuracy","author":"Zhang","year":"Jun. 2019"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"5769","DOI":"10.1109\/TIP.2021.3082317","article-title":"Training robust deep neural networks via adversarial noise propagation","volume":"30","author":"Liu","year":"2021","journal-title":"IEEE Trans. Image Process."},{"key":"ref22","series-title":"2017 Int. Conf. Learn. Rep. (ICLR)","article-title":"mixup: Beyond empirical risk minimization","author":"Zhang","year":"2017"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1137\/22M1478835","article-title":"Adversarial robustness of sparse local lipschitz predictors","volume":"5","author":"Muthukumar","year":"2023","journal-title":"SIAM J. Math. Data Sci."},{"key":"ref24","series-title":"2018 Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR)","first-page":"1778","article-title":"Defense against adversarial attacks using high-level representation guided denoiser","author":"Liao","year":"Jun. 2018"},{"key":"ref25","series-title":"2019 Proc. IEEE Conf. Comput. Vis. Pattern Recognit.(CVPR)","first-page":"8767","article-title":"Defense against adversarial images using web-scale nearest-neighbor search","author":"Dubey","year":"Jun. 2019"},{"key":"ref26","series-title":"2019 IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP)","first-page":"3842","article-title":"Ape-gan: Adversarial perturbation elimination with gan","author":"Jin","year":"May 2019"},{"key":"ref27","article-title":"Evaluation of GAN-based model for adversarial training","volume":"23","author":"Zhao","year":"2023","journal-title":"Sensors"},{"key":"ref28","series-title":"2018 Proc. Eur. Conf. Comput. Vis. (ECCV)","first-page":"3","article-title":"CBAM: Convolutional block attention module","author":"Sanghyun","year":"Sep. 2018"},{"key":"ref29","article-title":"Infrared small target detection based on cascaded nested U-Net","author":"Xue","year":"2023","journal-title":"J Jilin Univ. (Eng. Technol. Ed.)"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"9813","DOI":"10.1109\/TGRS.2020.3044958","article-title":"Attentional local contrast networks for infrared small target detection","volume":"59","author":"Dai","year":"2021","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref31","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1109\/TIP.2022.3228497","article-title":"UIU-Net: U-Net in U-Net for infrared small object detection","volume":"32","author":"Wu","year":"2023","journal-title":"IEEE Trans. Image Process."},{"key":"ref32","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.1109\/TIP.2022.3199107","article-title":"Dense nested attention network for infrared small target detection","volume":"32","author":"Li","year":"2023","journal-title":"IEEE Trans. Image Process."},{"key":"ref33","series-title":"Proc. 10th ACM Workshop Artif. Intell. Secur.","first-page":"15","article-title":"ZOO: Zeroth order optimization based black-box attacks to deep neural networks without training substitute models","author":"Chen","year":"2017"},{"key":"ref34","series-title":"2018 Int. Conf. Learn. Rep. (ICLR)","first-page":"1","article-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models","author":"Brendel","year":"Apr. 2018"},{"key":"ref35","series-title":"2020 Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR)","first-page":"1241","article-title":"Learn2Perturb: An end-to-end feature perturbation learning to improve adversarial robustness","author":"Ahmadreza","year":"Jun. 2020"},{"key":"ref36","series-title":"2019 Proc. IEEE\/CVF Int. Conf. Comput. Vis. (ICCV)","first-page":"8509","author":"Wang","year":"Nov. 2019"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_56075\/TSP_CMC_56075.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T03:00:46Z","timestamp":1741316446000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58359"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.056075","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-07-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-03","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}