{"id":"https://openalex.org/W4402917131","doi":"https://doi.org/10.1109/icip51287.2024.10647385","title":"LFGN: Low-Level Feature-Guided Network For Adversarial Defense","display_name":"LFGN: Low-Level Feature-Guided Network For Adversarial Defense","publication_year":2024,"publication_date":"2024-09-27","ids":{"openalex":"https://openalex.org/W4402917131","doi":"https://doi.org/10.1109/icip51287.2024.10647385"},"language":"en","primary_location":{"id":"doi:10.1109/icip51287.2024.10647385","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icip51287.2024.10647385","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Image Processing (ICIP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007305393","display_name":"Chih\u2013Chung Hsu","orcid":"https://orcid.org/0000-0002-2083-4438"},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Chih-Chung Hsu","raw_affiliation_strings":["National Cheng Kung University Institute of Data Science and Department of Statistics No. 1, University Rd.,Tainan,Taiwan"],"affiliations":[{"raw_affiliation_string":"National Cheng Kung University Institute of Data Science and Department of Statistics No. 1, University Rd.,Tainan,Taiwan","institution_ids":["https://openalex.org/I91807558"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109776524","display_name":"Ming-Hsuan Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ming-Hsuan Wu","raw_affiliation_strings":["National Cheng Kung University Institute of Data Science and Department of Statistics No. 1, University Rd.,Tainan,Taiwan"],"affiliations":[{"raw_affiliation_string":"National Cheng Kung University Institute of Data Science and Department of Statistics No. 1, University Rd.,Tainan,Taiwan","institution_ids":["https://openalex.org/I91807558"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010638518","display_name":"Enchao Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"En-Chao Liu","raw_affiliation_strings":["National Cheng Kung University Institute of Data Science and Department of Statistics No. 1, University Rd.,Tainan,Taiwan"],"affiliations":[{"raw_affiliation_string":"National Cheng Kung University Institute of Data Science and Department of Statistics No. 1, University Rd.,Tainan,Taiwan","institution_ids":["https://openalex.org/I91807558"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5007305393"],"corresponding_institution_ids":["https://openalex.org/I91807558"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14443229,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"30","issue":null,"first_page":"563","last_page":"567"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9549999833106995,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8756752014160156},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.711305558681488},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.6707367300987244},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37475070357322693},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35962986946105957}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8756752014160156},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.711305558681488},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.6707367300987244},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37475070357322693},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35962986946105957},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icip51287.2024.10647385","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icip51287.2024.10647385","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Image Processing (ICIP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320309618","display_name":"Ministry of Science and Technology","ror":"https://ror.org/02b207r52"},{"id":"https://openalex.org/F4320316499","display_name":"National Applied Research Laboratories","ror":"https://ror.org/05wcstg80"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1673923490","https://openalex.org/W1996550590","https://openalex.org/W2031614119","https://openalex.org/W2034139177","https://openalex.org/W2039051707","https://openalex.org/W2131081720","https://openalex.org/W2147141800","https://openalex.org/W2243397390","https://openalex.org/W2620038827","https://openalex.org/W2768346313","https://openalex.org/W2891158090","https://openalex.org/W2962700793","https://openalex.org/W2962821226","https://openalex.org/W2962872506","https://openalex.org/W2963542245","https://openalex.org/W3013520104","https://openalex.org/W3171288285","https://openalex.org/W3196506678","https://openalex.org/W6640425456","https://openalex.org/W6738369334","https://openalex.org/W6739868092","https://openalex.org/W6745272055","https://openalex.org/W6747536865","https://openalex.org/W6748475379","https://openalex.org/W6753216052","https://openalex.org/W6769767596","https://openalex.org/W6774469542","https://openalex.org/W6780302432"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W2619203976"],"abstract_inverted_index":{"Adversarial":[0],"attacks":[1,121],"cause":[2],"deep":[3,150],"learning":[4,90],"models":[5],"to":[6,30,126,147,165,175],"fail,":[7],"which":[8,51,160],"presents":[9],"a":[10,36,62,88],"significant":[11],"challenge":[12],"in":[13,194],"the":[14,17,58,97,112,117,177,180,187],"field.":[15],"Consequently,":[16],"development":[18],"of":[19,119,179],"adversarial":[20,33,43,49,107,120,158,182],"defense":[21,27,38,44,167,183,196],"techniques":[22],"has":[23],"become":[24],"crucial.":[25],"Current":[26],"strategies":[28],"struggle":[29],"effectively":[31],"address":[32],"attacks,":[34],"making":[35,81],"robust":[37,69],"strategy":[39],"highly":[40],"desirable.":[41],"State-of-the-art":[42],"schemes":[45],"mainly":[46],"rely":[47],"on":[48],"training,":[50,80],"requires":[52,78],"massive":[53],"computational":[54],"resources.":[55],"Another":[56],"strategy,":[57],"transformbased":[59],"approach,":[60],"is":[61,124],"faster":[63],"and":[64,102,138,173,185,192],"more":[65],"efficient":[66],"way":[67],"for":[68,99,106,115,157],"model":[70],"design.":[71],"The":[72],"current":[73],"state-of-the-art":[74,104],"method,":[75],"Deepimage-prior-based":[76],"(DIP),":[77],"online":[79],"fast":[82,100],"inference":[83,101],"impossible.":[84],"This":[85],"paper":[86],"proposes":[87],"novel":[89],"pipeline":[91],"incorporating":[92],"conventional":[93],"low-level":[94,131,155],"features":[95,156],"as":[96,135],"transform":[98],"achieving":[103],"performance":[105,191],"defense.":[108],"First,":[109],"we":[110],"discover":[111],"feature":[113,132],"transformation":[114],"reducing":[116],"impact":[118],"since":[122],"it":[123],"hard":[125],"approximate":[127],"using":[128],"gradients.":[129],"Conventional":[130],"extraction,":[133],"such":[134],"local":[136],"binary":[137],"ternary":[139],"patterns,":[140],"perfectly":[141],"fits":[142],"this":[143],"requirement,":[144],"allowing":[145],"us":[146],"combine":[148],"moderate":[149],"neural":[151],"networks":[152],"with":[153],"traditional":[154],"defense,":[159],"could":[161],"easily":[162],"be":[163],"extended":[164],"existing":[166],"methods.":[168],"We":[169],"conduct":[170],"comprehensive":[171],"experiments":[172],"analyses":[174],"demonstrate":[176],"superiority":[178],"proposed":[181],"scheme":[184],"achieve":[186],"best":[188],"trade-off":[189],"between":[190],"efficiency":[193],"real-world":[195],"scenarios.":[197]},"counts_by_year":[],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
