{"id":"https://openalex.org/W4415968377","doi":"https://doi.org/10.1109/tifs.2025.3629619","title":"Toward Defending Adversarial Patch Attacks With Mask-Reconstruction-Assisted Adversarial Training","display_name":"Toward Defending Adversarial Patch Attacks With Mask-Reconstruction-Assisted Adversarial Training","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4415968377","doi":"https://doi.org/10.1109/tifs.2025.3629619"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2025.3629619","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3629619","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113333643","display_name":"Hongshan Yang","orcid":"https://orcid.org/0000-0002-5899-0962"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongshan Yang","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, the School of Cyber Science and Technology, and the College of Computer Science and Technology, Zhejiang University, Hangzhou, China","School of Cyber Science and Technology, and the College of Computer Science and Technology, State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, the School of Cyber Science and Technology, and the College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"School of Cyber Science and Technology, and the College of Computer Science and Technology, State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112454411","display_name":"Z. Li","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhichao Li","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, the School of Cyber Science and Technology, and the College of Computer Science and Technology, Zhejiang University, Hangzhou, China","School of Cyber Science and Technology, and the College of Computer Science and Technology, State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, the School of Cyber Science and Technology, and the College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"School of Cyber Science and Technology, and the College of Computer Science and Technology, State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100422345","display_name":"Zhibo Wang","orcid":"https://orcid.org/0000-0002-5804-3279"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhibo Wang","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, the School of Cyber Science and Technology, and the College of Computer Science and Technology, Zhejiang University, Hangzhou, China","School of Cyber Science and Technology, and the College of Computer Science and Technology, State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, the School of Cyber Science and Technology, and the College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"School of Cyber Science and Technology, and the College of Computer Science and Technology, State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089450416","display_name":"Peng Sun","orcid":"https://orcid.org/0000-0001-6221-8142"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Sun","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, China","College of Cyber Science and Technology, Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]},{"raw_affiliation_string":"College of Cyber Science and Technology, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008967163","display_name":"Zhixuan Chu","orcid":"https://orcid.org/0000-0001-6075-1816"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhixuan Chu","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, the School of Cyber Science and Technology, and the College of Computer Science and Technology, Zhejiang University, Hangzhou, China","School of Cyber Science and Technology, and the College of Computer Science and Technology, State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, the School of Cyber Science and Technology, and the College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"School of Cyber Science and Technology, and the College of Computer Science and Technology, State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078406349","display_name":"Feng Lin","orcid":"https://orcid.org/0000-0001-5240-5200"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Lin","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, the School of Cyber Science and Technology, and the College of Computer Science and Technology, Zhejiang University, Hangzhou, China","School of Cyber Science and Technology, and the College of Computer Science and Technology, State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, the School of Cyber Science and Technology, and the College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"School of Cyber Science and Technology, and the College of Computer Science and Technology, State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5113333643"],"corresponding_institution_ids":["https://openalex.org/I55712492","https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18134281,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"12476","last_page":"12490"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.00019999999494757503,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.00019999999494757503,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.9599999785423279},{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.6528000235557556},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6096000075340271},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.41449999809265137},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.3873000144958496},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.3862999975681305},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.36160001158714294}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.9599999785423279},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8011999726295471},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.6528000235557556},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6360999941825867},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6096000075340271},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45829999446868896},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.41449999809265137},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3873000144958496},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3862999975681305},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.36160001158714294},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.31940001249313354},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3156999945640564},{"id":"https://openalex.org/C27158222","wikidata":"https://www.wikidata.org/wiki/Q5532422","display_name":"Generalizability theory","level":2,"score":0.31200000643730164},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.29010000824928284},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.2793000042438507},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.2720000147819519},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.26910001039505005},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2623000144958496},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.25839999318122864}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3629619","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3629619","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1861492603","https://openalex.org/W1970548724","https://openalex.org/W2067713319","https://openalex.org/W2108598243","https://openalex.org/W2194775991","https://openalex.org/W2535873859","https://openalex.org/W2774644650","https://openalex.org/W2902867332","https://openalex.org/W2932026309","https://openalex.org/W2962700793","https://openalex.org/W2963302614","https://openalex.org/W2963446712","https://openalex.org/W2963726920","https://openalex.org/W2963839617","https://openalex.org/W2963857521","https://openalex.org/W2964137095","https://openalex.org/W3017485054","https://openalex.org/W3035447895","https://openalex.org/W3097573595","https://openalex.org/W3107990944","https://openalex.org/W3113588330","https://openalex.org/W3114686421","https://openalex.org/W3128390792","https://openalex.org/W3179647175","https://openalex.org/W3186991201","https://openalex.org/W3191453585","https://openalex.org/W3204155906","https://openalex.org/W3211999566","https://openalex.org/W4213360524","https://openalex.org/W4221139075","https://openalex.org/W4226232092","https://openalex.org/W4285602482","https://openalex.org/W4312610155","https://openalex.org/W4312804044","https://openalex.org/W4313156423","https://openalex.org/W4320004351","https://openalex.org/W4386071495","https://openalex.org/W4386072059","https://openalex.org/W4386076505","https://openalex.org/W4386221015","https://openalex.org/W4391725251","https://openalex.org/W4393160451"],"related_works":[],"abstract_inverted_index":{"Adversarial":[0,67],"patch":[1,214],"attacks":[2,215],"pose":[3],"a":[4,64,120,138],"significant":[5],"threat":[6],"to":[7,19,45,51,71,103,119,155,186],"deep":[8],"learning":[9],"models":[10],"in":[11,197],"real-world":[12],"applications,":[13],"such":[14,35],"as":[15,36],"autonomous":[16],"driving,":[17],"due":[18],"their":[20,182],"physical":[21,201],"feasibility":[22],"and":[23,168,190,200],"ease":[24],"of":[25,40,123,159,175,181],"deployment.":[26],"Although":[27],"several":[28],"defenses":[29],"exist,":[30],"they":[31],"often":[32],"have":[33],"limitations,":[34],"requiring":[37],"prior":[38],"knowledge":[39],"adversarial":[41,76,88,101,110,124,134,143,160,176,213],"patches,":[42],"being":[43],"tied":[44],"specific":[46,121],"model":[47,73,116],"architectures,":[48],"or":[49],"struggling":[50],"balance":[52],"robustness":[53,74],"with":[54,100],"accuracy":[55,128,219],"on":[56,129,220],"clean":[57,104,130,157,221],"inputs.":[58,222],"In":[59],"this":[60],"work,":[61],"we":[62,84,136],"propose":[63],"novel":[65],"Mask-Reconstruction-assisted":[66],"Training":[68],"(MRAT)":[69],"framework":[70],"enhance":[72],"against":[75,212],"patches":[77],"while":[78,132,216],"preserving":[79],"accuracy.":[80,193],"To":[81,126],"achieve":[82],"this,":[83],"first":[85],"develop":[86],"an":[87],"example":[89],"generation":[90],"method":[91],"that":[92,204],"applies":[93],"masks":[94],"comprising":[95],"randomly":[96],"positioned":[97],"square":[98],"blocks":[99],"perturbations":[102],"images.":[105],"This":[106,146],"technique":[107],"generates":[108],"diverse":[109],"examples":[111,177],"for":[112],"training,":[113],"preventing":[114],"the":[115,153,165,169,172,208],"from":[117,152],"overfitting":[118],"type":[122],"patch.":[125],"maintain":[127],"inputs":[131],"enhancing":[133],"robustness,":[135],"incorporate":[137],"mask-reconstruction":[139],"task":[140,147],"into":[141],"standard":[142],"training":[144],"paradigms.":[145],"utilizes":[148],"feature":[149,173,188],"representations":[150,174],"extracted":[151],"backbone":[154],"reconstruct":[156],"versions":[158],"examples.":[161],"By":[162],"jointly":[163],"optimizing":[164],"reconstruction":[166],"network":[167],"classification":[170,192],"model,":[171],"retain":[178],"essential":[179],"features":[180],"original":[183],"images,":[184],"leading":[185],"robust":[187],"extraction":[189],"high":[191,218],"Extensive":[194],"experimental":[195],"results":[196],"both":[198],"digital":[199],"domains":[202],"demonstrate":[203],"MRAT":[205],"significantly":[206],"enhances":[207],"model\u2019s":[209],"defensive":[210],"performance":[211],"maintaining":[217],"Our":[223],"code":[224],"is":[225],"available":[226],"at:":[227],"https://github.com/wanggroupAI/AI_Security/tree/main/Adversarial%20Example/MRAT.":[228]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-06T00:00:00"}
