{"id":"https://openalex.org/W4406860135","doi":"https://doi.org/10.1109/vcip63160.2024.10849849","title":"Image Forensics Strikes Back: Defense Against Adversarial Patch","display_name":"Image Forensics Strikes Back: Defense Against Adversarial Patch","publication_year":2024,"publication_date":"2024-12-08","ids":{"openalex":"https://openalex.org/W4406860135","doi":"https://doi.org/10.1109/vcip63160.2024.10849849"},"language":"en","primary_location":{"id":"doi:10.1109/vcip63160.2024.10849849","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vcip63160.2024.10849849","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Visual Communications and Image Processing (VCIP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047429221","display_name":"Ching-Chia Kao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210098366","display_name":"Institute of Information Science, Academia Sinica","ror":"https://ror.org/00z83z196","country_code":"TW","type":"facility","lineage":["https://openalex.org/I4210098366","https://openalex.org/I84653119"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Ching-Chia Kao","raw_affiliation_strings":["Academia Sinica,Institute of Information Science (IIS),ROC"],"affiliations":[{"raw_affiliation_string":"Academia Sinica,Institute of Information Science (IIS),ROC","institution_ids":["https://openalex.org/I4210098366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110517187","display_name":"Chun\u2010Shien Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210098366","display_name":"Institute of Information Science, Academia Sinica","ror":"https://ror.org/00z83z196","country_code":"TW","type":"facility","lineage":["https://openalex.org/I4210098366","https://openalex.org/I84653119"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chun-Shien Lu","raw_affiliation_strings":["Academia Sinica,Institute of Information Science (IIS),ROC"],"affiliations":[{"raw_affiliation_string":"Academia Sinica,Institute of Information Science (IIS),ROC","institution_ids":["https://openalex.org/I4210098366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088964025","display_name":"Chia\u2010Mu Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chia-Mu Yu","raw_affiliation_strings":["National Yang Ming Chiao Tung University,ROC"],"affiliations":[{"raw_affiliation_string":"National Yang Ming Chiao Tung University,ROC","institution_ids":["https://openalex.org/I148366613"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5047429221"],"corresponding_institution_ids":["https://openalex.org/I4210098366"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27397175,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13114","display_name":"Image Processing Techniques and Applications","score":0.911300003528595,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12859","display_name":"Cell Image Analysis Techniques","score":0.9110999703407288,"subfield":{"id":"https://openalex.org/subfields/1304","display_name":"Biophysics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8778539299964905},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.641062319278717},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6250470280647278},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.4716210663318634},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34053146839141846},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.32600486278533936},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.20225709676742554}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8778539299964905},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.641062319278717},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6250470280647278},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.4716210663318634},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34053146839141846},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.32600486278533936},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.20225709676742554}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vcip63160.2024.10849849","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vcip63160.2024.10849849","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Visual Communications and Image Processing (VCIP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"display_name":"Gender equality","id":"https://metadata.un.org/sdg/5"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320331164","display_name":"National Science and Technology Council","ror":"https://ror.org/00wnb9798"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1861492603","https://openalex.org/W1901129140","https://openalex.org/W2169439181","https://openalex.org/W2194775991","https://openalex.org/W2607219512","https://openalex.org/W2798117183","https://openalex.org/W2909929587","https://openalex.org/W2955058313","https://openalex.org/W2962731543","https://openalex.org/W2962951509","https://openalex.org/W2963302614","https://openalex.org/W3094728142","https://openalex.org/W3107956775","https://openalex.org/W3154575015","https://openalex.org/W3174508664","https://openalex.org/W3204155906","https://openalex.org/W3204170321","https://openalex.org/W3206976809","https://openalex.org/W4226232092","https://openalex.org/W4283817039","https://openalex.org/W4293846201","https://openalex.org/W4319301003","https://openalex.org/W4386038437","https://openalex.org/W4386071495","https://openalex.org/W4391725251","https://openalex.org/W4402727695","https://openalex.org/W4402754000","https://openalex.org/W6620707391","https://openalex.org/W6741036071","https://openalex.org/W6747706139","https://openalex.org/W6751839145","https://openalex.org/W6800565261","https://openalex.org/W6860309532"],"related_works":["https://openalex.org/W2772917594","https://openalex.org/W2036807459","https://openalex.org/W2058170566","https://openalex.org/W2755342338","https://openalex.org/W2166024367","https://openalex.org/W3116076068","https://openalex.org/W2229312674","https://openalex.org/W2951359407","https://openalex.org/W2079911747","https://openalex.org/W1969923398"],"abstract_inverted_index":{"Traffic":[0],"sign":[1],"recognition":[2],"plays":[3],"a":[4,43,88,122],"crucial":[5],"role":[6],"in":[7,26,63],"self-driving":[8],"cars,":[9],"but":[10],"unfortunately,":[11],"it":[12],"is":[13,54],"vulnerable":[14],"to":[15,39,55,90,117],"adversarial":[16,93],"patches":[17,94],"(AP).":[18],"Although":[19],"AP":[20,35,141],"can":[21],"efficiently":[22],"fool":[23],"DNN-based":[24],"models":[25],"previous":[27],"studies,":[28],"the":[29,51,64,106,119],"connection":[30],"between":[31],"image":[32],"forensics":[33],"and":[34,59,134],"detection":[36,74,142],"still":[37],"needs":[38],"be":[40],"explored.":[41],"From":[42],"high-level":[44],"point":[45],"of":[46,121],"view,":[47],"their":[48],"goals":[49],"are":[50],"same.":[52],"That":[53],"find":[56],"tampered":[57,100],"regions":[58],"prevent":[60],"false":[61],"positives":[62],"meantime.":[65],"A":[66],"natural":[67],"question":[68],"arises:":[69],"\"Is":[70],"achieving":[71],"application-agnostic":[72],"anomaly":[73],"possible?\"":[75],"In":[76,102],"this":[77],"paper,":[78],"we":[79,104],"propose":[80],"Image":[81],"Forensics":[82],"Defense":[83],"Against":[84],"Adversarial":[85],"Patch":[86],"(IDAP),":[87],"framework":[89],"defend":[91],"against":[92],"via":[95],"generalizable":[96],"features":[97],"learned":[98],"from":[99],"images.":[101],"addition,":[103],"incorporate":[105],"Hausdorff":[107],"erosion":[108],"loss":[109],"into":[110],"our":[111],"network":[112],"model":[113],"for":[114],"joint":[115],"training":[116],"complete":[118],"shape":[120],"predicted":[123],"mask.":[124],"Extensive":[125],"experimental":[126],"comparisons":[127],"on":[128],"three":[129],"datasets,":[130],"including":[131],"COCO,":[132],"DFG,":[133],"APRICOT":[135],"demonstrate":[136],"that":[137],"IDAP":[138],"outperforms":[139],"state-of-the-art":[140],"methods.":[143]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
