{"id":"https://openalex.org/W4413915887","doi":"https://doi.org/10.1145/3745812.3745886","title":"Advancements in Defense Mechanisms against Adversarial Attacks in Computer Vision","display_name":"Advancements in Defense Mechanisms against Adversarial Attacks in Computer Vision","publication_year":2024,"publication_date":"2024-12-23","ids":{"openalex":"https://openalex.org/W4413915887","doi":"https://doi.org/10.1145/3745812.3745886"},"language":"en","primary_location":{"id":"doi:10.1145/3745812.3745886","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3745812.3745886","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3745812.3745886","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015609133","display_name":"Satish S. Banait","orcid":null},"institutions":[{"id":"https://openalex.org/I2802982682","display_name":"Sandip Foundation","ror":"https://ror.org/04vhxp922","country_code":"IN","type":"education","lineage":["https://openalex.org/I2802982682"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Satish Shankar Rao Banait","raw_affiliation_strings":["Sandip University, Sandip University, Nashik, Maharashtra, India"],"raw_orcid":"https://orcid.org/0000-0002-4159-9094","affiliations":[{"raw_affiliation_string":"Sandip University, Sandip University, Nashik, Maharashtra, India","institution_ids":["https://openalex.org/I2802982682"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036404885","display_name":"C Anish","orcid":null},"institutions":[{"id":"https://openalex.org/I38335241","display_name":"National Institute of Technology Raipur","ror":"https://ror.org/02y553197","country_code":"IN","type":"education","lineage":["https://openalex.org/I38335241"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Anish C M","raw_affiliation_strings":["MCA Computer Lab, National Institute of Technology Raipur, Raipur, Chhattisgarh, India"],"raw_orcid":"https://orcid.org/0000-0002-2963-0714","affiliations":[{"raw_affiliation_string":"MCA Computer Lab, National Institute of Technology Raipur, Raipur, Chhattisgarh, India","institution_ids":["https://openalex.org/I38335241"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119513901","display_name":"Madhumay Sen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210125057","display_name":"Vivekananda Global University","ror":"https://ror.org/038mz4r36","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210125057"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Madhumay Sen","raw_affiliation_strings":["Computer Science and Applications, Vivekananda Global University, Jaipur, Rajasthan, India"],"raw_orcid":"https://orcid.org/0009-0002-9872-0833","affiliations":[{"raw_affiliation_string":"Computer Science and Applications, Vivekananda Global University, Jaipur, Rajasthan, India","institution_ids":["https://openalex.org/I4210125057"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066378662","display_name":"Dipannita Mondal","orcid":"https://orcid.org/0000-0003-3197-5583"},"institutions":[{"id":"https://openalex.org/I4210089305","display_name":"Dr. D. Y. Patil Medical College, Hospital and Research Centre","ror":"https://ror.org/0088h4061","country_code":"IN","type":"healthcare","lineage":["https://openalex.org/I4210089305"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dipannita Mondal","raw_affiliation_strings":["Department of Artificial Intelligence and Data Science, Dr. D.Y. Patil College of Engineering and Innovation, Nagpur, Maharashtra, India"],"raw_orcid":"https://orcid.org/0000-0003-3197-5583","affiliations":[{"raw_affiliation_string":"Department of Artificial Intelligence and Data Science, Dr. D.Y. Patil College of Engineering and Innovation, Nagpur, Maharashtra, India","institution_ids":["https://openalex.org/I4210089305"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049362742","display_name":"Dharmesh Dhabliya","orcid":"https://orcid.org/0000-0002-6340-2993"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dharmesh Dhabliya","raw_affiliation_strings":["Department of Information Technology, Vishwakarma Institute of Technology, Pune, Maharashtra, India"],"raw_orcid":"https://orcid.org/0000-0002-6340-2993","affiliations":[{"raw_affiliation_string":"Department of Information Technology, Vishwakarma Institute of Technology, Pune, Maharashtra, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031387629","display_name":"Jambi Ratna Raja Kumar","orcid":"https://orcid.org/0000-0002-9870-7076"},"institutions":[{"id":"https://openalex.org/I3130603999","display_name":"National School of Leadership","ror":"https://ror.org/05xtmhv34","country_code":"IN","type":"education","lineage":["https://openalex.org/I3130603999"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Jambi Ratna Raja Kumar","raw_affiliation_strings":["Department of Computer Engineering, Genba Sopanrao Moze College of Engineering, Pune, India"],"raw_orcid":"https://orcid.org/0000-0002-9870-7076","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Genba Sopanrao Moze College of Engineering, Pune, India","institution_ids":["https://openalex.org/I3130603999"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5015609133"],"corresponding_institution_ids":["https://openalex.org/I2802982682"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27889619,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9818999767303467,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12153","display_name":"Advanced Optical Sensing Technologies","score":0.9771000146865845,"subfield":{"id":"https://openalex.org/subfields/3105","display_name":"Instrumentation"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8424705862998962},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6998659372329712},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6303427219390869},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3411673903465271},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2889059782028198}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8424705862998962},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6998659372329712},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6303427219390869},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3411673903465271},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2889059782028198}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3745812.3745886","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3745812.3745886","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3745812.3745886","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3745812.3745886","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2902443160","https://openalex.org/W2960833983","https://openalex.org/W2967115342","https://openalex.org/W2976791766","https://openalex.org/W3101202235","https://openalex.org/W3159450599","https://openalex.org/W3200383949","https://openalex.org/W4221139075","https://openalex.org/W4226232092","https://openalex.org/W4281631564","https://openalex.org/W4387249807"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492"],"abstract_inverted_index":{"More":[0,130],"and":[1,70,101,136,179,185,220,232,240,259],"more":[2,143,203,230],"businesses":[3],"are":[4,90,150,189],"using":[5],"computer":[6,55,173,200],"vision":[7,56,201],"systems,":[8],"which":[9,26,40],"has":[10],"made":[11,199],"it":[12],"clear":[13],"that":[14,81,152],"they":[15,228],"need":[16],"strong":[17,233],"defenses":[18,149,243],"against":[19,58,112,142],"threats":[20],"from":[21,60],"other":[22,61],"companies.":[23],"These":[24,163],"attacks,":[25],"change":[27],"raw":[28],"data":[29],"in":[30,38,51,76,195],"small":[31],"ways,":[32],"can":[33],"lead":[34],"to":[35,213],"big":[36],"mistakes":[37],"classification,":[39],"makes":[41],"AI-driven":[42],"systems":[43,197,238],"less":[44],"reliable.":[45],"There":[46],"have":[47,122,198],"been":[48],"recent":[49],"improvements":[50,194],"defense":[52,89],"mechanisms":[53],"for":[54,252],"models":[57,202],"risks":[59],"computers.":[62],"This":[63,248],"study":[64,78],"paper":[65,79],"looks":[66],"at":[67],"both":[68],"old":[69],"new":[71,125,186],"methods.":[72],"The":[73,146],"outcome":[74],"documented":[75],"this":[77],"shows":[80],"different":[82],"protection":[83],"strategies":[84],"work.":[85],"Different":[86],"levels":[87],"of":[88,117,172,211],"provided":[91],"by":[92],"traditional":[93],"techniques":[94],"such":[95],"as":[96],"adversarial":[97,106],"training,":[98],"input":[99],"preparation,":[100],"defensive":[102],"distilling.":[103],"Of":[104],"these,":[105],"training":[107,155],"is":[108,181,207,249],"the":[109,118,170,175,217],"most":[110,147],"effective":[111],"known":[113],"threats.":[114,145],"A":[115],"lot":[116,210],"time,":[119],"these":[120,242],"methods":[121,164,188],"trouble":[123],"with":[124,157],"or":[126,160],"complex":[127],"hostile":[128],"changes.":[129],"advanced":[131],"methods,":[132],"like":[133,255],"verified":[134],"stability":[135],"feature":[137,158],"squeezing,":[138],"work":[139,212],"better,":[140],"especially":[141,250],"complicated":[144],"accurate":[148],"hybrids":[151],"use":[153],"antagonistic":[154],"along":[156],"manipulation":[159],"GAN-based":[161],"cleaning.":[162],"offer":[165,229],"a":[166,209],"fuller":[167],"defense.":[168],"In":[169,216],"world":[171],"vision,":[174],"fight":[176],"between":[177],"attackers":[178],"defenders":[180],"still":[182,208],"going":[183],"on,":[184],"attack":[187],"always":[190],"coming":[191],"out.":[192],"New":[193],"security":[196],"durable,":[204],"but":[205],"there":[206],"be":[214,224],"done.":[215],"future,":[218],"hybrid":[219],"adaptable":[221],"barriers":[222],"could":[223],"very":[225],"useful":[226],"because":[227],"flexible":[231],"security.":[234],"To":[235],"keep":[236,245],"AI":[237],"safe":[239],"reliable,":[241],"must":[244],"getting":[246],"better.":[247],"important":[251,253],"uses":[254],"self-driving":[256],"cars,":[257],"healthcare,":[258],"spying.":[260]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
