{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:30:46Z","timestamp":1730237446932,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1109\/iccvw54120.2021.00018","type":"proceedings-article","created":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T20:40:09Z","timestamp":1637786409000},"page":"112-121","source":"Crossref","is-referenced-by-count":2,"title":["Patch Attack Invariance: How Sensitive are Patch Attacks to 3D Pose?"],"prefix":"10.1109","author":[{"given":"Max","family":"Lennon","sequence":"first","affiliation":[]},{"given":"Nathan","family":"Drenkow","sequence":"additional","affiliation":[]},{"given":"Phil","family":"Burlina","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/CVPR46437.2021.01498"},{"year":"2020","author":"zhao","article-title":"Object hider: Adversarial patch attack against object detectors","key":"ref38"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/CVPRW.2019.00012"},{"year":"2013","author":"szegedy","article-title":"Intriguing properties of neural networks","key":"ref32"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1038\/nature24270","article-title":"Mastering the game of go without human knowledge","volume":"550","author":"silver","year":"2017","journal-title":"Nature"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/SP.2017.41"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1007\/978-3-030-58548-8_1"},{"year":"2020","author":"wu","article-title":"Physical adversarial attack on vehicle detector in the carla simulator","key":"ref36"},{"year":"2020","author":"wu","article-title":"Dpattack: Diffused patch attacks against universal object detection","key":"ref35"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1117\/1.JBO.18.5.057008"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/3274895.3274904"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/CVPR.2018.00175"},{"year":"2019","author":"fendley","article-title":"Jacks of all trades, masters of none: Addressing distributional shift and obtrusiveness via transparent patch attacks","key":"ref12"},{"key":"ref13","article-title":"Recent advances in open set recognition: A survey","author":"geng","year":"2020","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"year":"2014","author":"goodfellow","article-title":"Explaining and harnessing adversarial examples","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/CVPR.2016.90"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/3065386"},{"year":"2016","author":"kurakin","journal-title":"Adversarial examples in the physical world","key":"ref17"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1038\/nature14539"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1038\/nature14236"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ISBI.2018.8363846"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1001\/jamaophthalmol.2018.3799"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/TPAMI.2012.256"},{"key":"ref3","article-title":"Context-based exploitation of aerial imagery","author":"burlina","year":"1995","journal-title":"Proc Workshop on Model-Based Vision"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1001\/jamaophthalmol.2020.3269"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/2976749.2978392"},{"year":"2020","author":"burlina","article-title":"Addressing artificial intelligence bias in retinal disease diagnostics","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/3128572.3140444"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.compbiomed.2018.12.007"},{"year":"2017","author":"brown","article-title":"Adversarial patch","key":"ref2"},{"key":"ref9","first-page":"52","article-title":"Shapeshifter: Robust physical adversarial attack on faster r-cnn object detector","author":"chen","year":"2018","journal-title":"Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases"},{"year":"2017","author":"athalye","article-title":"Synthesizing robust adversarial examples","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/CVPR.2017.17"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1016\/j.compbiomed.2019.103445"},{"key":"ref21","first-page":"2574","article-title":"Deepfool: a simple and accurate method to fool deep neural networks","author":"moosavi-dezfooli","year":"2016","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref24","first-page":"779","article-title":"You only look once: Unified, real-time object detection","author":"redmon","year":"2015","journal-title":"2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"},{"year":"2016","author":"ravi","journal-title":"Optimization as a model for few-shot learning","key":"ref23"},{"key":"ref26","first-page":"234","article-title":"U-net: Convolutional networks for biomedical image segmentation","author":"ronneberger","year":"2015","journal-title":"International Conference on Medical Image Computing and Computer-Assisted Intervention"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TPAMI.2016.2577031"}],"event":{"name":"2021 IEEE\/CVF International Conference on Computer Vision Workshops (ICCVW)","start":{"date-parts":[[2021,10,11]]},"location":"Montreal, BC, Canada","end":{"date-parts":[[2021,10,17]]}},"container-title":["2021 IEEE\/CVF International Conference on Computer Vision Workshops (ICCVW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9607382\/9607383\/09607504.pdf?arnumber=9607504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:51:40Z","timestamp":1652201500000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9607504\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/iccvw54120.2021.00018","relation":{},"subject":[],"published":{"date-parts":[[2021,10]]}}}