Open Access
| Issue |
ITM Web Conf.
Volume 78, 2025
International Conference on Computer Science and Electronic Information Technology (CSEIT 2025)
|
|
|---|---|---|
| Article Number | 02002 | |
| Number of page(s) | 9 | |
| Section | Machine Learning Applications in Vision, Security, and Healthcare | |
| DOI | https://doi.org/10.1051/itmconf/20257802002 | |
| Published online | 08 September 2025 | |
- Gu, J. et al., "Recent advances in convolutional neural networks," Pattern Recognition, vol. 77, pp. 354–377, 2018, doi: 10.1016/j.patcog.2017.10.013. [CrossRef] [Google Scholar]
- Wang, R. et al., "Amora: Black-box Adversarial Morphing Attack," in Proceedings of the 28th ACM International Conference on Multimedia, Seattle, WA, USA, 2020. [Online]. Available: https://doi.org/10.1145/3394171.3413544. [Google Scholar]
- Akhtar, N. and Mian, A., "Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey," IEEE Access, vol. 6, pp. 14410–14430, 2018, doi: 10.1109/ACCESS.2018.2807385. [CrossRef] [Google Scholar]
- Goodfellow, I. J., Shlens, J. and Szegedy, C., "Explaining and Harnessing Adversarial Examples," arXiv preprint, arXiv:1412.6572, 2014, doi: 10.48550/arXiv.1412.6572. [Google Scholar]
- Paricio-Garcia, A., Lopez-Carmona, M. A., Sierra-Arquero, S. and Manglano-Redondo, P., "Analysis and evaluation of autoencoder-driven dimensionality reduction for face recognition pipelines," Applied Soft Computing, vol. 172, p. 112877, 2025, doi: 10.1016/j.asoc.2025.112877. [Google Scholar]
- Gewers, F. L. et al., "Principal Component Analysis: A Natural Approach to Data Exploration," ACM Computing Surveys, vol. 54, no. 4, Article 70, 2021, doi: 10.1145/3447755. [Google Scholar]
- Wang, W., Shen, J. and Ling, H., "A Deep Network Solution for Attention and Aesthetics Aware Photo Cropping," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 41, no. 7, pp. 1531–1544, 2019, doi: 10.1109/TPAMI.2018.2840724. [Google Scholar]
- Yoshida, M., Namura, H. and Okuda, M., "Adversarial Examples for Image Cropping: Gradient-Based and Bayesian-Optimized Approaches for Effective Adversarial Attack," IEEE Access, vol. 12, pp. 86541–86552, 2024, doi: 10.1109/ACCESS.2024.3415356. [Google Scholar]
- Zhang, K., Zuo, W., Chen, Y., Meng, D. and Zhang, L., "Beyond a Gaussian Denoiser: Residual Learning of Deep CNN for Image Denoising," IEEE Transactions on Image Processing, vol. 26, no. 7, pp. 3142–3155, 2017, doi: 10.1109/TIP.2017.2662206. [NASA ADS] [CrossRef] [MathSciNet] [PubMed] [Google Scholar]
- Ding, C. and Tao, D., "Robust Face Recognition via Multimodal Deep Face Representation," IEEE Transactions on Multimedia, vol. 17, no. 11, pp. 2049–2058, 2015, doi: 10.1109/TMM.2015.2477042. [Google Scholar]
- Simonyan, K. and Zisserman, A., "Very Deep Convolutional Networks for Large-Scale Image Recognition," arXiv preprint, arXiv:1409.1556, 2014, doi: 10.48550/arXiv.1409.1556. [Google Scholar]
- Hussain, M., Thaher, T., Almourad, M. B. and Mafarja, M., "Optimizing VGG16 Deep Learning Model with Enhanced Hunger Games Search for Logo Classification," Scientific Reports, vol. 14, no. 1, p. 31759, 2024, doi: 10.1038/s41598-024-82022-5. [Google Scholar]
- Waghela, H., Sen, J. and Rakshit, S., "Robust Image Classification: Defensive Strategies Against FGSM and PGD Adversarial Attacks," arXiv preprint, arXiv:2408.13274, 2024, doi: 10.48550/arXiv.2408.13274. [Google Scholar]
- Takahashi, R., Matsubara, T. and Uehara, K., "Data Augmentation Using Random Image Cropping and Patching for Deep CNNs," IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 9, pp. 2917–2931, 2020, doi: 10.1109/TCSVT.2019.2935128. [Google Scholar]
- Machado, G. R., Silva, E. and Goldschmidt, R. R., "Adversarial Machine Learning in Image Classification: A Survey Toward the Defender’s Perspective," ACM Computing Surveys, vol. 55, no. 1, Article 8, 2021, doi: 10.1145/3485133. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.

