{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T17:09:47Z","timestamp":1771952987882,"version":"3.50.1"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030012304","type":"print"},{"value":"9783030012311","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01231-1_31","type":"book-chapter","created":{"date-parts":[[2018,10,5]],"date-time":"2018-10-05T20:03:25Z","timestamp":1538769805000},"page":"504-519","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":77,"title":["ConvNets and ImageNet Beyond Accuracy: Understanding Mistakes and\u00a0Uncovering Biases"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3623-3899","authenticated-orcid":false,"given":"Pierre","family":"Stock","sequence":"first","affiliation":[]},{"given":"Moustapha","family":"Cisse","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,6]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Lecun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. In: Proceedings of the IEEE (1998)","DOI":"10.1109\/5.726791"},{"key":"31_CR2","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Proceedings of the 25th International Conference on Neural Information Processing Systems, vol. 1 (2012)"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: CVPR09 (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"31_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-15561-1_11","volume-title":"Computer Vision \u2013 ECCV 2010","author":"F Perronnin","year":"2010","unstructured":"Perronnin, F., S\u00e1nchez, J., Mensink, T.: Improving the fisher Kernel for large-scale image classification. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) ECCV 2010 Part IV. LNCS, vol. 6314, pp. 143\u2013156. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15561-1_11"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Weinberger, K.Q.: Densely connected convolutional networks. CoRR (2016)","DOI":"10.1109\/CVPR.2017.243"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Girshick, R.: Fast R-CNN. In: Proceedings of the 2015 IEEE International Conference on Computer Vision (ICCV). ICCV 2015 (2015)","DOI":"10.1109\/ICCV.2015.169"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"He, K., Gkioxari, G., Doll\u00e1r, P., Girshick, R.B.: Mask R-CNN. CoRR abs\/1703.06870 (2017)","DOI":"10.1109\/ICCV.2017.322"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Insafutdinov, E., Pishchulin, L., Andres, B., Andriluka, M., Schiele, B.: DeeperCut: a deeper, stronger, and faster multi-person pose estimation model. CoRR abs\/1605.03170 (2016)","DOI":"10.1007\/978-3-319-46466-4_3"},{"key":"31_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1007\/978-3-319-46478-7_44","volume-title":"Computer Vision \u2013 ECCV 2016","author":"A Bulat","year":"2016","unstructured":"Bulat, A., Tzimiropoulos, G.: Human pose estimation via convolutional part heatmap regression. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016 Part VII. LNCS, vol. 9911, pp. 717\u2013732. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46478-7_44"},{"key":"31_CR11","unstructured":"Gehring, J., Auli, M., Grangier, D., Yarats, D., Dauphin, Y.N.: Convolutional sequence to sequence learning. CoRR (2017)"},{"key":"31_CR12","unstructured":"Wang, Y., Deng, X., Pu, S., Huang, Z.: Residual convolutional CTC networks for automatic speech recognition. CoRR (2017)"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, H., Ciss\u00e9, M., Dauphin, Y.N., Lopez-Paz, D.: mixup: beyond empirical risk minimization. CoRR (2017)","DOI":"10.1007\/978-1-4899-7687-1_79"},{"key":"31_CR14","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. CoRR (2014)"},{"key":"31_CR15","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. CoRR (2013)"},{"key":"31_CR16","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples (2014)"},{"key":"31_CR17","unstructured":"Ciss\u00e9, M., Adi, Y., Neverova, N., Keshet, J.: Houdini: fooling deep structured visual and speech recognition models with adversarial examples. In: Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 4\u20139 December 2017, Long Beach, CA, USA (2017)"},{"key":"31_CR18","unstructured":"Ritter, S., Barrett, D.G.T., Santoro, A., Botvinick, M.M.: Cognitive psychology for deep neural networks: a shape bias case study. In: Proceedings of the 34th International Conference on Machine Learning. Proceedings of Machine Learning Research (2017)"},{"key":"31_CR19","unstructured":"Bolukbasi, T., Chang, K., Zou, J.Y., Saligrama, V., Kalai, A.: Man is to computer programmer as woman is to homemaker? Debiasing word embeddings. CoRR (2016)"},{"key":"31_CR20","unstructured":"Kim, B., Khanna, R., Koyejo, O.O.: Examples are not enough, learn to criticize! Criticism for interpretability. In: Advances in Neural Information Processing Systems 29 (2016)"},{"key":"31_CR21","unstructured":"Karpathy, A.: What i learned from competing against a convnet on imagenet. http:\/\/karpathy.github.io\/2014\/09\/02\/what-i-learned-from-competing-against-a-convnet-on-imagenet\/"},{"key":"31_CR22","unstructured":"Goodfellow, I., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: International Conference on Learning Representations (2015)"},{"key":"31_CR23","doi-asserted-by":"crossref","unstructured":"Tabacof, P., Valle, E.: Exploring the space of adversarial images. CoRR (2015)","DOI":"10.1109\/IJCNN.2016.7727230"},{"key":"31_CR24","unstructured":"Fawzi, A., Fawzi, O., Frossard, P.: Analysis of classifiers\u2019 robustness to adversarial perturbations. CoRR (2015)"},{"key":"31_CR25","unstructured":"Shaham, U., Yamada, Y., Negahban, S.: Understanding adversarial training: increasing local stability of neural nets through robust optimization. CoRR (2015)"},{"key":"31_CR26","unstructured":"Fawzi, A., Moosavi-Dezfooli, S., Frossard, P.: Robustness of classifiers: from adversarial to random noise. CoRR (2016)"},{"key":"31_CR27","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P.D., Wu, X., Jha, S., Swami, A.: Distillation as a defense to adversarial perturbations against deep neural networks. In: 2016 IEEE Symposium on Security and Privacy (SP) (2016)","DOI":"10.1109\/SP.2016.41"},{"key":"31_CR28","unstructured":"Cisse, M., Bojanowski, P., Grave, E., Dauphin, Y., Usunier, N.: Parseval networks: improving robustness to adversarial examples. In: Proceedings of the 34th International Conference on Machine Learning (2017)"},{"key":"31_CR29","unstructured":"Kurakin, A., Boneh, D., Tramr, F., Goodfellow, I., Papernot, N., McDaniel, P.: Ensemble adversarial training: attacks and defenses (2018)"},{"key":"31_CR30","unstructured":"Guo, C., Rana, M., Ciss\u00e9, M., van der Maaten, L.: Countering adversarial images using input transformations. CoRR (2017)"},{"key":"31_CR31","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S., Fawzi, A., Frossard, P.: DeepFool: a simple and accurate method to fool deep neural networks. CoRR (2015)","DOI":"10.1109\/CVPR.2016.282"},{"key":"31_CR32","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial examples in the physical world. CoRR (2016)"},{"key":"31_CR33","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1037\/h0030806","volume":"26","author":"HA Simon","year":"1972","unstructured":"Simon, H.A., Newell, A.: Human problem solving: the state of the theory in 1970. Am. Psychol. 26, 145 (1972)","journal-title":"Am. Psychol."},{"key":"31_CR34","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/AIC-1994-7104","volume":"7","author":"A Aamodt","year":"1994","unstructured":"Aamodt, A., Plaza, E.: Case-based reasoning; foundational issues, methodological variations, and system approaches. AI Commun. 7, 39\u201359 (1994)","journal-title":"AI Commun."},{"key":"31_CR35","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.artmed.2005.10.008","volume":"36","author":"I Bichindaritz","year":"2006","unstructured":"Bichindaritz, I., Marling, C.: Case-based reasoning in the health sciences: what\u2019s next? Artif. Intell. Med. 36, 127\u2013135 (2006)","journal-title":"Artif. Intell. Med."},{"key":"31_CR36","unstructured":"Kim, B., Rudin, C., Shah, J.A.: The Bayesian case model: a generative approach for case-based reasoning and prototype classification. In: Advances in Neural Information Processing Systems 27 (2014)"},{"key":"31_CR37","unstructured":"Gelman, A.: Bayesian data analysis using R (2006)"},{"key":"31_CR38","doi-asserted-by":"crossref","unstructured":"Gretton, A., Borgwardt, K.M., Rasch, M., Sch\u00f6lkopf, B., Smola, A.J.: A kernel method for the two-sample-problem. In: Proceedings of the 19th International Conference on Neural Information Processing Systems, NIPS 2006 (2006)","DOI":"10.7551\/mitpress\/7503.003.0069"},{"key":"31_CR39","doi-asserted-by":"crossref","unstructured":"Badanidiyuru, A., Mirzasoleiman, B., Karbasi, A., Krause, A.: Streaming submodular maximization: massive data summarization on the fly. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2014)","DOI":"10.1145\/2623330.2623637"},{"key":"31_CR40","unstructured":"Lipton, Z.C.: The mythos of model interpretability. CoRR (2016)"},{"key":"31_CR41","unstructured":"Samek, W., Wiegand, T., Muller, K.: Explainable artificial intelligence: understanding, visualizing and interpreting deep learning models. CoRR (2017)"},{"key":"31_CR42","doi-asserted-by":"crossref","unstructured":"Montavon, G., Samek, W., Muller, K.: Methods for interpreting and understanding deep neural networks. CoRR (2017)","DOI":"10.1016\/j.dsp.2017.10.011"},{"key":"31_CR43","unstructured":"Dong, Y., Su, H., Zhu, J., Bao, F.: Towards interpretable deep neural networks by leveraging adversarial examples. CoRR (2017)"},{"key":"31_CR44","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: \u201cwhy should i trust you?\u201d: Explaining the predictions of any classifier. In: Proceedings of the 22Nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2016)","DOI":"10.1145\/2939672.2939778"},{"key":"31_CR45","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.cogpsych.2014.07.001","volume":"74","author":"D Paperno","year":"2014","unstructured":"Paperno, D., Marelli, M., Tentori, K., Baroni, M.: Corpus-based estimates of word association predict biases in judgment of word co-occurrence likelihood. Cogn. Psychol. 74, 66\u201383 (2014)","journal-title":"Cogn. Psychol."}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01231-1_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T17:41:29Z","timestamp":1693935689000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-01231-1_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030012304","9783030012311"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01231-1_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"6 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}