{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:09:33Z","timestamp":1761664173975,"version":"3.40.3"},"publisher-location":"Cham","reference-count":71,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030585822"},{"type":"electronic","value":"9783030585839"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58583-9_31","type":"book-chapter","created":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T10:08:18Z","timestamp":1605694098000},"page":"515-533","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Attributional Robustness Training Using Input-Gradient Spatial Alignment"],"prefix":"10.1007","author":[{"given":"Mayank","family":"Singh","sequence":"first","affiliation":[]},{"given":"Nupur","family":"Kumari","sequence":"additional","affiliation":[]},{"given":"Puneet","family":"Mangla","sequence":"additional","affiliation":[]},{"given":"Abhishek","family":"Sinha","sequence":"additional","affiliation":[]},{"given":"Vineeth N.","family":"Balasubramanian","sequence":"additional","affiliation":[]},{"given":"Balaji","family":"Krishnamurthy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,19]]},"reference":[{"key":"31_CR1","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar, N., Mian, A.: Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6, 14410\u201314430 (2018)","journal-title":"IEEE Access"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial examples in the physical world. In: ICLR Workshop (2017)","DOI":"10.1201\/9781351251389-8"},{"key":"31_CR3","unstructured":"Alvarez-Melis, D., Jaakkola, T.S.: On the robustness of interpretability methods. In: ICML 2018 Workshop (2018)"},{"key":"31_CR4","doi-asserted-by":"publisher","first-page":"954","DOI":"10.1038\/s41591-019-0447-x","volume":"25","author":"D Ardila","year":"2019","unstructured":"Ardila, D., et al.: End-to-end lung cancer screening with three-dimensional deep learning on low-dose chest computed tomography. Nature Med. 25, 954\u2013961 (2019)","journal-title":"Nature Med."},{"key":"31_CR5","unstructured":"Athalye, A., Carlini, N., Wagner, D.: Obfuscated gradients give a false sense of security: circumventing defenses to adversarial examples. In: ICML (2018)"},{"issue":"7","key":"31_CR6","doi-asserted-by":"publisher","first-page":"e0130140","DOI":"10.1371\/journal.pone.0130140","volume":"10","author":"S Bach","year":"2015","unstructured":"Bach, S., Binder, A., Montavon, G., Klauschen, F., M\u00fcler, K.R., Samek, W.: On pixel-wise explanations for non-linear classifier decisions by layer-wise relevance propagation. PLoS ONE 10(7), e0130140 (2015)","journal-title":"PLoS ONE"},{"key":"31_CR7","unstructured":"Carlini, N., et al.: On evaluating adversarial robustness. arXiv preprint arXiv:1902.06705 (2019)"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP) (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, A., Sarkar, A., Howlader, P., Balasubramanian, V.N.: Grad-CAM++: generalized gradient-based visual explanations for deep convolutional networks. arXiv preprint arXiv:1710.11063 (2017)","DOI":"10.1109\/WACV.2018.00097"},{"key":"31_CR10","unstructured":"Chen, J., Wu, X., Rastogi, V., Liang, Y., Jha, S.: Robust attribution regularization. arXiv preprint arXiv:1905.09957 (2019)"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Choe, J., Shim, H.: Attention-based dropout layer for weakly supervised object localization. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2219\u20132228 (2019)","DOI":"10.1109\/CVPR.2019.00232"},{"key":"31_CR12","unstructured":"Dombrowski, A.K., Alber, M., Anders, C., Ackermann, M., M\u00fcller, K.R., Kessel, P.: Explanations can be manipulated and geometry is to blame. In: Advances in Neural Information Processing Systems, pp. 13567\u201313578 (2019)"},{"key":"31_CR13","unstructured":"Du, M., Liu, N., Hu, X.: Techniques for interpretable machine learning. arXiv preprint arXiv:1808.00033 (2018)"},{"key":"31_CR14","unstructured":"Engstrom, L., Tran, B., Tsipras, D., Schmidt, L., Madry, A.: Exploring the landscape of spatial robustness. In: International Conference on Machine Learning, pp. 1802\u20131811 (2019)"},{"key":"31_CR15","unstructured":"Etmann, C., Lunz, S., Maass, P., Sch\u00f6nlieb, C.B.: On the connection between adversarial robustness and saliency map interpretability. arXiv preprint arXiv:1905.04172 (2019)"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Ghorbani, A., Abid, A., Zou, J.: Interpretation of neural networks is fragile. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33, pp. 3681\u20133688 (2019)","DOI":"10.1609\/aaai.v33i01.33013681"},{"key":"31_CR17","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: International Conference on Learning Representations (2015)"},{"key":"31_CR18","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: ICLR (2015)"},{"key":"31_CR19","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. arXiv preprint arXiv:1512.03385 (2015)","DOI":"10.1109\/CVPR.2016.90"},{"key":"31_CR20","unstructured":"Hendrycks, D., Dietterich, T.: Benchmarking neural network robustness to common corruptions and perturbations. In: Proceedings of the International Conference on Learning Representations (2019)"},{"key":"31_CR21","unstructured":"Hermans, A., Beyer, L., Leibe, B.: In defense of the triplet loss for person re-identification. arXiv preprint arXiv:1703.07737 (2017)"},{"key":"31_CR22","unstructured":"Ilyas, A., Engstrom, L., Athalye, A., Lin, J.: Black-box adversarial attacks with limited queries and information. In: ICML (2018)"},{"key":"31_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-3-030-01258-8_32","volume-title":"Computer Vision \u2013 ECCV 2018","author":"D Jakubovitz","year":"2018","unstructured":"Jakubovitz, D., Giryes, R.: Improving DNN robustness to adversarial attacks using Jacobian regularization. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11216, pp. 525\u2013541. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01258-8_32"},{"key":"31_CR24","unstructured":"Jia, X., Shen, L.: Skin lesion classification using class activation map. arXiv preprint arXiv:1703.01053 (2017)"},{"issue":"2","key":"31_CR25","doi-asserted-by":"publisher","first-page":"31","DOI":"10.3390\/bdcc3020031","volume":"3","author":"Q Jiang","year":"2019","unstructured":"Jiang, Q., et al.: Weakly-supervised image semantic segmentation based on superpixel region merging. Big Data Cogn. Comput. 3(2), 31 (2019)","journal-title":"Big Data Cogn. Comput."},{"key":"31_CR26","unstructured":"Kolesnikov, A., Lampert, C.H.: Seed, expand and constrain: three principles for weakly-supervised image segmentation. CoRR abs\/1603.06098 (2016). http:\/\/arxiv.org\/abs\/1603.06098"},{"key":"31_CR27","unstructured":"Krizhevsky, A., Nair, V., Hinton, G.: CIFAR-10. http:\/\/www.cs.toronto.edu\/kriz\/cifar.html (2010)"},{"key":"31_CR28","unstructured":"Engstrom, L., Andrew Ilyas, A.A.: Evaluating and understanding the robustness of adversarial logit pairing. In: NeurIPS SECML (2018)"},{"key":"31_CR29","unstructured":"Lundberg, S.M., Lee, S.I.: A unified approach to interpreting model predictions. In: Guyon, I., et al. (eds.) NeurIPS (2017). http:\/\/papers.nips.cc\/paper\/7062-a-unified-approach-to-interpreting-model-predictions.pdf"},{"key":"31_CR30","doi-asserted-by":"crossref","unstructured":"Lyu, C., Huang, K., Liang, H.N.: A unified gradient regularization family for adversarial examples. In: ICDM (2015)","DOI":"10.1109\/ICDM.2015.84"},{"key":"31_CR31","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)"},{"key":"31_CR32","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1038\/s41551-019-0487-z","volume":"4","author":"A Mitani","year":"2020","unstructured":"Mitani, A., et al.: Detection of anaemia from retinal fundus images via deep learning. Nature Biomed. Eng. 4, 18\u201327 (2020)","journal-title":"Nature Biomed. Eng."},{"key":"31_CR33","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Frossard, P.: DeepFool: a simple and accurate method to fool deep neural networks. arXiv preprint arXiv:1511.04599v3 (2016)","DOI":"10.1109\/CVPR.2016.282"},{"key":"31_CR34","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Uesato, J., Frossard, P.: Robustness via curvature regularization, and vice versa. In: CVPR (2019)","DOI":"10.1109\/CVPR.2019.00929"},{"key":"31_CR35","unstructured":"Netzer, Y., Wang, T., Coates, A., Bissacco, A., Wu, B., Ng, A.Y.: Reading digits in natural images with unsupervised feature learning. In: NIPS Workshop on Deep Learning and Unsupervised Feature Learning (2011)"},{"key":"31_CR36","doi-asserted-by":"crossref","unstructured":"Nilsback, M.E., Zisserman, A.: A visual vocabulary for flower classification. In: IEEE Conference on Computer Vision and Pattern Recognition, vol. 2, pp. 1447\u20131454 (2006)","DOI":"10.1109\/CVPR.2006.42"},{"issue":"6","key":"31_CR37","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1016\/j.imavis.2009.10.001","volume":"28","author":"ME Nilsback","year":"2010","unstructured":"Nilsback, M.E., Zisserman, A.: Delving deeper into the whorl of flower segmentation. Image Vis. Comput. 28(6), 1049\u20131062 (2010). https:\/\/doi.org\/10.1016\/j.imavis.2009.10.001","journal-title":"Image Vis. Comput."},{"key":"31_CR38","doi-asserted-by":"crossref","unstructured":"Oh, S.J., Benenson, R., Khoreva, A., Akata, Z., Fritz, M., Schiele, B.: Exploiting saliency for object segmentation from image level labels. CoRR abs\/1701.08261 (2017). http:\/\/arxiv.org\/abs\/1701.08261","DOI":"10.1109\/CVPR.2017.535"},{"key":"31_CR39","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I.J., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against machine learning. ACM (2017)","DOI":"10.1145\/3052973.3053009"},{"key":"31_CR40","unstructured":"Petsiuk, V., Das, A., Saenko, K.: RISE: randomized input sampling for explanation of black-box models. In: BMVC (2018)"},{"key":"31_CR41","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: Why should i trust you?: explaining the predictions of any classifier. In: ACM SIGKDD (2016)","DOI":"10.18653\/v1\/N16-3020"},{"key":"31_CR42","doi-asserted-by":"crossref","unstructured":"Ross, A.S., Doshi-Velez, F.: Improving the adversarial robustness and interpretability of deep neural networks by regularizing their input gradients. In: AAAI (2018)","DOI":"10.1609\/aaai.v32i1.11504"},{"key":"31_CR43","unstructured":"Santurkar, S., Ilyas, A., Tsipras, D., Engstrom, L., Tran, B., Madry, A.: Image synthesis with a single (robust) classifier. In: NeurIPS (2019)"},{"key":"31_CR44","doi-asserted-by":"crossref","unstructured":"Schroff, Florian an Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: CVPR (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"31_CR45","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Das, A., Vedantam, R., Cogswell, M., Parikh, D., Batra, D.: Grad-CAM: visual explanations from deep networks via gradient-based localization (2016)","DOI":"10.1109\/ICCV.2017.74"},{"key":"31_CR46","unstructured":"Shrikumar, A., Greenside, P., Kundaje, A.: Learning important features through propagating activation differences, pp. 3145\u20133153 (2017)"},{"key":"31_CR47","unstructured":"Shrikumar, A., Greenside, P., Shcherbina, A., Kundaje, A.: Not just a black box: learning important features through propagating activation differences. arXiv preprint arXiv:1605.01713 (2016)"},{"key":"31_CR48","unstructured":"Simonyan, K., Vedaldi, A., Zisserman, A.: Deep inside convolutional networks: visualising image classification models and saliency maps. arXiv preprint arXiv:1312.6034 (2013)"},{"key":"31_CR49","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)"},{"key":"31_CR50","unstructured":"Sinha, A., Singh, M., Kumari, N., Krishnamurthy, B., Machiraju, H., Balasubramanian, V.: Harnessing the vulnerability of latent layers in adversarially trained models. arXiv preprint arXiv:1905.05186 (2019)"},{"key":"31_CR51","unstructured":"Smilkov, D., Thorat, N., Kim, B., Vi\u00e9gas, F., Wattenberg, M.: SmoothGrad: removing noise by adding noise. In: Workshop on Visualization for Deep Learning, ICML (2017)"},{"key":"31_CR52","unstructured":"Springenberg, J.T., Dosovitskiy, A., Brox, T., Riedmiller, M.: Striving for simplicity: the all convolutional net. In: ICLR Workshop (2015)"},{"key":"31_CR53","doi-asserted-by":"crossref","unstructured":"Stallkamp, J., Schlipsing, M., Salmen, J., Igel, C.: The German traffic sign recognition benchmark: a multi-class classification competition. In: IEEE International Joint Conference on Neural Networks, pp. 1453\u20131460 (2011)","DOI":"10.1109\/IJCNN.2011.6033395"},{"key":"31_CR54","unstructured":"Sundararajan, M., Taly, A., Yan, Q.: Axiomatic attribution for deep networks. In: ICML (2017)"},{"key":"31_CR55","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: ICLR (2014)"},{"issue":"4","key":"31_CR56","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1016\/j.ophtha.2018.11.016","volume":"126","author":"A Taly","year":"2019","unstructured":"Taly, A., et al.: Using a deep learning algorithm and integrated gradient explanation to assist grading for diabetic retinopathy. Ophthalmology 126(4), 552\u2013564 (2019)","journal-title":"Ophthalmology"},{"key":"31_CR57","unstructured":"Tsipras, D., Santurkar, S., Engstrom, L., Turner, A., Madry, A.: Robustness may be at odds with accuracy. In: ICLR (2019)"},{"key":"31_CR58","unstructured":"Uesato, J., O\u2019Donoghue, B., Kohli, P., van den Oord, A.: Adversarial risk and the dangers of evaluating against weak attacks. In: ICML (2018)"},{"key":"31_CR59","doi-asserted-by":"publisher","unstructured":"Vasconcelos, M., Vasconcelos, N., Carneiro, G.: Weakly supervised top-down image segmentation. In: 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2006), vol. 1, pp. 1001\u20131006, June 2006. https:\/\/doi.org\/10.1109\/CVPR.2006.333","DOI":"10.1109\/CVPR.2006.333"},{"key":"31_CR60","doi-asserted-by":"publisher","unstructured":"Vezhnevets, A., Buhmann, J.M.: Towards weakly supervised semantic segmentation by means of multiple instance and multitask learning. In: 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 3249\u20133256, June 2010. https:\/\/doi.org\/10.1109\/CVPR.2010.5540060","DOI":"10.1109\/CVPR.2010.5540060"},{"key":"31_CR61","unstructured":"Wah, C., Branson, S., Welinder, P., Perona, P., Belongie, S.: The caltech-UCSD birds-200-2011 dataset. Tech. Rep. CNS-TR-2011-001, California Institute of Technology (2011)"},{"key":"31_CR62","unstructured":"Xu, K., et al.: Structured adversarial attack: towards general implementation and better interpretability. In: ICLR (2019)"},{"issue":"9","key":"31_CR63","doi-asserted-by":"publisher","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","volume":"30","author":"X Yuan","year":"2019","unstructured":"Yuan, X., He, P., Zhu, Q., Li, X.: Adversarial examples: attacks and defenses for deep learning. IEEE Trans. Neural Netw. Learn. Syst. 30(9), 2805\u20132824 (2019)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"31_CR64","unstructured":"Zagoruyko, S., Komodakis, N.: Wide residual networks. CoRR abs\/1605.07146 (2016). http:\/\/arxiv.org\/abs\/1605.07146"},{"key":"31_CR65","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1007\/978-3-319-10590-1_53","volume-title":"Computer Vision \u2013 ECCV 2014","author":"MD Zeiler","year":"2014","unstructured":"Zeiler, M.D., Fergus, R.: Visualizing and understanding convolutional networks. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8689, pp. 818\u2013833. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10590-1_53"},{"key":"31_CR66","unstructured":"Zhang, H., Yu, Y., Jiao, J., Xing, E.P., Ghaoui, L.E., Jordan, M.I.: Theoretically principled trade-off between robustness and accuracy. arXiv preprint arXiv:1901.08573 (2019)"},{"key":"31_CR67","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1007\/978-3-319-46493-0_33","volume-title":"Computer Vision \u2013 ECCV 2016","author":"J Zhang","year":"2016","unstructured":"Zhang, J., Lin, Z., Brandt, J., Shen, X., Sclaroff, S.: Top-down neural attention by excitation backprop. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9908, pp. 543\u2013559. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46493-0_33"},{"key":"31_CR68","doi-asserted-by":"publisher","unstructured":"Zhang, L., Song, M., Liu, Z., Liu, X., Bu, J., Chen, C.: Probabilistic Graphlet Cut: exploiting spatial structure cue for weakly supervised image segmentation. In: 2013 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1908\u20131915, June 2013. https:\/\/doi.org\/10.1109\/CVPR.2013.249","DOI":"10.1109\/CVPR.2013.249"},{"key":"31_CR69","unstructured":"Zhang, Q., Zhu, S.C.: Visual interpretability for deep learning: a survey. arXiv preprint arXiv:1802.00614 (2018)"},{"key":"31_CR70","unstructured":"Zhang, X., Wang, N., Shen, H., Ji, S., Luo, X., Wang, T.: Interpretable deep learning under fire. arXiv preprint arXiv:1812.00891 (2018)"},{"key":"31_CR71","doi-asserted-by":"crossref","unstructured":"Zhou, B., Khosla, A., Lapedriza, A., Oliva, A., Torralba, A.: Learning deep features for discriminative localization. In: CVPR (2016)","DOI":"10.1109\/CVPR.2016.319"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58583-9_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T00:10:55Z","timestamp":1731888655000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58583-9_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030585822","9783030585839"],"references-count":71,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58583-9_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"19 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Glasgow","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2020.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OpenReview","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5025","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1360","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic. From the ECCV Workshops 249 full papers, 18 short papers, and 21 further contributions were published out of a total of 467 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}