{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T14:11:40Z","timestamp":1774275100440,"version":"3.50.1"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030871987","type":"print"},{"value":"9783030871994","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-87199-4_1","type":"book-chapter","created":{"date-parts":[[2021,9,23]],"date-time":"2021-09-23T06:19:41Z","timestamp":1632377981000},"page":"3-13","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Towards Robust General Medical Image Segmentation"],"prefix":"10.1007","author":[{"given":"Laura","family":"Daza","sequence":"first","affiliation":[]},{"given":"Juan C.","family":"P\u00e9rez","sequence":"additional","affiliation":[]},{"given":"Pablo","family":"Arbel\u00e1ez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,21]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1007\/978-3-030-58592-1_29","volume-title":"Computer Vision \u2013 ECCV 2020","author":"M Andriushchenko","year":"2020","unstructured":"Andriushchenko, M., Croce, F., Flammarion, N., Hein, M.: Square attack: a query-efficient black-box adversarial attack via random search. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12368, pp. 484\u2013501. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58592-1_29"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Arnab, A., Miksik, O., Torr, P.H.: On the robustness of semantic segmentation models to adversarial attacks. In: CVPR (2018)","DOI":"10.1109\/CVPR.2018.00099"},{"key":"1_CR3","unstructured":"Brendel, W., Rauber, J., Bethge, M.: Decision-based adversarial attacks: reliable attacks against black-box machine learning models. In: ICLR (2018)"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Cai, Q.Z., Liu, C., Song, D.: Curriculum adversarial training. In: International Joint Conference on Artificial Intelligence (IJCAI) (2018)","DOI":"10.24963\/ijcai.2018\/520"},{"key":"1_CR5","unstructured":"Carlini, N., et al.: On evaluating adversarial robustness. arXiv preprint arXiv:1902.06705 (2019)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP) (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"1_CR7","unstructured":"Cisse, M., Adi, Y., Neverova, N., Keshet, J.: Houdini: fooling deep structured prediction models. arXiv preprint arXiv:1707.05373 (2017)"},{"key":"1_CR8","unstructured":"Croce, F., Hein, M.: Minimally distorted adversarial examples with a fast adaptive boundary attack. In: International conference on machine learning (ICML) (2020)"},{"key":"1_CR9","unstructured":"Croce, F., Hein, M.: Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In: International Conference on Machine Learning (ICML) (2020)"},{"key":"1_CR10","unstructured":"Goodfellow, I., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: ICLR (2015)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Gupta, S., Dube, P., Verma, A.: Improving the affordability of robustness training for DNNs. In: CVPRW (2020)","DOI":"10.1109\/CVPRW50498.2020.00398"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Isensee, F., Jaeger, P.F., Full, P.M., Vollmuth, P., Maier-Hein, K.H.: nnU-net for brain tumor segmentation. arXiv preprint arXiv:2011.00848 (2020)","DOI":"10.1007\/978-3-030-72087-2_11"},{"key":"1_CR13","unstructured":"Isensee, F., et al.: nnU-net: self-adapting framework for u-net-based medical image segmentation. CoRR abs\/1809.10486 (2018)"},{"key":"1_CR14","doi-asserted-by":"publisher","unstructured":"Joel, M.Z., et al.: Adversarial attack vulnerability of deep learning models for oncologic images. medRxiv (2021). https:\/\/doi.org\/10.1101\/2021.01.17.21249704","DOI":"10.1101\/2021.01.17.21249704"},{"key":"1_CR15","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. In: ICLR (2015)"},{"key":"1_CR16","series-title":"Advances in Computer Vision and Pattern Recognition","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-030-13969-8_4","volume-title":"Deep Learning and Convolutional Neural Networks for Medical Imaging and Clinical Informatics","author":"Y Li","year":"2019","unstructured":"Li, Y., et al.: Volumetric medical image segmentation: a 3D deep coarse-to-fine framework and its adversarial examples. In: Lu, L., Wang, X., Carneiro, G., Yang, L. (eds.) Deep Learning and Convolutional Neural Networks for Medical Imaging and Clinical Informatics. ACVPR, pp. 69\u201391. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-13969-8_4"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-030-59719-1_34","volume-title":"Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2020","author":"Q Liu","year":"2020","unstructured":"Liu, Q., et al.: Defending deep learning-based biomedical image segmentation from adversarial attacks: a low-cost frequency refinement approach. In: Martel, A.L., et al. (eds.) MICCAI 2020. LNCS, vol. 12264, pp. 342\u2013351. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59719-1_34"},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"107332","DOI":"10.1016\/j.patcog.2020.107332","volume":"110","author":"X Ma","year":"2020","unstructured":"Ma, X., et al.: Understanding adversarial attacks on deep learning based medical image analysis systems. Pattern Recogn. 110, 107332 (2020)","journal-title":"Pattern Recogn."},{"key":"1_CR19","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: ICLR (2018)"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Milletari, F., Navab, N., Ahmadi, S.A.: V-net: fully convolutional neural networks for volumetric medical image segmentation. In: International Conference on 3D vision (3DV) (2016)","DOI":"10.1109\/3DV.2016.79"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Fawzi, O., Frossard, P.: Universal adversarial perturbations. In: CVPR (2017)","DOI":"10.1109\/CVPR.2017.17"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Frossard, P.: DeepFool: a simple and accurate method to fool deep neural networks. In: CVPR (2016)","DOI":"10.1109\/CVPR.2016.282"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Mummadi, C.K., Brox, T., Metzen, J.H.: Defending against universal perturbations with shared adversarial training. In: ICCV (2019)","DOI":"10.1109\/ICCV.2019.00503"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-030-32245-8_34","volume-title":"Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2019","author":"U Ozbulak","year":"2019","unstructured":"Ozbulak, U., Van Messem, A., De Neve, W.: Impact of adversarial examples on deep learning models for biomedical image segmentation. In: Shen, D., et al. (eds.) MICCAI 2019. LNCS, vol. 11765, pp. 300\u2013308. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32245-8_34"},{"key":"1_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-030-32245-8_4","volume-title":"Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2019","author":"M Perslev","year":"2019","unstructured":"Perslev, M., Dam, E.B., Pai, A., Igel, C.: One network to segment them all: a general, lightweight system for accurate 3D medical image segmentation. In: Shen, D., et al. (eds.) MICCAI 2019. LNCS, vol. 11765, pp. 30\u201338. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32245-8_4"},{"key":"1_CR26","unstructured":"Ramachandran, P., Zoph, B., Le, Q.: Searching for activation functions. In: ICLR (2018)"},{"key":"1_CR27","unstructured":"Shafahi, A., et al.: Adversarial training for free! In: NeurIPS (2019)"},{"key":"1_CR28","unstructured":"Simpson, A.L., et al.: A large annotated medical image dataset for the development and evaluation of segmentation algorithms. CoRR abs\/1902.09063 (2019)"},{"key":"1_CR29","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: ICLR (2014)"},{"key":"1_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-030-32226-7_30","volume-title":"Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2019","author":"H Tang","year":"2019","unstructured":"Tang, H., Zhang, C., Xie, X.: NoduleNet: decoupled false positive reduction for pulmonary nodule detection and segmentation. In: Shen, D., et al. (eds.) MICCAI 2019. LNCS, vol. 11769, pp. 266\u2013274. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32226-7_30"},{"key":"1_CR31","unstructured":"Xie, C., Tan, M., Gong, B., Yuille, A.L., Le, Q.V.: Smooth adversarial training. CoRR abs\/2006.14536 (2020)"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Xie, C., Wang, J., Zhang, Z., Zhou, Y., Xie, L., Yuille, A.: Adversarial examples for semantic segmentation and object detection. In: ICCV (2017)","DOI":"10.1109\/ICCV.2017.153"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Yu, Q., et al.: C2FNAS: coarse-to-fine neural architecture search for 3D medical image segmentation. In: CVPR (2020)","DOI":"10.1109\/CVPR42600.2020.00418"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, H., Wang, J.: Towards adversarially robust object detection. In: ICCV (2019)","DOI":"10.1109\/ICCV.2019.00051"},{"key":"1_CR35","unstructured":"Zhang, H., Yu, Y., Jiao, J., Xing, E.P., Ghaoui, L.E., Jordan, M.I.: Theoretically principled trade-off between robustness and accuracy. In: International Conference on Machine Learning (ICML) (2019)"},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Siddiquee, M.M.R., Tajbakhsh, N., Liang, J.: Unet++: redesigning skip connections to exploit multiscale features in image segmentation. Trans. Med. Imaging (2019)","DOI":"10.1109\/TMI.2019.2959609"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Liu, C., Yang, D., Yuille, A., Xu, D.: V-NAS: neural architecture search for volumetric medical image segmentation. In: 2019 International Conference on 3D Vision (3DV) (2019)","DOI":"10.1109\/3DV.2019.00035"},{"key":"1_CR38","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Xia, Y., Shen, W., Fishman, E., Yuille, A.: A 3D coarse-to-fine framework for volumetric medical image segmentation. In: International Conference on 3D Vision (3DV) (2018)","DOI":"10.1109\/3DV.2018.00083"}],"container-title":["Lecture Notes in Computer Science","Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87199-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T00:31:06Z","timestamp":1673310666000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87199-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030871987","9783030871994"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87199-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"21 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MICCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Medical Image Computing and Computer-Assisted Intervention","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Strasbourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"miccai2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/miccai2021.org\/en\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1622","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"531","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}