{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T10:17:13Z","timestamp":1778408233249,"version":"3.51.4"},"publisher-location":"Cham","reference-count":67,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031167874","type":"print"},{"value":"9783031167881","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-16788-1_9","type":"book-chapter","created":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T20:35:56Z","timestamp":1663878956000},"page":"133-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Sparse Visual Counterfactual Explanations in\u00a0Image Space"],"prefix":"10.1007","author":[{"given":"Valentyn","family":"Boreiko","sequence":"first","affiliation":[]},{"given":"Maximilian","family":"Augustin","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Croce","sequence":"additional","affiliation":[]},{"given":"Philipp","family":"Berens","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Hein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,20]]},"reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-030-58574-7_14","volume-title":"Computer Vision \u2013 ECCV 2020","author":"M Augustin","year":"2020","unstructured":"Augustin, M., Meinke, A., Hein, M.: Adversarial robustness on in- and out-distribution improves explainability. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12371, pp. 228\u2013245. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58574-7_14"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Avrahami, O., Lischinski, D., Fried, O.: Blended diffusion for text-driven editing of natural images (2021)","DOI":"10.1109\/CVPR52688.2022.01767"},{"issue":"7","key":"9_CR3","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130140","volume":"10","author":"S Bach","year":"2015","unstructured":"Bach, S., Binder, A., Gregoire Montavon, F.K., M\u00fcller, K.R., Samek, W.: On pixel-wise explanations for non-linear classifier decisions by layer-wise relevance propagation. PLoS ONE 10(7), e0130140 (2015)","journal-title":"PLoS ONE"},{"key":"9_CR4","first-page":"1803","volume":"11","author":"D Baehrens","year":"2010","unstructured":"Baehrens, D., Schroeter, T., Harmeling, S., Kawanabe, M., Hansen, K., M\u00fcller, K.R.: How to explain individual classification decisions. J. Mach. Learn. Res. (JMLR) 11, 1803\u20131831 (2010)","journal-title":"J. Mach. Learn. Res. (JMLR)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Barocas, S., Selbst, A.D., Raghavan, M.: The hidden assumptions behind counterfactual explanations and principal reasons. In: FACCT, pp. 80\u201389 (2020)","DOI":"10.1145\/3351095.3372830"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1007\/978-3-030-01270-0_28","volume-title":"Computer Vision \u2013 ECCV 2018","author":"S Beery","year":"2018","unstructured":"Beery, S., Van Horn, G., Perona, P.: Recognition in terra incognita. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11220, pp. 472\u2013489. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01270-0_28"},{"key":"9_CR7","unstructured":"Brendel, W., Bethge, M.: Approximating CNNs with bag-of-local-features models works surprisingly well on imageNet. In: ICLR (2019)"},{"key":"9_CR8","unstructured":"Carmon, Y., Raghunathan, A., Schmidt, L., Duchi, J.C., Liang, P.: Unlabeled data improves adversarial robustness. In: NeurIPS (2019)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Carter, S., Armstrong, Z., Schubert, L., Johnson, I., Olah, C.: Exploring neural networks with activation atlases. Distill (2019)","DOI":"10.23915\/distill.00015"},{"key":"9_CR10","unstructured":"Chang, C.H., Creager, E., Goldenberg, A., Duvenaud, D.: Explaining image classifiers by counterfactual generation. In: ICLR (2019)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Chen, J., Yi, J., Gu, Q.: A Frank-Wolfe framework for efficient and effective adversarial attacks. In: AAAI (2019)","DOI":"10.1609\/aaai.v34i04.5753"},{"key":"9_CR12","unstructured":"Commission, E.: Regulation for laying down harmonised rules on AI. European Commission (2021). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:52021PC0206 &from=EN"},{"key":"9_CR13","unstructured":"Croce, F., et al.: Robustbench: a standardized adversarial robustness benchmark. In: NeurIPS Track on Benchmark and Datasets (2021)"},{"key":"9_CR14","unstructured":"Croce, F., Hein, M.: Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In: ICML (2020)"},{"key":"9_CR15","unstructured":"Croce, F., Hein, M.: Mind the box: $$l_1$$-APGD for sparse adversarial attacks on image classifiers. In: ICML (2021)"},{"key":"9_CR16","unstructured":"Croce, F., Hein, M.: Adversarial robustness against multiple $$l_p$$-threat models at the price of one and how to quickly fine-tune robust models to another threat model. In: ICML (2022)"},{"key":"9_CR17","unstructured":"Dhariwal, P., Nichol, A.: Diffusion models beat GANs on image synthesis. arXiv preprint arXiv:2105.05233 (2021)"},{"key":"9_CR18","unstructured":"Dhurandhar, A., et al.: Explanations based on the missing: towards contrastive explanations with pertinent negatives. In: NeurIPS (2018)"},{"key":"9_CR19","unstructured":"Engstrom, L., Ilyas, A., Salman, H., Santurkar, S., Tsipras, D.: Robustness (python library) (2019). https:\/\/github.com\/MadryLab\/robustness"},{"key":"9_CR20","unstructured":"Engstrom, L., Ilyas, A., Santurkar, S., Tsipras, D., Tran, B., Madry, A.: Adversarial robustness as a prior for learned representations (2019)"},{"key":"9_CR21","unstructured":"Etmann, C., Lunz, S., Maass, P., Sch\u00f6nlieb, C.B.: On the connection between adversarial robustness and saliency map interpretability. In: ICML (2019)"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Gao, S., Li, Z.Y., Yang, M.H., Cheng, M.M., Han, J., Torr, P.: Large-scale unsupervised semantic segmentation. arXiv preprint arXiv:2106.03149 (2021)","DOI":"10.1109\/TPAMI.2022.3218275"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Goh, G., et al.: Multimodal neurons in artificial neural networks. Distill (2021)","DOI":"10.23915\/distill.00030"},{"key":"9_CR24","unstructured":"Gowal, S., Qin, C., Uesato, J., Mann, T., Kohli, P.: Uncovering the limits of adversarial training against norm-bounded adversarial examples. arXiv preprint arXiv:2010.03593v2 (2020)"},{"key":"9_CR25","unstructured":"Goyal, Y., Wu, Z., Ernst, J., Batra, D., Parikh, D., Lee, S.: Counterfactual visual explanations. In: ICML (2019)"},{"key":"9_CR26","unstructured":"Guo, C., Pleiss, G., Sun, Y., Weinberger, K.Q.: On calibration of modern neural networks. In: ICML (2017)"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Identity mappings in deep residual networks. In: ECCV (2016)","DOI":"10.1007\/978-3-319-46493-0_38"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Hendricks, L.A., Akata, Z., Rohrbach, M., Donahue, J., Schiele, B., Darrell, T.: Generating visual explanations. In: ECCV (2016)","DOI":"10.1007\/978-3-319-46493-0_1"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Hendricks, L.A., Hu, R., Darrell, T., Akata, Z.: Grounding visual explanations. In: ECCV (2018)","DOI":"10.1007\/978-3-030-01216-8_17"},{"key":"9_CR30","unstructured":"Hendrycks, D., Mu, N., Cubuk, E.D., Zoph, B., Gilmer, J., Lakshminarayanan, B.: AugMix: a simple data processing method to improve robustness and uncertainty. In: ICLR (2020)"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Hendrycks, D., Zhao, K., Basart, S., Steinhardt, J., Song, D.: Natural adversarial examples. In: CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.01501"},{"key":"9_CR32","unstructured":"Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: GANs trained by a two time-scale update rule converge to a local nash equilibrium. In: NeurIPS (2017)"},{"key":"9_CR33","doi-asserted-by":"publisher","unstructured":"Hohman, F., Park, H., Robinson, C., Chau, D.H.: Summit: scaling deep learning interpretability by visualizing activation and attribution summarizations. IEEE Trans. Vis. Comput. Graph. (TVCG) 26(1), 1096\u20131106 (2020). https:\/\/doi.org\/10.1109\/tvcg.2019.2934659","DOI":"10.1109\/tvcg.2019.2934659"},{"key":"9_CR34","unstructured":"Jaggi, M.: Revisiting Frank-Wolfe: projection-free sparse convex optimization. In: ICML (2013)"},{"key":"9_CR35","doi-asserted-by":"crossref","unstructured":"Kolesnikov, A., et al.: Big transfer (bit): general visual representation learning. In: ECCV (2020)","DOI":"10.1007\/978-3-030-58558-7_29"},{"key":"9_CR36","unstructured":"Laidlaw, C., Singla, S., Feizi, S.: Perceptual adversarial robustness: defense against unseen threat models. In: ICLR (2021)"},{"key":"9_CR37","doi-asserted-by":"crossref","unstructured":"Lang, O., et al.: Explaining in style: training a GAN to explain a classifier in stylespace. arXiv preprint arXiv:2104.13369 (2021)","DOI":"10.1109\/ICCV48922.2021.00073"},{"key":"9_CR38","unstructured":"Lundberg, S.M., Lee, S.I.: A unified approach to interpreting model predictions. In: NeurIPS (2017)"},{"key":"9_CR39","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: ICLR (2018)"},{"key":"9_CR40","unstructured":"Marcinkevi\u010ds, R., Vogt, J.E.: Interpretability and explainability: a machine learning zoo mini-tour. arXiv:2012.01805 (2020)"},{"key":"9_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.artint.2018.07.007","volume":"267","author":"T Miller","year":"2019","unstructured":"Miller, T.: Explanation in artificial intelligence: insights from the social sciences. Artif. Intell. 267, 1\u201338 (2019)","journal-title":"Artif. Intell."},{"key":"9_CR42","unstructured":"Moraru, V.: An algorithm for solving quadratic programming problems. Comput. Sci. J. Moldova 5(2), 14 (1997)"},{"key":"9_CR43","doi-asserted-by":"crossref","unstructured":"Mothilal, R.K., Sharma, A., Tan, C.: Explaining machine learning classifiers through diverse counterfactual explanations. In: FAccT (2020)","DOI":"10.1145\/3351095.3372850"},{"key":"9_CR44","unstructured":"Nichol, A., et al.: Glide: towards photorealistic image generation and editing with text-guided diffusion models (2021)"},{"key":"9_CR45","unstructured":"Pawlowski, N., Coelho de Castro, D., Glocker, B.: Deep structural causal models for tractable counterfactual inference. In: NeurIPS (2020)"},{"key":"9_CR46","unstructured":"Radford, A., et al.: Learning transferable visual models from natural language supervision. In: ICML (2021)"},{"key":"9_CR47","unstructured":"Recht, B., Roelofs, R., Schmidt, L., Shankar, V.: Do CIFAR-10 classifiers generalize to CIFAR-10? arXiv preprint arXiv:1806.00451 (2018)"},{"key":"9_CR48","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: \"why should i trust you?\": explaining the predictions of any classifier. In: KDD, pp. 1135\u20131144 (2016)","DOI":"10.1145\/2939672.2939778"},{"key":"9_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1007\/978-3-030-01249-6_41","volume-title":"Computer Vision \u2013 ECCV 2018","author":"P Samangouei","year":"2018","unstructured":"Samangouei, P., Saeedi, A., Nakagawa, L., Silberman, N.: ExplainGAN: model explanation via decision boundary crossing transformations. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11214, pp. 681\u2013696. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01249-6_41"},{"key":"9_CR50","unstructured":"Sanchez, P., Tsaftaris, S.A.: Diffusion causal models for counterfactual estimation. In: First Conference on Causal Learning and Reasoning (2022)"},{"key":"9_CR51","unstructured":"Santurkar, S., Tsipras, D., Tran, B., Ilyas, A., Engstrom, L., Madry, A.: Image synthesis with a single (robust) classifier. In: NeurIPS (2019)"},{"key":"9_CR52","unstructured":"Schut, L., et al.: Generating interpretable counterfactual explanations by implicit minimisation of epistemic and aleatoric uncertainties. In: AISTATS (2021)"},{"key":"9_CR53","unstructured":"Schutte, K., Moindrot, O., H\u00e9rent, P., Schiratti, J.B., J\u00e9gou, S.: Using styleGAN for visual interpretability of deep learning models on medical images. In: NeurIPS Workshop \"Medical Imaging Meets NeurIPS\" (2020)"},{"issue":"2","key":"9_CR54","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/s11263-019-01228-7","volume":"128","author":"RR Selvaraju","year":"2019","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-cam: visual explanations from deep networks via gradient-based localization. Int. J. Comput. Vision 128(2), 336\u2013359 (2019)","journal-title":"Int. J. Comput. Vision"},{"key":"9_CR55","unstructured":"Simonyan, K., Vedaldi, A., Zisserman, A.: Deep inside convolutional networks: visualising image classification models and saliency maps. In: ICLR (2014)"},{"key":"9_CR56","doi-asserted-by":"crossref","unstructured":"Singla, S., Nushi, B., Shah, S., Kamar, E., Horvitz, E.: Understanding failures of deep networks via robust feature extraction. In: CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.01266"},{"key":"9_CR57","unstructured":"Srinivas, S., Fleuret, F.: Full-gradient representation for neural network visualization. In: NeurIPS (2019)"},{"key":"9_CR58","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: ICLR, pp. 2503\u20132511 (2014)"},{"issue":"11","key":"9_CR59","doi-asserted-by":"publisher","first-page":"1958","DOI":"10.1109\/TPAMI.2008.128","volume":"30","author":"A Torralba","year":"2008","unstructured":"Torralba, A., Fergus, R., Freeman, W.T.: 80 million tiny images: a large data set for nonparametric object and scene recognition. IEEE PAMI 30(11), 1958\u20131970 (2008)","journal-title":"IEEE PAMI"},{"key":"9_CR60","unstructured":"Tsiligkaridis, T., Roberts, J.: Understanding frank-wolfe adversarial training. In: CVPR (2022)"},{"key":"9_CR61","unstructured":"Tsipras, D., Santurkar, S., Engstrom, L., Turner, A., Madry, A.: Robustness may be at odds with accuracy. In: ICLR (2019)"},{"key":"9_CR62","unstructured":"Verma, S., Dickerson, J.P., Hines, K.: Counterfactual explanations for machine learning: a review. arXiv preprint, arXiv:2010.10596 (2020)"},{"key":"9_CR63","first-page":"841","volume":"31","author":"S Wachter","year":"2018","unstructured":"Wachter, S., Mittelstadt, B., Russell, C.: Counterfactual explanations without opening the black box: automated decisions and the GDPR. Harvard J. Law Technol. 31, 841\u2013887 (2018)","journal-title":"Harvard J. Law Technol."},{"key":"9_CR64","unstructured":"Wang, Z., Wang, H., Ramkumar, S., Fredrikson, M., Mardziel, P., Datta, A.: Smoothed geometry for robust attribution. In: NeurIPS (2020)"},{"key":"9_CR65","doi-asserted-by":"crossref","unstructured":"Xie, Q., Luong, M.T., Hovy, E., Le, Q.V.: Self-training with noisy student improves imagenet classification. In: CVPR (2020)","DOI":"10.1109\/CVPR42600.2020.01070"},{"issue":"144","key":"9_CR66","first-page":"1","volume":"18","author":"Y Yu","year":"2017","unstructured":"Yu, Y., Zhang, X., Schuurmans, D.: Generalized conditional gradient for sparse estimation. J. Mach. Learn. Res. 18(144), 1\u201346 (2017)","journal-title":"J. Mach. Learn. Res."},{"key":"9_CR67","unstructured":"Zech, J.R., Badgeley, M.A., Liu, M., Costa, A.B., Titano, J.J., Oermann, E.K.: Confounding variables can degrade generalization performance of radiological deep learning models. arXiv preprint arXiv:1807.00431 (2018)"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16788-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T03:57:42Z","timestamp":1676865462000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16788-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031167874","9783031167881"],"references-count":67,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16788-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"20 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DAGM GCPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"DAGM German Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Konstanz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"44","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dagm2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/gcpr-vmv-2022.uni-konstanz.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"78","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}