{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T07:33:26Z","timestamp":1775374406750,"version":"3.50.1"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031197802","type":"print"},{"value":"9783031197819","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-19781-9_3","type":"book-chapter","created":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T12:12:59Z","timestamp":1666440779000},"page":"36-57","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["FrequencyLowCut Pooling - Plug and Play Against Catastrophic Overfitting"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8371-1734","authenticated-orcid":false,"given":"Julia","family":"Grabinski","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8021-791X","authenticated-orcid":false,"given":"Steffen","family":"Jung","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1327-1243","authenticated-orcid":false,"given":"Janis","family":"Keuper","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8437-7993","authenticated-orcid":false,"given":"Margret","family":"Keuper","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,23]]},"reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1007\/978-3-030-58592-1_29","volume-title":"Computer Vision \u2013 ECCV 2020","author":"M Andriushchenko","year":"2020","unstructured":"Andriushchenko, M., Croce, F., Flammarion, N., Hein, M.: Square attack: a query-efficient black-box adversarial attack via random search. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12368, pp. 484\u2013501. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58592-1_29"},{"key":"3_CR2","unstructured":"Andriushchenko, M., Flammarion, N.: Understanding and improving fast adversarial training. In: Advances in Neural Information Processing Systems, vol. 33, pp. 16048\u201316059 (2020)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 39\u201357. IEEE (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"3_CR4","unstructured":"Carmon, Y., Raghunathan, A., Schmidt, L., Duchi, J.C., Liang, P.S.: Unlabeled data improves adversarial robustness. In: Advances in Neural Information Processing Systems, vol. 32 (2019)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Chaman, A., Dokmanic, I.: Truly shift-invariant convolutional neural networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3773\u20133783 (2021)","DOI":"10.1109\/CVPR46437.2021.00377"},{"key":"3_CR6","unstructured":"Chen, T., Zhang, Z., Liu, S., Chang, S., Wang, Z.: Robust overfitting may be mitigated by properly learned smoothening. In: International Conference on Learning Representations (2021). https:\/\/openreview.net\/forum?id=qZzy5urZw9"},{"key":"3_CR7","unstructured":"Cheng, M., Le, T., Chen, P.Y., Yi, J., Zhang, H., Hsieh, C.J.: Query-efficient hard-label black-box attack: an optimization-based approach. arXiv preprint http:\/\/arxiv.org\/abs\/1807.04457arXiv:1807.04457 (2018)"},{"key":"3_CR8","unstructured":"Croce, F., et al.: RobustBench: a standardized adversarial robustness benchmark. arXiv preprint http:\/\/arxiv.org\/abs\/2010.09670arXiv:2010.09670 (2020)"},{"key":"3_CR9","unstructured":"Croce, F., Hein, M.: Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In: ICML (2020)"},{"key":"3_CR10","unstructured":"Darlow, L.N., Crowley, E.J., Antoniou, A., Storkey, A.J.: CINIC-10 is not ImageNet or CIFAR-10. arXiv preprint arXiv:1810.03505 (2018)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Durall, R., Keuper, M., Keuper, J.: Watch your up-convolution: CNN based generative deep neural networks are failing to reproduce spectral distributions (2020)","DOI":"10.1109\/CVPR42600.2020.00791"},{"key":"3_CR12","unstructured":"Engstrom, L., Ilyas, A., Salman, H., Santurkar, S., Tsipras, D.: Robustness (python library) (2019). https:\/\/github.com\/MadryLab\/robustness"},{"key":"3_CR13","unstructured":"Geirhos, R., Rubisch, P., Michaelis, C., Bethge, M., Wichmann, F.A., Brendel, W.: ImageNet-trained CNNs are biased towards texture; increasing shape bias improves accuracy and robustness. arXiv preprint http:\/\/arxiv.org\/abs\/1811.12231arXiv:1811.12231 (2018)"},{"key":"3_CR14","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 3rd edn. Prentice-Hall Inc. (2006)"},{"key":"3_CR15","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples (2015)"},{"key":"3_CR16","unstructured":"Gowal, S., Qin, C., Uesato, J., Mann, T., Kohli, P.: Uncovering the limits of adversarial training against norm-bounded adversarial examples (2021)"},{"key":"3_CR17","unstructured":"Gowal, S., Rebuffi, S.A., Wiles, O., Stimberg, F., Calian, D.A., Mann, T.A.: Improving robustness using generated data. In: Advances in Neural Information Processing Systems, vol. 34 (2021)"},{"key":"3_CR18","unstructured":"Grabinski, J., Keuper, J., Keuper, M.: Aliasing coincides with CNNs vulnerability towards adversarial attacks. In: The AAAI-2022 Workshop on Adversarial Machine Learning and Beyond (2022). https:\/\/openreview.net\/forum?id=vKc1mLxBebP"},{"key":"3_CR19","unstructured":"Hendrycks, D., Dietterich, T.: Benchmarking neural network robustness to common corruptions and perturbations. In: Proceedings of the International Conference on Learning Representations (2019)"},{"key":"3_CR20","unstructured":"Hendrycks, D., Lee, K., Mazeika, M.: Using pre-training can improve model robustness and uncertainty. In: International Conference on Machine Learning, pp. 2712\u20132721. PMLR (2019)"},{"key":"3_CR21","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. In: Advances in Neural Information Processing Systems, vol. 33, pp. 6840\u20136851 (2020)"},{"key":"3_CR22","unstructured":"Hossain, M.T., Teng, S.W., Sohel, F., Lu, G.: Anti-aliasing deep image classifiers using novel depth adaptive blurring and activation function (2021)"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Jung, S., Keuper, M.: Spectral distribution aware image generation. In: AAAI (2021)","DOI":"10.1609\/aaai.v35i2.16267"},{"key":"3_CR24","unstructured":"Karras, T., et al.: Alias-free generative adversarial networks. In: Advances in Neural Information Processing Systems, vol. 34 (2021)"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Kim, H., Lee, W., Lee, J.: Understanding catastrophic overfitting in single-step adversarial training (2020)","DOI":"10.1609\/aaai.v35i9.16989"},{"key":"3_CR26","unstructured":"Krizhevsky, A.: Learning multiple layers of features from tiny images. University of Toronto, May 2012"},{"key":"3_CR27","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial machine learning at scale (2017)"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Li, Q., Shen, L., Guo, S., Lai, Z.: Wavelet integrated CNNs for noise-robust image classification. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7245\u20137254 (2020)","DOI":"10.1109\/CVPR42600.2020.00727"},{"key":"3_CR29","doi-asserted-by":"publisher","first-page":"7074","DOI":"10.1109\/tip.2021.3101395","volume":"30","author":"Q Li","year":"2021","unstructured":"Li, Q., Shen, L., Guo, S., Lai, Z.: WaveCNet: wavelet integrated CNNs to suppress aliasing effect for noise-robust image classification. IEEE Trans. Image Process. 30, 7074\u20137089 (2021). https:\/\/doi.org\/10.1109\/tip.2021.3101395","journal-title":"IEEE Trans. Image Process."},{"key":"3_CR30","unstructured":"Lohn, A.J.: Downscaling attack and defense: turning what you see back into what you get (2020)"},{"key":"3_CR31","unstructured":"Lorenz, P., Strassel, D., Keuper, M., Keuper, J.: Is robustbench\/autoattack a suitable benchmark for adversarial robustness? In: The AAAI-2022 Workshop on Adversarial Machine Learning and Beyond (2022). https:\/\/openreview.net\/forum?id=aLB3FaqoMBs"},{"key":"3_CR32","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Frossard, P.: DeepFool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2574\u20132582 (2016)","DOI":"10.1109\/CVPR.2016.282"},{"key":"3_CR34","unstructured":"Rade, R., Moosavi-Dezfooli, S.M.: Helper-based adversarial training: reducing excessive margin to achieve a better accuracy vs. robustness trade-off. In: ICML 2021 Workshop on Adversarial Machine Learning (2021). https:\/\/openreview.net\/forum?id=BuD2LmNaU3a"},{"key":"3_CR35","unstructured":"Rebuffi, S.A., Gowal, S., Calian, D.A., Stimberg, F., Wiles, O., Mann, T.: Fixing data augmentation to improve adversarial robustness (2021)"},{"key":"3_CR36","unstructured":"Rice, L., Wong, E., Kolter, Z.: Overfitting in adversarially robust deep learning. In: International Conference on Machine Learning, pp. 8093\u20138104. PMLR (2020)"},{"key":"3_CR37","doi-asserted-by":"crossref","unstructured":"Rony, J., Hafemann, L.G., Oliveira, L.S., Ayed, I.B., Sabourin, R., Granger, E.: Decoupling direction and norm for efficient gradient-based L2 adversarial attacks and defenses. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4322\u20134330 (2019)","DOI":"10.1109\/CVPR.2019.00445"},{"key":"3_CR38","unstructured":"Salman, H., Ilyas, A., Engstrom, L., Kapoor, A., Madry, A.: Do adversarially robust imagenet models transfer better? In: Advances in Neural Information Processing Systems, vol. 33, pp. 3533\u20133545 (2020)"},{"key":"3_CR39","unstructured":"Sehwag, V., et al.: Improving adversarial robustness using proxy distributions (2021)"},{"issue":"1","key":"3_CR40","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/JRPROC.1949.232969","volume":"37","author":"C Shannon","year":"1949","unstructured":"Shannon, C.: Communication in the presence of noise. Proc. IRE 37(1), 10\u201321 (1949). https:\/\/doi.org\/10.1109\/JRPROC.1949.232969","journal-title":"Proc. IRE"},{"key":"3_CR41","doi-asserted-by":"crossref","unstructured":"Stutz, D., Hein, M., Schiele, B.: Relating adversarially robust generalization to flat minima (2021)","DOI":"10.1109\/ICCV48922.2021.00771"},{"key":"3_CR42","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: International Conference on Learning Representations (2014). http:\/\/arxiv.org\/abs\/1312.6199"},{"key":"3_CR43","unstructured":"Wang, Y., Zou, D., Yi, J., Bailey, J., Ma, X., Gu, Q.: Improving adversarial robustness requires revisiting misclassified examples. In: International Conference on Learning Representations (2020). https:\/\/openreview.net\/forum?id=rklOg6EFwS"},{"key":"3_CR44","unstructured":"Wong, E., Rice, L., Kolter, J.Z.: Fast is better than free: revisiting adversarial training. In: International Conference on Learning Representations (2020). https:\/\/openreview.net\/forum?id=BJx040EFvH"},{"key":"3_CR45","unstructured":"Wu, D., Xia, S.T., Wang, Y.: Adversarial weight perturbation helps robust generalization. In: Advances in Neural Information Processing Systems, vol. 33, pp. 2958\u20132969 (2020)"},{"key":"3_CR46","unstructured":"Xiao, Q., Li, K., Zhang, D., Jin, Y.: Wolf in sheep\u2019s clothing - the downscaling attack against deep learning applications (2017)"},{"key":"3_CR47","unstructured":"Zhang, H., Yu, Y., Jiao, J., Xing, E.P., Ghaoui, L.E., Jordan, M.I.: Theoretically principled trade-off between robustness and accuracy. In: International Conference on Machine Learning (2019)"},{"key":"3_CR48","unstructured":"Zhang, J., Zhu, J., Niu, G., Han, B., Sugiyama, M., Kankanhalli, M.: Geometry-aware instance-reweighted adversarial training. In: International Conference on Learning Representations (2021). https:\/\/openreview.net\/forum?id=iAX0l6Cz8ub"},{"key":"3_CR49","unstructured":"Zhang, R.: Making convolutional networks shift-invariant again. In: ICML (2019)"},{"key":"3_CR50","unstructured":"Zou, X., Xiao, F., Yu, Z., Lee, Y.J.: Delving deeper into anti-aliasing in convnets. In: BMVC (2020)"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19781-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:30:48Z","timestamp":1710261048000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19781-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031197802","9783031197819"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19781-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tel Aviv","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Israel","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2022.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5804","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1645","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.21","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.91","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}