{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:27:34Z","timestamp":1742934454647,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031366246"},{"type":"electronic","value":"9783031366253"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-36625-3_23","type":"book-chapter","created":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T12:02:36Z","timestamp":1688731356000},"page":"284-294","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-label Adversarial Defense Scheme Based on\u00a0Negative Correlation Ensemble"],"prefix":"10.1007","author":[{"given":"Hongwei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wenjian","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Zhijian","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,8]]},"reference":[{"key":"23_CR1","unstructured":"Abbasi, M., Gagn\u00e9, C.: Robustness to adversarial examples through an ensemble of specialists. In: Proceedings of the 5th International Conference on Learning Representations. OpenReview (2017)"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar, N., Mian, A.S.: Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6, 14410\u201314430 (2018)","journal-title":"IEEE Access"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Akhtar, Z., Mouree, M.R., Dasgupta, D.: Utility of deep learning features for facial attributes manipulation detection. In: Proceedings of the IEEE International Conference on Humanized Computing and Communication with Artificial Intelligence, pp. 55\u201360. IEEE (2020)","DOI":"10.1109\/HCCAI49649.2020.00015"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Al-Qizwini, M., Barjasteh, I., Al-Qassab, H., Radha, H.: Deep Learning Algorithm for Autonomous Driving Using GoogLeNet. In: Proceedings of the IEEE Intelligent Vehicles Symposium, pp. 89\u201396. IEEE (2017)","DOI":"10.1109\/IVS.2017.7995703"},{"key":"23_CR5","unstructured":"Bagnall, A., Bunescu, R., Stewart, G.: Training Ensembles to Detect Adversarial Examples. CoRR abs\/ arXiv: 1712.04006 (2017)"},{"issue":"3","key":"23_CR6","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s11063-005-1084-6","volume":"21","author":"ZSH Chan","year":"2005","unstructured":"Chan, Z.S.H., Kasabov, N.K.: A preliminary study on negative correlation learning via correlation-corrected data (NCCD). Neural Process. Lett. 21(3), 207\u2013214 (2005)","journal-title":"Neural Process. Lett."},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Dabouei, A., Soleymani, S., Taherkhani, F., Dawson, J.M., Nasrabadi, N.M.: Exploiting joint robustness to adversarial perturbations. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1119\u20131128. IEEE, Seattle, WA, USA (2020)","DOI":"10.1109\/CVPR42600.2020.00120"},{"issue":"1","key":"23_CR8","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/s11263-014-0733-5","volume":"111","author":"M Everingham","year":"2015","unstructured":"Everingham, M., Eslami, S., Van Gool, L., Williams, C.K., Winn, J., Zisserman, A.: The Pascal Visual Object Classes Challenge: A Retrospective. Int. J. Comput. Vision 111(1), 98\u2013136 (2015)","journal-title":"Int. J. Comput. Vision"},{"issue":"2","key":"23_CR9","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11263-009-0275-4","volume":"88","author":"M Everingham","year":"2010","unstructured":"Everingham, M., Van Gool, L., Williams, C.K., Winn, J., Zisserman, A.: The Pascal Visual Object Classes (VOC) Challenge. Int. J. Comput. Vision 88(2), 303\u2013338 (2010)","journal-title":"Int. J. Comput. Vision"},{"key":"23_CR10","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: Proceedings of the International Conference on Learning Representations, OpenReview (2015)"},{"key":"23_CR11","unstructured":"Kariyappa, S., Qureshi, M.K.: Improving Adversarial Robustness of Ensembles with Diversity Training. arXiv e-prints pp. arXiv-1901 (2019)"},{"key":"23_CR12","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Proceedings of the Advances in Neural Information Processing Systems, pp. 1106\u20131114 (2012)"},{"issue":"7553","key":"23_CR13","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep Learning. Nature 521(7553), 436\u2013444 (2015)","journal-title":"Nature"},{"issue":"10","key":"23_CR14","doi-asserted-by":"publisher","first-page":"1399","DOI":"10.1016\/S0893-6080(99)00073-8","volume":"12","author":"Y Liu","year":"1999","unstructured":"Liu, Y., Yao, X.: Ensemble learning via negative correlation. Neural Netw. 12(10), 1399\u20131404 (1999)","journal-title":"Neural Netw."},{"issue":"6","key":"23_CR15","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1109\/3477.809027","volume":"29","author":"Y Liu","year":"1999","unstructured":"Liu, Y., Yao, X.: Simultaneous training of negatively correlated neural networks in an ensemble. IEEE Trans. Syst. Man Cybern. 29(6), 716\u2013725 (1999)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"4","key":"23_CR16","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1109\/4235.887237","volume":"4","author":"Y Liu","year":"2000","unstructured":"Liu, Y., Yao, X., Higuchi, T.: Evolutionary ensembles with negative correlation learning. IEEE Trans. Evol. Comput. 4(4), 380\u2013387 (2000)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"23_CR17","doi-asserted-by":"publisher","unstructured":"Luo, W., Zhang, H., Kong, L., Chen, Z., Tang, K.: Defending adversarial examples by negative correlation ensemble. In: Data Mining and Big Data: 7th International Conference, DMBD 2022, Beijing, China, November 21\u201324 2022, Proceedings, Part II. pp. 424\u2013438. Springer (2023). https:\/\/doi.org\/10.1007\/978-981-19-8991-9_30","DOI":"10.1007\/978-981-19-8991-9_30"},{"key":"23_CR18","unstructured":"Pang, T., Xu, K., Du, C., Chen, N., Zhu, J.: Improving adversarial robustness via promoting ensemble diversity. In: Proceedings of the 36th International Conference on Machine Learning vol. 97, pp. 4970\u20134979. PMLR, Long Beach, California, USA (2019)"},{"key":"23_CR19","unstructured":"Paszke, A., et al.: Pytorch: An imperative style, high-performance deep learning library. In: Advances in Neural Information Processing Systems 32 (2019)"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Song, Q., Jin, H., Huang, X., Hu, X.: Multi-label Adversarial Perturbations. In: Proceedings of the IEEE International Conference on Data Mining, pp. 1242\u20131247. IEEE, Singapore (2018)","DOI":"10.1109\/ICDM.2018.00166"},{"key":"23_CR21","unstructured":"Sun, Y., Chen, Y., Wang, X., Tang, X.: Deep learning face representation by joint identification-verification. In: Proceedings of the Advances in Neural Information Processing Systems, pp. 1988\u20131996 (2014)"},{"key":"23_CR22","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Wang, S., Chen, H., Yao, X.: Negative correlation learning for classification ensembles. In: Proceedings of the International Joint Conference on Neural Networks, pp. 1\u20138. IEEE, Barcelona, Spain (2010)","DOI":"10.1109\/IJCNN.2010.5596702"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Yan, S., Xiong, Y., Lin, D.: Spatial temporal graph convolutional networks for skeleton-based action recognition. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 7444\u20137452 (2018)","DOI":"10.1609\/aaai.v32i1.12328"},{"issue":"9","key":"23_CR25","doi-asserted-by":"publisher","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","volume":"30","author":"X Yuan","year":"2019","unstructured":"Yuan, X., He, P., Zhu, Q., Li, X.: Adversarial examples: Attacks and defenses for deep learning. IEEE Trans. Neural Netw. Learn. Syst. 30(9), 2805\u20132824 (2019)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."}],"container-title":["Lecture Notes in Computer Science","Advances in Swarm Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-36625-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T15:29:56Z","timestamp":1710343796000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-36625-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031366246","9783031366253"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-36625-3_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"8 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Swarm Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"swarm2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"170","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"81","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}