{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T12:32:43Z","timestamp":1755693163100,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031439001"},{"type":"electronic","value":"9783031439018"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-43901-8_58","type":"book-chapter","created":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T23:08:23Z","timestamp":1696115303000},"page":"611-621","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Certification of\u00a0Deep Learning Models for\u00a0Medical Image Segmentation"],"prefix":"10.1007","author":[{"given":"Othmane","family":"Laousy","sequence":"first","affiliation":[]},{"given":"Alexandre","family":"Araujo","sequence":"additional","affiliation":[]},{"given":"Guillaume","family":"Chassagnon","sequence":"additional","affiliation":[]},{"given":"Nikos","family":"Paragios","sequence":"additional","affiliation":[]},{"given":"Marie-Pierre","family":"Revel","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Vakalopoulou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,1]]},"reference":[{"key":"58_CR1","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/978-3-031-16437-8_36","volume-title":"Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2022","author":"F Almalik","year":"2022","unstructured":"Almalik, F., Yaqub, M., Nandakumar, K.: Self-ensembling vision transformer (sevit) for robust medical image classification. In: Wang, L., Dou, Q., Fletcher, P.T., Speidel, S., Li, S. (eds.) MICCAI 2022. LNCS, vol. 13433, pp. 376\u2013386. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-16437-8_36"},{"key":"58_CR2","unstructured":"Araujo, A., Havens, A., Delattre, B., Allauzen, A., Hu, B.: A unified algebraic perspective on lipschitz neural networks. In: ICLR (2023)"},{"key":"58_CR3","doi-asserted-by":"crossref","unstructured":"Araujo, A., Meunier, L., Pinot, R., Negrevergne, B.: Advocating for multiple defense strategies against adversarial examples. In: ECML (2020)","DOI":"10.1007\/978-3-030-65965-3_11"},{"key":"58_CR4","doi-asserted-by":"crossref","unstructured":"Asgari Taghanaki, S., Das, A., Hamarneh, G.: Vulnerability analysis of chest x-ray image classification against adversarial attacks. In: iMIMIC (2018)","DOI":"10.1007\/978-3-030-02628-8_10"},{"key":"58_CR5","unstructured":"Athalye, A., Carlini, N., Wagner, D.: Obfuscated gradients give a false sense of security: circumventing defenses to adversarial examples. In: ICML (2018)"},{"key":"58_CR6","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.compmedimag.2015.02.007","volume":"43","author":"J Bernal","year":"2015","unstructured":"Bernal, J., et al.: Wm-dova maps for accurate polyp highlighting in colonoscopy: validation vs. saliency maps from physicians. Comput. Med. Imaging Graph. 43, 99\u2013111 (2015)","journal-title":"Comput. Med. Imaging Graph."},{"key":"58_CR7","unstructured":"Carlini, N., Tramer, F., Kolter, J.Z., et al.: (certified!!) adversarial robustness for free!. In: ICLR (2023)"},{"key":"58_CR8","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: IEEE on Security and Privacy (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"58_CR9","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1109\/TPAMI.2017.2699184","volume":"40","author":"LC Chen","year":"2016","unstructured":"Chen, L.C., Papandreou, G., Kokkinos, I., Murphy, K., Yuille, A.L.: Deeplab: semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected crfs. IEEE Pattern Anal. Mach. Intell. 40, 834\u2013848 (2016)","journal-title":"IEEE Pattern Anal. Mach. Intell."},{"key":"58_CR10","unstructured":"Codella, N.C.F., et al.: Skin lesion analysis toward melanoma detection 2018: a challenge hosted by the international skin imaging collaboration (ISIC). CoRR (2019)"},{"key":"58_CR11","unstructured":"Cohen, J., Rosenfeld, E., Kolter, Z.: Certified adversarial robustness via randomized smoothing. In: ICML (2019)"},{"key":"58_CR12","unstructured":"Croce, F., Hein, M.: Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In: ICML (2020)"},{"key":"58_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-87199-4_1","volume-title":"Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2021","author":"L Daza","year":"2021","unstructured":"Daza, L., P\u00e9rez, J.C., Arbel\u00e1ez, P.: Towards robust general medical image segmentation. In: de Bruijne, M., et al. (eds.) MICCAI 2021. LNCS, vol. 12903, pp. 3\u201313. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-87199-4_1"},{"key":"58_CR14","unstructured":"Dhariwal, P., Nichol, A.: Diffusion models beat gans on image synthesis. In: NeurIPS (2021)"},{"key":"58_CR15","unstructured":"Fischer, M., Baader, M., Vechev, M.: Scalable certified segmentation via randomized smoothing. In: ICML (2021)"},{"key":"58_CR16","doi-asserted-by":"crossref","unstructured":"Goodfellow, I., et al.: Generative adversarial networks. ACM (2020)","DOI":"10.1145\/3422622"},{"key":"58_CR17","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv:1412.6572 (2014)"},{"key":"58_CR18","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: CVPR (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"58_CR19","first-page":"65","volume":"6","author":"S Holm","year":"1979","unstructured":"Holm, S.: A simple sequentially rejective multiple test procedure. J. Stat. 6, 65\u201370 (1979)","journal-title":"J. Stat."},{"key":"58_CR20","unstructured":"Howard, A.G., et al.: Mobilenets: efficient convolutional neural networks for mobile vision applications. arXiv:1704.04861 (2017)"},{"key":"58_CR21","first-page":"475","volume":"4","author":"S Jaeger","year":"2014","unstructured":"Jaeger, S., Candemir, S., Antani, S., W\u00e1ng, Y.X.J., Lu, P.X., Thoma, G.: Two public chest x-ray datasets for computer-aided screening of pulmonary diseases. Quant. Imaging Med. Surg. 4, 475 (2014)","journal-title":"Quant. Imaging Med. Surg."},{"key":"58_CR22","doi-asserted-by":"crossref","unstructured":"Jha, D., et al.: Resunet++: an advanced architecture for medical image segmentation. In: IEEE on Multimedia (2019)","DOI":"10.1109\/ISM46123.2019.00049"},{"key":"58_CR23","unstructured":"Laousy, O., et al.: Towards better certified segmentation via diffusion models. In: UAI (2023)"},{"key":"58_CR24","doi-asserted-by":"crossref","unstructured":"Long, J., Shelhamer, E., Darrell, T.: Fully convolutional networks for semantic segmentation. In: CVPR (2015)","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"58_CR25","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv:1706.06083 (2017)"},{"key":"58_CR26","unstructured":"Meunier, L., Delattre, B., Araujo, A., Allauzen, A.: A dynamical system perspective for lipschitz neural networks. In: ICML (2022)"},{"key":"58_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/978-3-030-00928-1_56","volume-title":"Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2018","author":"M Paschali","year":"2018","unstructured":"Paschali, M., Conjeti, S., Navarro, F., Navab, N.: Generalizability vs. robustness: investigating medical imaging networks using adversarial examples. In: Frangi, A.F., Schnabel, J.A., Davatzikos, C., Alberola-L\u00f3pez, C., Fichtinger, G. (eds.) MICCAI 2018. LNCS, vol. 11070, pp. 493\u2013501. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00928-1_56"},{"key":"58_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-319-24574-4_28","volume-title":"Medical Image Computing and Computer-Assisted Intervention \u2013 MICCAI 2015","author":"O Ronneberger","year":"2015","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: Navab, N., Hornegger, J., Wells, W.M., Frangi, A.F. (eds.) MICCAI 2015. LNCS, vol. 9351, pp. 234\u2013241. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24574-4_28"},{"key":"58_CR29","unstructured":"Salman, H., Sun, M., Yang, G., Kapoor, A., Kolter, J.Z.: Denoised smoothing: a provable defense for pretrained classifiers. In: NeurIPS (2020)"},{"key":"58_CR30","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1007\/978-3-031-16440-8_63","volume-title":"Medical Image Computing and Computer Assisted Intervention","author":"A Santhirasekaram","year":"2022","unstructured":"Santhirasekaram, A., Kori, A., Winkler, M., Rockall, A., Glocker, B.: Vector quantisation for robust segmentation. In: Wang, L., Dou, Q., Fletcher, P.T., Speidel, S., Li, S. (eds.) MICCAI 2022. LNCS, vol. 13434, pp. 663\u2013672. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-16440-8_63"},{"key":"58_CR31","doi-asserted-by":"publisher","first-page":"71","DOI":"10.2214\/ajr.174.1.1740071","volume":"174","author":"J Shiraishi","year":"2000","unstructured":"Shiraishi, J., et al.: Development of a digital image database for chest radiographs with and without a lung nodule: receiver operating characteristic analysis of radiologists\u2019 detection of pulmonary nodules. Am. J. Roentgenol. 174, 71\u201374 (2000)","journal-title":"Am. J. Roentgenol."},{"key":"58_CR32","doi-asserted-by":"publisher","first-page":"82031","DOI":"10.1109\/ACCESS.2021.3086020","volume":"9","author":"N Siddique","year":"2021","unstructured":"Siddique, N., Paheding, S., Elkin, C.P., Devabhaktuni, V.: U-net and its variants for medical image segmentation: a review of theory and applications. IEEE Access 9, 82031\u201382057 (2021)","journal-title":"IEEE Access"},{"key":"58_CR33","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Ioffe, S., Vanhoucke, V., Alemi, A.: Inception-v4, inception-resnet and the impact of residual connections on learning. In: AAAI (2017)","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"58_CR34","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. arXiv:1312.6199 (2013)"},{"key":"58_CR35","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.media.2005.02.002","volume":"10","author":"B Van Ginneken","year":"2006","unstructured":"Van Ginneken, B., Stegmann, M.B., Loog, M.: Segmentation of anatomical structures in chest radiographs using supervised methods: a comparative study on a public database. Med. Image Anal. 10, 19\u201340 (2006)","journal-title":"Med. Image Anal."},{"key":"58_CR36","unstructured":"Wang, R., Lei, T., Cui, R., Zhang, B., Meng, H., Nandi, A.K.: Medical image segmentation using deep learning: a survey. arXiv:2009.13120v3 (2020)"},{"key":"58_CR37","doi-asserted-by":"crossref","unstructured":"Xie, C., Wang, J., Zhang, Z., Zhou, Y., Xie, L., Yuille, A.: Adversarial examples for semantic segmentation and object detection. In: CVPR (2017)","DOI":"10.1109\/ICCV.2017.153"},{"key":"58_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-030-87199-4_4","volume-title":"Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2021","author":"Q Yao","year":"2021","unstructured":"Yao, Q., He, Z., Lin, Y., Ma, K., Zheng, Y., Zhou, S.K.: A hierarchical feature constraint to\u00a0camouflage medical adversarial attacks. In: de Bruijne, M., et al. (eds.) MICCAI 2021. LNCS, vol. 12903, pp. 36\u201347. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-87199-4_4"}],"container-title":["Lecture Notes in Computer Science","Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-43901-8_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T15:25:28Z","timestamp":1710170728000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-43901-8_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031439001","9783031439018"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-43901-8_58","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MICCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Medical Image Computing and Computer-Assisted Intervention","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"miccai2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conferences.miccai.org\/2023\/en\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2250","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"730","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}