{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:59:25Z","timestamp":1757311165299,"version":"3.40.3"},"publisher-location":"Cham","reference-count":66,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031729881"},{"type":"electronic","value":"9783031729898"}],"license":[{"start":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T00:00:00Z","timestamp":1729900800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T00:00:00Z","timestamp":1729900800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-72989-8_23","type":"book-chapter","created":{"date-parts":[[2024,10,25]],"date-time":"2024-10-25T17:02:04Z","timestamp":1729875724000},"page":"401-418","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Augmented Neural Fine-Tuning for\u00a0Efficient Backdoor Purification"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5522-4456","authenticated-orcid":false,"given":"Nazmul","family":"Karim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7017-0158","authenticated-orcid":false,"given":"Abdullah Al","family":"Arafat","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3357-9720","authenticated-orcid":false,"given":"Umar","family":"Khalid","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5967-1058","authenticated-orcid":false,"given":"Zhishan","family":"Guo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3434-1359","authenticated-orcid":false,"given":"Nazanin","family":"Rahnavard","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,26]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed, S., Al\u00a0Arafat, A., Rizve, M.N., Hossain, R., Guo, Z., Rakin, A.S.: SSDA: secure source-free domain adaptation. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 19180\u201319190 (2023)","DOI":"10.1109\/ICCV51070.2023.01757"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Barni, M., Kallas, K., Tondi, B.: A new backdoor attack in CNNs by training set corruption without label poisoning. In: 2019 IEEE International Conference on Image Processing (ICIP), pp. 101\u2013105. IEEE (2019)","DOI":"10.1109\/ICIP.2019.8802997"},{"issue":"11","key":"23_CR3","doi-asserted-by":"publisher","first-page":"8364","DOI":"10.1109\/JIOT.2022.3161050","volume":"9","author":"J Bian","year":"2022","unstructured":"Bian, J., et al.: Machine learning in real-time internet of things (IoT) systems: a survey. IEEE Internet Things J. 9(11), 8364\u20138386 (2022)","journal-title":"IEEE Internet Things J."},{"key":"23_CR4","doi-asserted-by":"publisher","unstructured":"Bojar, O., et al.: Findings of the 2014 workshop on statistical machine translation. In: Proceedings of the Ninth Workshop on Statistical Machine Translation, pp. 12\u201358. Association for Computational Linguistics, Baltimore, Maryland, USA, June 2014. https:\/\/doi.org\/10.3115\/v1\/W14-3302. https:\/\/aclanthology.org\/W14-3302","DOI":"10.3115\/v1\/W14-3302"},{"issue":"1","key":"23_CR5","first-page":"14632","volume":"23","author":"L Carratino","year":"2022","unstructured":"Carratino, L., Ciss\u00e9, M., Jenatton, R., Vert, J.P.: On mixup regularization. J. Mach. Learn. Res. 23(1), 14632\u201314662 (2022)","journal-title":"J. Mach. Learn. Res."},{"key":"23_CR6","unstructured":"Chai, S., Chen, J.: One-shot neural backdoor erasing via adversarial weight masking. arXiv preprint arXiv:2207.04497 (2022)"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Chen, H., Fu, C., Zhao, J., Koushanfar, F.: DeepInspect: a black-box trojan detection and mitigation framework for deep neural networks. In: IJCAI, p.\u00a08 (2019)","DOI":"10.24963\/ijcai.2019\/647"},{"key":"23_CR8","unstructured":"Chen, K., Lou, X., Xu, G., Li, J., Zhang, T.: Clean-image backdoor: attacking multi-label models with poisoned labels only. In: The Eleventh International Conference on Learning Representations (2023)"},{"key":"23_CR9","unstructured":"Chen, X., Liu, C., Li, B., Lu, K., Song, D.: Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 (2017)"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Cheng, S., Liu, Y., Ma, S., Zhang, X.: Deep feature space trojan attack of neural networks by controlled detoxification. In: AAAI, pp. 1148\u20131156 (2021)","DOI":"10.1609\/aaai.v35i2.16201"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: CVPR, pp. 248\u2013255. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Doan, K., Lao, Y., Zhao, W., Li, P.: LIRA: learnable, imperceptible and robust backdoor attacks. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 11966\u201311976 (2021)","DOI":"10.1109\/ICCV48922.2021.01175"},{"key":"23_CR13","doi-asserted-by":"publisher","first-page":"4521","DOI":"10.1109\/TIFS.2021.3108407","volume":"16","author":"M Edraki","year":"2021","unstructured":"Edraki, M., Karim, N., Rahnavard, N., Mian, A., Shah, M.: Odyssey: creation, analysis and detection of trojan models. IEEE Trans. Inf. Forensics Secur. 16, 4521\u20134533 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11263-009-0275-4","volume":"88","author":"M Everingham","year":"2010","unstructured":"Everingham, M., Van Gool, L., Williams, C.K., Winn, J., Zisserman, A.: The pascal visual object classes (VOC) challenge. Int. J. Comput. Vision 88, 303\u2013338 (2010)","journal-title":"Int. J. Comput. Vision"},{"key":"23_CR15","unstructured":"Foret, P., Kleiner, A., Mobahi, H., Neyshabur, B.: Sharpness-aware minimization for efficiently improving generalization. In: International Conference on Learning Representations (2021). https:\/\/openreview.net\/forum?id=6Tm1mposlrM"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Gao, Y., Xu, C., Wang, D., Chen, S., Ranasinghe, D.C., Nepal, S.: Strip: a defence against trojan attacks on deep neural networks. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 113\u2013125 (2019)","DOI":"10.1145\/3359789.3359790"},{"key":"23_CR17","doi-asserted-by":"publisher","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","volume":"7","author":"T Gu","year":"2019","unstructured":"Gu, T., Liu, K., Dolan-Gavitt, B., Garg, S.: BadNets: evaluating backdooring attacks on deep neural networks. IEEE Access 7, 47230\u201347244 (2019)","journal-title":"IEEE Access"},{"key":"23_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1007\/978-3-319-46493-0_38","volume-title":"Computer Vision \u2013 ECCV 2016","author":"K He","year":"2016","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Identity mappings in deep residual networks. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9908, pp. 630\u2013645. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46493-0_38"},{"key":"23_CR19","unstructured":"Hong, S., Chandrasekaran, V., Kaya, Y., Dumitra\u015f, T., Papernot, N.: On the effectiveness of mitigating data poisoning attacks with gradient shaping. arXiv preprint arXiv:2002.11497 (2020)"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Janai, J., G\u00fcney, F., Behl, A., Geiger, A., et\u00a0al.: Computer vision for autonomous vehicles: problems, datasets and state of the art. Found. Trends\u00ae Comput. Graph. Vis. 12(1\u20133), 1\u2013308 (2020)","DOI":"10.1561\/0600000079"},{"key":"23_CR21","unstructured":"Karim, N., Arafat, A.A., Rakin, A.S., Guo, Z., Rahnavard, N.: Fisher information guided purification against backdoor attacks. In: Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS) (2024)"},{"key":"23_CR22","unstructured":"Krizhevsky, A., Hinton, G., et\u00a0al.: Learning multiple layers of features from tiny images (2009)"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Kuehne, H., Jhuang, H., Garrote, E., Poggio, T., Serre, T.: HMDB: a large video database for human motion recognition. In: 2011 International Conference on Computer Vision, pp. 2556\u20132563. IEEE (2011)","DOI":"10.1109\/ICCV.2011.6126543"},{"key":"23_CR24","unstructured":"Le, Y., Yang, X.: Tiny imagenet visual recognition challenge. CS 231N 7(7), 3 (2015)"},{"key":"23_CR25","unstructured":"Levine, A., Feizi, S.: Deep partition aggregation: provable defense against general poisoning attacks. arXiv preprint arXiv:2006.14768 (2020)"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: PointBA: towards backdoor attacks in 3d point cloud. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 16492\u201316501 (2021)","DOI":"10.1109\/ICCV48922.2021.01618"},{"key":"23_CR27","unstructured":"Li, Y., Lyu, X., Koren, N., Lyu, L., Li, B., Ma, X.: Anti-backdoor learning: training clean models on poisoned data. Adv. Neural Inf. Process. Syst. 34 (2021)"},{"key":"23_CR28","unstructured":"Li, Y., Lyu, X., Koren, N., Lyu, L., Li, B., Ma, X.: Neural attention distillation: Erasing backdoor triggers from deep neural networks. In: International Conference on Learning Representations (2021). https:\/\/openreview.net\/forum?id=9l0K4OM-oXE"},{"key":"23_CR29","unstructured":"Li, Y., et al.: Reconstructive neuron pruning for backdoor defense. arXiv preprint arXiv:2305.14876 (2023)"},{"key":"23_CR30","unstructured":"Li, Y., Wu, B., Jiang, Y., Li, Z., Xia, S.T.: Backdoor learning: a survey. arXiv preprint arXiv:2007.08745 (2020)"},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Li, Y., Li, Y., Wu, B., Li, L., He, R., Lyu, S.: Invisible backdoor attack with sample-specific triggers. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 16463\u201316472 (2021)","DOI":"10.1109\/ICCV48922.2021.01615"},{"key":"23_CR32","doi-asserted-by":"crossref","unstructured":"Lin, J., Xu, L., Liu, Y., Zhang, X.: Composite backdoor attack for deep neural network by mixing existing benign features. In: CCS, pp. 113\u2013131 (2020)","DOI":"10.1145\/3372297.3423362"},{"key":"23_CR33","doi-asserted-by":"publisher","unstructured":"Lin, T.-Y.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014, Part V. LNCS, vol. 8693, pp. 740\u2013755. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10602-1_48","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"23_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-030-00470-5_13","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"K Liu","year":"2018","unstructured":"Liu, K., Dolan-Gavitt, B., Garg, S.: Fine-pruning: defending against backdooring attacks on deep neural networks. In: Bailey, M., Holz, T., Stamatogiannakis, M., Ioannidis, S. (eds.) RAID 2018. LNCS, vol. 11050, pp. 273\u2013294. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00470-5_13"},{"key":"23_CR35","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Trojaning attack on neural networks (2017)","DOI":"10.14722\/ndss.2018.23291"},{"key":"23_CR36","doi-asserted-by":"crossref","unstructured":"Liu, Y., Xie, Y., Srivastava, A.: Neural trojans. In: 2017 IEEE International Conference on Computer Design (ICCD), pp. 45\u201348. IEEE (2017)","DOI":"10.1109\/ICCD.2017.16"},{"key":"23_CR37","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)"},{"key":"23_CR38","first-page":"20373","volume":"34","author":"N Manoj","year":"2021","unstructured":"Manoj, N., Blum, A.: Excess capacity and backdoor poisoning. Adv. Neural. Inf. Process. Syst. 34, 20373\u201320384 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"23_CR39","unstructured":"Nguyen, A., Tran, A.: WaNet\u2013imperceptible warping-based backdoor attack. arXiv preprint arXiv:2102.10369 (2021)"},{"key":"23_CR40","first-page":"3454","volume":"33","author":"TA Nguyen","year":"2020","unstructured":"Nguyen, T.A., Tran, A.: Input-aware dynamic backdoor attack. Adv. Neural. Inf. Process. Syst. 33, 3454\u20133464 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"23_CR41","doi-asserted-by":"crossref","unstructured":"Ning, R., Li, J., Xin, C., Wu, H.: Invisible poison: a blackbox clean label backdoor attack to deep neural networks. In: IEEE INFOCOM 2021-IEEE Conference on Computer Communications, pp. 1\u201310. IEEE (2021)","DOI":"10.1109\/INFOCOM42981.2021.9488902"},{"key":"23_CR42","unstructured":"Qi, C.R., Yi, L., Su, H., Guibas, L.J.: PointNet++: deep hierarchical feature learning on point sets in a metric space. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"key":"23_CR43","doi-asserted-by":"crossref","unstructured":"Qiu, H., Zeng, Y., Guo, S., Zhang, T., Qiu, M., Thuraisingham, B.: DeepSweep: an evaluation framework for mitigating DNN backdoor attacks using data augmentation. In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, pp. 363\u2013377 (2021)","DOI":"10.1145\/3433210.3453108"},{"key":"23_CR44","doi-asserted-by":"crossref","unstructured":"Ridnik, T., Sharir, G., Ben-Cohen, A., Ben-Baruch, E., Noy, A.: ML-decoder: scalable and versatile classification head. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 32\u201341 (2023)","DOI":"10.1109\/WACV56688.2023.00012"},{"key":"23_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.physd.2019.132306","volume":"404","author":"A Sherstinsky","year":"2020","unstructured":"Sherstinsky, A.: Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Physica D 404, 132306 (2020)","journal-title":"Physica D"},{"key":"23_CR46","unstructured":"Soomro, K., Zamir, A.R., Shah, M.: UCF101: a dataset of 101 human actions classes from videos in the wild. arXiv preprint arXiv:1212.0402 (2012)"},{"key":"23_CR47","doi-asserted-by":"crossref","unstructured":"Stallkamp, J., Schlipsing, M., Salmen, J., Igel, C.: The German traffic sign recognition benchmark: a multi-class classification competition. In: The 2011 International Joint Conference on Neural Networks, pp. 1453\u20131460. IEEE (2011)","DOI":"10.1109\/IJCNN.2011.6033395"},{"key":"23_CR48","unstructured":"Tiedemann, J.: Parallel data, tools and interfaces in OPUS. In: LREC, vol.\u00a02012, pp. 2214\u20132218. Citeseer (2012)"},{"key":"23_CR49","unstructured":"Tran, B., Li, J., Madry, A.: Spectral signatures in backdoor attacks. Adv. Neural Inf. Process. Syst. 31 (2018)"},{"key":"23_CR50","unstructured":"Turner, A., Tsipras, D., Madry, A.: Clean-label backdoor attacks (2019). https:\/\/openreview.net\/forum?id=HJg6e2CcK7"},{"key":"23_CR51","doi-asserted-by":"crossref","unstructured":"Wang, B., et al.: Neural cleanse: identifying and mitigating backdoor attacks in neural networks. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 707\u2013723. IEEE (2019)","DOI":"10.1109\/SP.2019.00031"},{"key":"23_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-030-58592-1_14","volume-title":"Computer Vision \u2013 ECCV 2020","author":"R Wang","year":"2020","unstructured":"Wang, R., Zhang, G., Liu, S., Chen, P.-Y., Xiong, J., Wang, M.: Practical detection of trojan neural networks: data-limited and data-free cases. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12368, pp. 222\u2013238. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58592-1_14"},{"key":"23_CR53","doi-asserted-by":"crossref","unstructured":"Wang, Z., Zhai, J., Ma, S.: BppAttack: stealthy and efficient trojan attacks against deep neural networks via image quantization and contrastive adversarial learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 15074\u201315084 (2022)","DOI":"10.1109\/CVPR52688.2022.01465"},{"key":"23_CR54","unstructured":"Wu, D., Wang, Y.: Adversarial neuron pruning purifies backdoored deep models. In: NeurIPS (2021)"},{"key":"23_CR55","first-page":"2958","volume":"33","author":"D Wu","year":"2020","unstructured":"Wu, D., Xia, S.T., Wang, Y.: Adversarial weight perturbation helps robust generalization. Adv. Neural. Inf. Process. Syst. 33, 2958\u20132969 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"23_CR56","unstructured":"Wu, Z., et al.: 3d shapenets: a deep representation for volumetric shapes. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1912\u20131920 (2015)"},{"key":"23_CR57","unstructured":"Xian, X., et al.: Understanding backdoor attacks through the adaptability hypothesis. In: Proceedings of International Conference on Machine Learning (2023)"},{"key":"23_CR58","doi-asserted-by":"crossref","unstructured":"Xiang, Z., Miller, D.J., Chen, S., Li, X., Kesidis, G.: A backdoor attack against 3D point cloud classifiers. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 7597\u20137607 (2021)","DOI":"10.1109\/ICCV48922.2021.00750"},{"key":"23_CR59","unstructured":"Zeng, Y., Chen, S., Park, W., Mao, Z.M., Jin, M., Jia, R.: Adversarial unlearning of backdoors via implicit hypergradient. arXiv preprint arXiv:2110.03735 (2021)"},{"key":"23_CR60","unstructured":"Zhang, H., Cisse, M., Dauphin, Y.N., Lopez-Paz, D.: mixup: beyond empirical risk minimization. arXiv preprint arXiv:1710.09412 (2017)"},{"key":"23_CR61","unstructured":"Zhang, L., Deng, Z., Kawaguchi, K., Ghorbani, A., Zou, J.: How does mixup help with robustness and generalization? arXiv preprint arXiv:2010.04819 (2020)"},{"key":"23_CR62","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Liu, Q., Wang, Z., Lu, Z., Hu, Q.: Backdoor defense via deconfounded representation learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 12228\u201312238 (2023)","DOI":"10.1109\/CVPR52729.2023.01177"},{"key":"23_CR63","unstructured":"Zhao, P., Chen, P.Y., Das, P., Ramamurthy, K.N., Lin, X.: Bridging mode connectivity in loss landscapes and adversarial robustness. arXiv preprint arXiv:2005.00060 (2020)"},{"key":"23_CR64","doi-asserted-by":"crossref","unstructured":"Zhao, S., Ma, X., Zheng, X., Bailey, J., Chen, J., Jiang, Y.G.: Clean-label backdoor attacks on video recognition models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14443\u201314452 (2020)","DOI":"10.1109\/CVPR42600.2020.01445"},{"key":"23_CR65","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-031-20065-6_11","volume-title":"ECCV 2022, Part V","author":"R Zheng","year":"2022","unstructured":"Zheng, R., Tang, R., Li, J., Liu, L.: Data-free backdoor removal based on channel lipschitzness. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) ECCV 2022, Part V. LNCS, vol. 13665, pp. 175\u2013191. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-20065-6_11"},{"key":"23_CR66","doi-asserted-by":"crossref","unstructured":"Zhu, M., Wei, S., Shen, L., Fan, Y., Wu, B.: Enhancing fine-tuning based backdoor defense with sharpness-aware minimization. arXiv preprint arXiv:2304.11823 (2023)","DOI":"10.1109\/ICCV51070.2023.00412"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72989-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,25]],"date-time":"2024-10-25T17:14:06Z","timestamp":1729876446000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72989-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,26]]},"ISBN":["9783031729881","9783031729898"],"references-count":66,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72989-8_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,26]]},"assertion":[{"value":"26 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}