{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:43:49Z","timestamp":1742913829961,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031783944"},{"type":"electronic","value":"9783031783951"}],"license":[{"start":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T00:00:00Z","timestamp":1733184000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T00:00:00Z","timestamp":1733184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78395-1_5","type":"book-chapter","created":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T09:37:02Z","timestamp":1733132222000},"page":"65-80","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Analog Layer: Simulating Imperfect Computations in Neural Networks to Improve Robustness and Generalization Ability"],"prefix":"10.1007","author":[{"given":"Giovanni Maria","family":"Manduca","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6911-0302","authenticated-orcid":false,"given":"Antonino","family":"Furnari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6034-0432","authenticated-orcid":false,"given":"Giovanni Maria","family":"Farinella","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,3]]},"reference":[{"unstructured":"Jastrz\u0229bski, S., Kenton, Z., Arpit, D., Ballas, N., Fischer, A., Bengio, Y., Storkey, A. (2017). Three factors influencing minima in sgd. arXiv preprint arXiv:1711.04623","key":"5_CR1"},{"doi-asserted-by":"crossref","unstructured":"Smith, L. N. (2017, March). Cyclical learning rates for training neural networks. In 2017 IEEE winter conference on applications of computer vision (WACV) (pp. 464-472). IEEE","key":"5_CR2","DOI":"10.1109\/WACV.2017.58"},{"unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., Fergus, R. (2013). Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","key":"5_CR3"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s11633-019-1211-x","volume":"17","author":"H Xu","year":"2020","unstructured":"Xu, H., Ma, Y., Liu, H.C., Deb, D., Liu, H., Tang, J.L., Jain, A.K.: Adversarial attacks and defenses in images, graphs and text: A review. Int. J. Autom. Comput. 17, 151\u2013178 (2020)","journal-title":"Int. J. Autom. Comput."},{"unstructured":"Goodfellow, I. J., Shlens, J., Szegedy, C. (2015). Explaining and Harnessing Adversarial Examples. arXiv preprint arXiv:1412.6572","key":"5_CR5"},{"unstructured":"Hinton, G. E., Srivastava, N., Krizhevsky, A., Sutskever, I., Salakhutdinov, R. R. (2012). Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580","key":"5_CR6"},{"unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G. E. (2012). ImageNet Classification with Deep Convolutional Neural Networks. In Advances in Neural Information Processing Systems (pp. 1097-1105)","key":"5_CR7"},{"unstructured":"Yang, S., Xiao, W., Zhang, M., Guo, S., Zhao, J., Shen, F. (2022). Image data augmentation for deep learning: A survey. arXiv preprint arXiv:2204.08610","key":"5_CR8"},{"issue":"1","key":"5_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0197-0","volume":"6","author":"C Shorten","year":"2019","unstructured":"Shorten, C., Khoshgoftaar, T.M.: A survey on image data augmentation for deep learning. Journal of big data 6(1), 1\u201348 (2019)","journal-title":"Journal of big data"},{"unstructured":"Antoniou, A., Storkey, A., Edwards, H. (2017). Data augmentation generative adversarial networks. arXiv preprint arXiv:1711.04340","key":"5_CR10"},{"issue":"5","key":"5_CR11","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1111\/1754-9485.13261","volume":"65","author":"P Chlap","year":"2021","unstructured":"Chlap, P., Min, H., Vandenberg, N., Dowling, J., Holloway, L., Haworth, A.: A review of medical image data augmentation techniques for deep learning applications. J. Med. Imaging Radiat. Oncol. 65(5), 545\u2013563 (2021)","journal-title":"J. Med. Imaging Radiat. Oncol."},{"doi-asserted-by":"crossref","unstructured":"Chen, H., Cao, P. (2019, July). Deep learning based data augmentation and classification for limited medical data learning. In 2019 IEEE international conference on power, intelligent computing and systems (ICPICS) (pp. 300-303). IEEE","key":"5_CR12","DOI":"10.1109\/ICPICS47731.2019.8942411"},{"unstructured":"Loshchilov, I., Hutter, F. (2016). Sgdr: Stochastic gradient descent with warm restarts. arXiv preprint arXiv:1608.03983","key":"5_CR13"},{"unstructured":"Smith, S. L., Kindermans, P. J., Ying, C., Le, Q. V. (2017). Don\u2019t decay the learning rate, increase the batch size. arXiv preprint arXiv:1711.00489","key":"5_CR14"},{"unstructured":"Ba, J., Frey, B. (2013). Adaptive dropout for training deep neural networks. Advances in neural information processing systems, 26","key":"5_CR15"},{"unstructured":"Li, Z., Gong, B., Yang, T. (2016). Improved dropout for shallow and deep learning. Advances in neural information processing systems, 29","key":"5_CR16"},{"issue":"12","key":"5_CR17","doi-asserted-by":"publisher","first-page":"2897","DOI":"10.1109\/TPAMI.2017.2784440","volume":"40","author":"A Achille","year":"2018","unstructured":"Achille, A., Soatto, S.: Information dropout: Learning optimal representations through noisy computation. IEEE Trans. Pattern Anal. Mach. Intell. 40(12), 2897\u20132905 (2018)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"unstructured":"Kingma, D. P., Welling, M. (2013). Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114","key":"5_CR18"},{"doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z. (2016). Rethinking the inception architecture for computer vision. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 2818-2826)","key":"5_CR19","DOI":"10.1109\/CVPR.2016.308"},{"doi-asserted-by":"crossref","unstructured":"Vincent, P., Larochelle, H., Bengio, Y., Manzagol, P. A. (2008, July). Extracting and composing robust features with denoising autoencoders. In Proceedings of the 25th international conference on Machine learning (pp. 1096-1103)","key":"5_CR20","DOI":"10.1145\/1390156.1390294"},{"unstructured":"Sohl-Dickstein, J., Weiss, E., Maheswaranathan, N., Ganguli, S. (2015, June). Deep unsupervised learning using nonequilibrium thermodynamics. In International conference on machine learning (pp. 2256-2265). PMLR","key":"5_CR21"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1007\/978-3-319-46493-0_39","volume-title":"Computer Vision \u2013 ECCV 2016","author":"G Huang","year":"2016","unstructured":"Huang, G., Sun, Yu., Liu, Z., Sedra, D., Weinberger, K.Q.: Deep Networks with Stochastic Depth. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9908, pp. 646\u2013661. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46493-0_39"},{"doi-asserted-by":"crossref","unstructured":"Han, B., Sim, J., Adam, H. (2017). Branchout: Regularization for online ensemble tracking with convolutional neural networks. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 3356-3365)","key":"5_CR23","DOI":"10.1109\/CVPR.2017.63"},{"unstructured":"Noh, H., You, T., Mun, J., Han, B. (2017). Regularizing deep neural networks by noise: Its interpretation and optimization. Advances in neural information processing systems, 30","key":"5_CR24"},{"issue":"4","key":"5_CR25","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/S1364-6613(99)01294-2","volume":"3","author":"RM French","year":"1999","unstructured":"French, R.M.: Catastrophic forgetting in connectionist networks. Trends Cogn. Sci. 3(4), 128\u2013135 (1999)","journal-title":"Trends Cogn. Sci."},{"doi-asserted-by":"publisher","unstructured":"Eddy, W., Ed., \u201cTransmission Control Protocol (TCP)\u201d, STD 7, RFC 9293,https:\/\/doi.org\/10.17487\/RFC9293, August 2022, <https:\/\/www.rfc-editor.org\/info\/rfc9293>","key":"5_CR26","DOI":"10.17487\/RFC9293"},{"unstructured":"Lecun, Y., Cortes, C., Burges, C. J. (1998). Mnist. The MNIST Database of handwritten digits","key":"5_CR27"},{"unstructured":"Xiao, H., Rasul, K., Vollgraf, R. (2017). Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747","key":"5_CR28"},{"unstructured":"Krizhevsky, A., Hinton, G. (2009). Learning multiple layers of features from tiny images","key":"5_CR29"},{"doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D. (2017, May). Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp) (pp. 39-57). Ieee","key":"5_CR30","DOI":"10.1109\/SP.2017.49"},{"unstructured":"Athalye, A., Carlini, N., Wagner, D. (2018, July). Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. In International conference on machine learning (pp. 274-283). PMLR","key":"5_CR31"},{"unstructured":"Dhillon, G. S., Azizzadenesheli, K., Lipton, Z. C., Bernstein, J., Kossaifi, J., Khanna, A., Anandkumar, A. (2018). Stochastic activation pruning for robust adversarial defense. arXiv preprint arXiv:1803.01442","key":"5_CR32"},{"doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S. M., Fawzi, A., Frossard, P. (2016). Deepfool: a simple and accurate method to fool deep neural networks. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 2574-2582)","key":"5_CR33","DOI":"10.1109\/CVPR.2016.282"},{"doi-asserted-by":"crossref","unstructured":"Bengio, Y., Louradour, J., Collobert, R., Weston, J. (2009, June). Curriculum learning. In Proceedings of the 26th annual international conference on machine learning (pp. 41-48)","key":"5_CR34","DOI":"10.1145\/1553374.1553380"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78395-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T17:40:51Z","timestamp":1741974051000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78395-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,3]]},"ISBN":["9783031783944","9783031783951"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78395-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,3]]},"assertion":[{"value":"3 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icpr2024.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}