{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T20:23:26Z","timestamp":1768681406388,"version":"3.49.0"},"reference-count":77,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LQ21F020006"],"award-info":[{"award-number":["LQ21F020006"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LY21F020003"],"award-info":[{"award-number":["LY21F020003"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Zhejiang Provincial Key Research and Development Program of China","award":["2021C01164"],"award-info":[{"award-number":["2021C01164"]}]},{"name":"Innovative Project for High-level Talents and Overseas Students of Hangzhou City"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mach Learn"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s10994-022-06269-7","type":"journal-article","created":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T19:03:03Z","timestamp":1667329383000},"page":"2105-2130","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Adversarial supervised contrastive learning"],"prefix":"10.1007","volume":"112","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0734-1556","authenticated-orcid":false,"given":"Zhuorong","family":"Li","sequence":"first","affiliation":[]},{"given":"Daiwei","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Minghui","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Canghong","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Hongchuan","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,1]]},"reference":[{"key":"6269_CR1","unstructured":"Alayrac, J., Uesato, J., Huang, P., Fawzi, A., Stanforth, R., & Kohli, P. (2019). Are labels required for improving adversarial robustness? In Advances in neural information processing systems 32: Annual Conference on neural information processing systems 2019, NeurIPS 2019, December 8\u201314, 2019, Vancouver, BC, Canada, pp. 12192\u201312202."},{"key":"6269_CR2","doi-asserted-by":"crossref","unstructured":"Andriushchenko, M., Croce, F., Flammarion, N., & Hein, M. (2020). Square attack: A query-efficient black-box adversarial attack via random search. In Computer vision\u2014ECCV 2020\u201416th European conference, Glasgow, UK, August 23\u201328, 2020, proceedings, part XXIII. Lecture Notes in Computer Science (Vol. 12368, pp. 484\u2013501). Springer.","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"6269_CR3","unstructured":"Arora, S., Hu, W., & Kothari, P.K. (2018). An analysis of the t-sne algorithm for data visualization. In Conference on learning theory, COLT 2018, Stockholm, Sweden, 6\u20139 July 2018. Proceedings of machine learning research (Vol. 75, pp. 1455\u20131462). PMLR."},{"key":"6269_CR4","unstructured":"Athalye, A., Carlini, N., & Wagner, D. (2018). Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. In Proceedings of the 35th international conference on machine learning. Proceedings of machine learning research (Vol. 80, pp. 274\u2013283). PMLR."},{"key":"6269_CR5","unstructured":"Bachman, P., Hjelm, R. D., & Buchwalter, W. (2019). Learning representations by maximizing mutual information across views. In Advances in neural information processing systems 32: Annual conference on neural information processing systems 2019, NeurIPS 2019, December 8\u201314, 2019, Vancouver, BC, Canada, pp. 15509\u201315519."},{"key":"6269_CR6","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","volume":"84","author":"B Biggio","year":"2018","unstructured":"Biggio, B., & Roli, F. (2018). Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recognition, 84, 317\u2013331.","journal-title":"Pattern Recognition"},{"key":"6269_CR7","doi-asserted-by":"crossref","unstructured":"Biggio, B., Corona, I., Maiorca, D., Nelson, B., Srndic, N., Laskov, P., et al. (2013). Evasion attacks against machine learning at test time. In Machine learning and knowledge discovery in databases\u2014European conference, ECML PKDD 2013, Prague, Czech Republic, September 23\u201327, 2013, proceedings, part III (Vol. 8190, pp. 387\u2013402). Springer.","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"6269_CR8","unstructured":"Boopathy, A., Liu, S., Zhang, G., Liu, C., Chen, P.-Y., Chang, S., et al. (2020). Proper network interpretability helps adversarial robustness in classification. In Proceedings of the 37th international conference on machine learning (Vol. 119, pp. 1014\u20131023). PMLR."},{"key":"6269_CR9","doi-asserted-by":"crossref","unstructured":"Carlini, N., & Wagner, D. A. (2017). Adversarial examples are not easily detected: Bypassing ten detection methods. In Proceedings of the 10th ACM workshop on artificial intelligence and security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017 (pp. 3\u201314). ACM.","DOI":"10.1145\/3128572.3140444"},{"key":"6269_CR10","doi-asserted-by":"crossref","unstructured":"Carlini, N. & Wagner, D.A. (2017). Towards evaluating the robustness of neural networks. In 2017 IEEE symposium on security and privacy, SP 2017, San Jose, CA, USA, May 22\u201326, 2017, pp. 39\u201357. IEEE Computer Society.","DOI":"10.1109\/SP.2017.49"},{"key":"6269_CR11","doi-asserted-by":"crossref","unstructured":"Carlucci, F. M., D\u2019Innocente, A., Bucci, S., Caputo, B., & Tommasi, T. (2019). Domain generalization by solving jigsaw puzzles. In IEEE conference on computer vision and pattern recognition, CVPR 2019, Long Beach, CA, USA, June 16\u201320, 2019, pp. 2229\u20132238. Computer Vision Foundation\/IEEE.","DOI":"10.1109\/CVPR.2019.00233"},{"key":"6269_CR12","unstructured":"Chen, T., Kornblith, S., Norouzi, M., & Hinton, G. (2020). A simple framework for contrastive learning of visual representations. In Proceedings of the 37th international conference on machine learning. proceedings of machine learning research (Vol. 119, pp. 1597\u20131607). PMLR."},{"key":"6269_CR13","unstructured":"Chen, T., Kornblith, S., Swersky, K., Norouzi, M., & Hinton, G. E. (2020). Big self-supervised models are strong semi-supervised learners. In Advances in neural information processing systems 33: Annual conference on neural information processing systems 2020, NeurIPS 2020, December 6\u201312, 2020, Virtual."},{"key":"6269_CR14","doi-asserted-by":"crossref","unstructured":"Chen, T., Liu, S., Chang, S., Cheng, Y., Amini, L. & Wang, Z. (2020). Adversarial robustness: From self-supervised pre-training to fine-tuning. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR).","DOI":"10.1109\/CVPR42600.2020.00078"},{"key":"6269_CR15","unstructured":"Ciss\u00e9, M., Bojanowski, P., Grave, E., Dauphin, Y. N., & Usunier, N. (2017). Parseval networks: Improving robustness to adversarial examples. In Proceedings of the 34th international conference on machine learning, ICML 2017, Sydney, NSW, Australia, 6\u201311 August 2017. Proceedings of machine learning research (Vol. 70, pp. 854\u2013863). PMLR."},{"issue":"9","key":"6269_CR16","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TIP.2004.833105","volume":"13","author":"A Criminisi","year":"2004","unstructured":"Criminisi, A., P\u00e9rez, P., & Toyama, K. (2004). Region filling and object removal by exemplar-based image inpainting. IEEE Transactions on Image Processing, 13(9), 1200\u20131212.","journal-title":"IEEE Transactions on Image Processing"},{"key":"6269_CR17","unstructured":"Croce, F., & Hein, M. (2020a). Minimally distorted adversarial examples with a fast adaptive boundary attack. In Proceedings of the 37th international conference on machine learning, ICML 2020, 13\u201318 July 2020, virtual event. Proceedings of machine learning research (Vol. 119, pp. 2196\u20132205). PMLR."},{"key":"6269_CR18","unstructured":"Croce, F., & Hein, M. (2020b). Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In Proceedings of the 37th international conference on machine learning. Proceedings of machine learning research (Vol. 119, pp. 2206\u20132216). PMLR."},{"key":"6269_CR19","unstructured":"Engstrom, L., Ilyas, A., Santurkar, S., Tsipras, D., Tran, B., & Madry, A. (2019). Adversarial robustness as a prior for learned representations."},{"key":"6269_CR20","unstructured":"Fan, L., Liu, S., Chen, P.-Y., Zhang, G., & Gan, C. (2021). When does contrastive learning preserve adversarial robustness from pretraining to finetuning? In A. Beygelzimer, Y. Dauphin, P. Liang, & J. W. Vaughan (Eds.), Advances in neural information processing systems."},{"key":"6269_CR21","unstructured":"Garipov, T., Izmailov, P., Podoprikhin, D., Vetrov, D. P., & Wilson, A. G. (2018). Loss surfaces, mode connectivity, and fast ensembling of DNNS. In Advances in neural information processing systems 31: Annual conference on neural information processing systems 2018, NeurIPS 2018, December 3-8, 2018, Montr\u00e9al, Canada, pp. 8803\u20138812."},{"key":"6269_CR22","unstructured":"Gidaris, S., Singh, P., & Komodakis, N. (2018). Unsupervised representation learning by predicting image rotations. In 6th international conference on learning representations, ICLR 2018, Vancouver, BC, Canada, April 30\u2013May 3, 2018, conference track proceedings. OpenReview.net."},{"key":"6269_CR23","unstructured":"Goodfellow, I. J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., et al. (2014). Generative adversarial nets. In Advances in neural information processing systems 27: Annual conference on neural information processing systems 2014, December 8\u201313 2014, Montreal, Quebec, Canada, pp. 2672\u20132680."},{"key":"6269_CR24","unstructured":"Goodfellow, I.J., Shlens, J., & Szegedy, C. (2015). Explaining and harnessing adversarial examples. In 3rd international conference on learning representations, ICLR 2015, San Diego, CA, USA, May 7\u20139, 2015, conference track proceedings."},{"key":"6269_CR25","unstructured":"Gowal, S., Qin, C., Uesato, J., Mann, T. A., & Kohli, P. (2020). Uncovering the limits of adversarial training against norm-bounded adversarial examples. CoRR abs\/2010.03593 arXiv:2010.03593."},{"key":"6269_CR26","unstructured":"Guo, C., Rana, M., Ciss\u00e9, M., & van\u00a0der Maaten, L. (2018). Countering adversarial images using input transformations. In 6th international conference on learning representations, ICLR 2018, Vancouver, BC, Canada, April 30\u2013May 3, 2018, conference track proceedings. OpenReview.net."},{"key":"6269_CR27","doi-asserted-by":"crossref","unstructured":"He, K., Fan, H., Wu, Y., Xie, S., & Girshick, R.B. (2020). Momentum contrast for unsupervised visual representation learning. In 2020 IEEE\/CVF conference on computer vision and pattern recognition, CVPR 2020, Seattle, WA, USA, June 13\u201319, 2020 (pp. 9726\u20139735). Computer Vision Foundation\/IEEE.","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"6269_CR28","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S. & Sun, J. (2016). Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR).","DOI":"10.1109\/CVPR.2016.90"},{"key":"6269_CR29","unstructured":"Hendrycks, D., & Dietterich, T. (2019). Benchmarking neural network robustness to common corruptions and perturbations. In International conference on learning representations."},{"key":"6269_CR30","unstructured":"Hendrycks, D., Mazeika, M., Kadavath, S. & Song, D. (2019). Using self-supervised learning can improve model robustness and uncertainty. In Advances in neural information processing systems (Vol. 32). Curran Associates, Inc."},{"key":"6269_CR31","unstructured":"Hjelm, R.D., Fedorov, A., Lavoie-Marchildon, S., Grewal, K., Bachman, P., Trischler, A., & Bengio, Y. (2019). Learning deep representations by mutual information estimation and maximization. In 7th international conference on learning representations, ICLR 2019, New Orleans, LA, USA, May 6\u20139, 2019. OpenReview.net."},{"key":"6269_CR32","unstructured":"Hjelm, R. D., Fedorov, A., Lavoie-Marchildon, S., Grewal, K., Bachman, P., Trischler, A., et al. (2019). Learning deep representations by mutual information estimation and maximization. In 7th International Conference on learning representations, ICLR 2019, New Orleans, LA, USA, May 6\u20139, 2019. OpenReview.net."},{"key":"6269_CR33","unstructured":"H\u00e9naff, O. J. (2020). Data-efficient image recognition with contrastive predictive coding. In Proceedings of the 37th international conference on machine learning, ICML 2020, 13\u201318 July 2020, virtual event. Proceedings of machine learning research (Vol. 119, pp. 4182\u20134192). PMLR."},{"key":"6269_CR34","unstructured":"Ishida, T., Yamane, I., Sakai, T., Niu, G., & Sugiyama, M. (2020). Do we need zero training loss after achieving zero training error? In Proceedings of the 37th international conference on machine learning, ICML 2020, 13\u201318 July 2020, virtual event. Proceedings of machine learning research (Vol. 119, pp. 4604\u20134614). PMLR."},{"key":"6269_CR35","unstructured":"Jiang, Z., Chen, T., Chen, T. & Wang, Z. (2020). Robust pre-training by adversarial contrastive learning. In Advances in neural information processing systems (Vol. 33, pp. 16199\u201316210)."},{"key":"6269_CR36","unstructured":"Kang, D., Sun, Y., Hendrycks, D., Brown, T. & Steinhardt, J. (2020). Testing robustness against unforeseen adversaries."},{"key":"6269_CR37","unstructured":"Kannan, H., Kurakin, A., & Goodfellow, I. J. (2018). Adversarial logit pairing. CoRR abs\/1803.06373 arXiv:1803.06373."},{"key":"6269_CR38","unstructured":"Kaur, S., Cohen, J., & Lipton, Z.C. (2019). Are perceptually-aligned gradients a general property of robust classifiers."},{"key":"6269_CR39","unstructured":"Keskar, N. S., Mudigere, D., Nocedal, J., Smelyanskiy, M., & Tang, P. T. P. (2017). On large-batch training for deep learning: Generalization gap and sharp minima. In 5th international conference on learning representations, ICLR 2017, Toulon, France, April 24\u201326, 2017, conference track proceedings. OpenReview.net."},{"key":"6269_CR40","unstructured":"Khosla, P., Teterwak, P., Wang, C., Sarna, A., Tian, Y., Isola, P., et al. (2020). Supervised contrastive learning. In Advances in neural information processing systems (Vol. 33, pp. 18661\u201318673). Curran Associates, Inc."},{"key":"6269_CR41","unstructured":"Kim, M., Tack, J., & Hwang, S. J. (2020). Adversarial self-supervised contrastive learning. In Advances in neural information processing systems 33: Annual conference on neural information processing systems 2020, NeurIPS 2020, December 6\u201312, 2020."},{"key":"6269_CR42","unstructured":"Krizhevsky, A., et al. (2009). Learning multiple layers of features from tiny images."},{"key":"6269_CR43","unstructured":"Lee, K., Lee, K., Lee, H., & Shin, J. (2018). A simple unified framework for detecting out-of-distribution samples and adversarial attacks. In Advances in neural information processing systems 31: Annual conference on neural information processing systems 2018, NeurIPS 2018, December 3\u20138, 2018, Montr\u00e9al, Canada, pp. 7167\u20137177."},{"key":"6269_CR44","unstructured":"Li, H., Xu, Z., Taylor, G., Studer, C., & Goldstein, T. (2018) Visualizing the loss landscape of neural nets. In Advances in neural information processing systems 31: Annual conference on neural information processing systems 2018, NeurIPS 2018, December 3\u20138, 2018, Montr\u00e9al, Canada, pp. 6391\u20136401."},{"key":"6269_CR45","doi-asserted-by":"crossref","unstructured":"Liao, F., Liang, M., Dong, Y., Pang, T., Hu, X., & Zhu, J. (2018). Defense against adversarial attacks using high-level representation guided denoiser. In 2018 IEEE conference on computer vision and pattern recognition, CVPR 2018, Salt Lake City, UT, USA, June 18\u201322, 2018, pp. 1778\u20131787. Computer Vision Foundation\/IEEE Computer Society.","DOI":"10.1109\/CVPR.2018.00191"},{"key":"6269_CR46","unstructured":"Ma, X., Li, B., Wang, Y., Erfani, S. M., Wijewickrema, S. N. R., Schoenebeck, G., et al. (2018) Characterizing adversarial subspaces using local intrinsic dimensionality. In 6th international conference on learning representations, ICLR 2018, Vancouver, BC, Canada, April 30\u2013May 3, 2018, conference track proceedings. OpenReview.net."},{"key":"6269_CR47","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., & Vladu, A. (2018). Towards deep learning models resistant to adversarial attacks. In International conference on learning representations."},{"issue":"3","key":"6269_CR48","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s11263-016-0911-8","volume":"120","author":"A Mahendran","year":"2016","unstructured":"Mahendran, A., & Vedaldi, A. (2016). Visualizing deep convolutional neural networks using natural pre-images. International Journal of Computer Vision, 120(3), 233\u2013255.","journal-title":"International Journal of Computer Vision"},{"key":"6269_CR49","unstructured":"Mao, C., Zhong, Z., Yang, J., Vondrick, C., & Ray, B. (2019). Metric learning for adversarial robustness. In Advances in neural information processing systems 32: Annual conference on neural information processing systems 2019, NeurIPS 2019, December 8\u201314, 2019, Vancouver, BC, Canada, pp. 478\u2013489."},{"key":"6269_CR50","doi-asserted-by":"crossref","unstructured":"Mirjalili, V., & Ross, A. (2017). Soft biometric privacy: Retaining biometric utility of face images while perturbing gender. In 2017 IEEE international joint conference on biometrics, IJCB 2017, Denver, CO, USA, October 1\u20134, 2017 (pp. 564\u2013573). IEEE.","DOI":"10.1109\/BTAS.2017.8272743"},{"key":"6269_CR51","doi-asserted-by":"crossref","unstructured":"Misra, I., & van der Maaten, L. (2020). Self-supervised learning of pretext-invariant representations. In 2020 IEEE\/CVF conference on computer vision and pattern recognition, CVPR 2020, Seattle, WA, USA, June 13\u201319, 2020, pp. 6706\u20136716. Computer Vision Foundation\/IEEE.","DOI":"10.1109\/CVPR42600.2020.00674"},{"key":"6269_CR52","doi-asserted-by":"crossref","unstructured":"Noroozi, M., & Favaro, P. (2016). Unsupervised learning of visual representations by solving jigsaw puzzles. In Computer vision\u2014ECCV 2016\u201414th European Conference, Amsterdam, The Netherlands, October 11\u201314, 2016, proceedings, part VI. Lecture Notes in Computer Science (Vol. 9910, pp. 69\u201384). Springer.","DOI":"10.1007\/978-3-319-46466-4_5"},{"key":"6269_CR53","unstructured":"Papernot, N., McDaniel, P. D., & Goodfellow, I. J. (2016) Transferability in machine learning: From phenomena to black-box attacks using adversarial samples. CoRR abs\/1605.07277, arXiv:1605.07277."},{"key":"6269_CR54","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P. D., Goodfellow, I. J., Jha, S., Celik, Z. B., & Swami, A. (2017). Practical black-box attacks against machine learning. In Proceedings of the 2017 ACM on Asia conference on computer and communications security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2\u20136, 2017 (pp. 506\u2013519). ACM.","DOI":"10.1145\/3052973.3053009"},{"issue":"11","key":"6269_CR55","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1145\/3361566","volume":"62","author":"K Pei","year":"2019","unstructured":"Pei, K., Cao, Y., Yang, J., & Jana, S. (2019). Deepxplore: Automated whitebox testing of deep learning systems. Communications of the ACM, 62(11), 137\u2013145.","journal-title":"Communications of the ACM"},{"key":"6269_CR56","unstructured":"Qin, C., Martens, J., Gowal, S., Krishnan, D., Dvijotham, K., Fawzi, A., et al. (2019). Adversarial robustness through local linearization. In Advances in neural information processing systems 32: Annual conference on neural information processing systems 2019, NeurIPS 2019, December 8\u201314, 2019, Vancouver, BC, Canada, pp. 13824\u201313833."},{"key":"6269_CR57","unstructured":"Rauber, P. E., Falc\u00e3o, A. X., & Telea, A. C. (2016) Visualizing time-dependent data using dynamic t-sne. In 18th Eurographics conference on visualization, EuroVis 2016\u2014Short papers, Groningen, The Netherlands, June 6\u201310, 2016, pp. 73\u201377."},{"key":"6269_CR58","unstructured":"Rebuffi, S., Gowal, S., Calian, D. A., Stimberg, F., Wiles, O., & Mann, T. A. (2021). Fixing data augmentation to improve adversarial robustness. CoRR abs\/2103.01946, arXiv:2103.01946."},{"key":"6269_CR59","unstructured":"Schmidt, L., Santurkar, S., Tsipras, D., Talwar, K., & Madry, A. (2018). Adversarially robust generalization requires more data. In Advances in neural information processing systems 31: Annual conference on neural information processing systems 2018, NeurIPS 2018, December 3\u20138, 2018, Montr\u00e9al, Canada, pp. 5019\u20135031."},{"key":"6269_CR60","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I. J., et al. (2014) Intriguing properties of neural networks. In 2nd international conference on learning representations, ICLR 2014, Banff, AB, Canada, April 14\u201316, 2014, conference track proceedings."},{"key":"6269_CR61","unstructured":"Tack, J., Yu, S., Jeong, J., Kim, M., Hwang, S. J., & Shin, J. (2021). Consistency regularization for adversarial robustness. In ICML 2021 workshop on adversarial machine learning."},{"key":"6269_CR62","doi-asserted-by":"crossref","unstructured":"Tian, Y., Krishnan, D., & Isola, P. (2020a). Contrastive multiview coding. In Computer vision\u2014ECCV 2020\u201416th European conference, Glasgow, UK, August 23\u201328, 2020, proceedings, part XI. Lecture Notes in Computer Science (Vol. 12356, pp. 776\u2013794). Springer.","DOI":"10.1007\/978-3-030-58621-8_45"},{"key":"6269_CR63","unstructured":"Tian, Y., Sun, C., Poole, B., Krishnan, D., Schmid, C., & Isola, P. (2020b). What makes for good views for contrastive learning? In Advances in neural information processing systems 33: Annual conference on neural information processing systems 2020, NeurIPS 2020, December 6\u201312, 2020, Virtual."},{"key":"6269_CR64","unstructured":"Tram\u00e8r, F., Kurakin, A., Papernot, N., Goodfellow, I. J., Boneh, D., & McDaniel, P. D. (2018) Ensemble adversarial training: Attacks and defenses. In 6th international conference on learning representations, ICLR 2018, Vancouver, BC, Canada, April 30\u2013May 3, 2018, conference track proceedings. OpenReview.net."},{"key":"6269_CR65","unstructured":"Trinh, T. H., Luong, M.-T., & Le, Q. V. (2019). Selfie: Self-supervised pretraining for image embedding."},{"key":"6269_CR66","unstructured":"Tsipras, D., Santurkar, S., Engstrom, L., Turner, A. & Madry, A. (2019). Robustness may be at odds with accuracy. In International conference on learning representations."},{"key":"6269_CR67","unstructured":"Uesato, J., O\u2019Donoghue, B., Kohli, P., & van\u00a0den Oord, A. (2018) Adversarial risk and the dangers of evaluating against weak attacks. In J. Dy & A. Krause (Eds.), Proceedings of the 35th international conference on machine learning. Proceedings of machine learning research (Vol. 80, pp. 5025\u20135034). PMLR."},{"key":"6269_CR68","unstructured":"Wang, Y., Ma, X., Bailey, J., Yi, J., Zhou, B., & Gu, Q. (2019). On the convergence and robustness of adversarial training. In Proceedings of the 36th international conference on machine learning, ICML 2019, 9\u201315 June 2019, Long Beach, California, USA. Proceedings of machine learning research (Vol. 97, pp. 6586\u20136595). PMLR."},{"key":"6269_CR69","unstructured":"Wang, Y., Zou, D., Yi, J., Bailey, J., Ma, X., & Gu, Q. (2020). Improving adversarial robustness requires revisiting misclassified examples. In 8th international conference on learning representations, ICLR 2020, Addis Ababa, Ethiopia, April 26\u201330, 2020. OpenReview.net."},{"key":"6269_CR70","unstructured":"Wei, C., Kakade, S. M. & Ma, T. (2020). The implicit and explicit regularization effects of dropout. In Proceedings of the 37th international conference on machine learning, ICML 2020, 13\u201318 July 2020, virtual event. Proceedings of machine learning research (Vol. 119, pp. 10181\u201310192). PMLR."},{"key":"6269_CR71","unstructured":"Wu, D., Xia, S., & Wang, Y. (2020). Adversarial weight perturbation helps robust generalization. In Advances in neural information processing systems 33: Annual conference on neural information processing systems 2020, NeurIPS 2020, December 6\u201312, 2020, Virtual."},{"key":"6269_CR72","doi-asserted-by":"crossref","unstructured":"Wu, Z., Xiong, Y., Yu, S. X. & Lin, D. (2018). Unsupervised feature learning via non-parametric instance discrimination. In 2018 IEEE conference on computer vision and pattern recognition, CVPR 2018, Salt Lake City, UT, USA, June 18\u201322, 2018, pp. 3733\u20133742. Computer Vision Foundation\/IEEE Computer Society.","DOI":"10.1109\/CVPR.2018.00393"},{"key":"6269_CR73","unstructured":"Xie, C., & Yuille, A. L. (2020). Intriguing properties of adversarial training at scale. In 8th international conference on learning representations, ICLR 2020, Addis Ababa, Ethiopia, April 26\u201330, 2020. OpenReview.net."},{"key":"6269_CR74","doi-asserted-by":"crossref","unstructured":"Xie, C., Tan, M., Gong, B., Wang, J., Yuille, A. L., & Le, Q. V. (2020). Adversarial examples improve image recognition. In 2020 IEEE\/CVF conference on computer vision and pattern recognition, CVPR 2020, Seattle, WA, USA, June 13\u201319, 2020, pp. 816\u2013825. Computer Vision Foundation\/IEEE.","DOI":"10.1109\/CVPR42600.2020.00090"},{"key":"6269_CR75","unstructured":"Yan, Z., Guo, Y., & Zhang, C. (2018). Deep defense: Training DNNS with improved adversarial robustness. In Advances in neural information processing systems 31: Annual conference on neural information processing systems 2018, NeurIPS 2018, December 3\u20138, 2018, Montr\u00e9al, Canada, pp. 417\u2013426."},{"key":"6269_CR76","unstructured":"Zhang, H., Yu, Y., Jiao, J., Xing, E., Ghaoui, L. E., & Jordan, M. I. (2019). Theoretically principled trade-off between robustness and accuracy. In ICML (pp. 7472\u20137482)."},{"key":"6269_CR77","unstructured":"van den Oord, A., Li, Y., & Vinyals, O. (2018). Representation learning with contrastive predictive coding. CoRR abs\/1807.03748, arXiv:1807.03748."}],"container-title":["Machine Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-022-06269-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10994-022-06269-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-022-06269-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T01:04:05Z","timestamp":1698800645000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10994-022-06269-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":77,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["6269"],"URL":"https:\/\/doi.org\/10.1007\/s10994-022-06269-7","relation":{},"ISSN":["0885-6125","1573-0565"],"issn-type":[{"value":"0885-6125","type":"print"},{"value":"1573-0565","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,1]]},"assertion":[{"value":"2 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This paper is approved in ethics.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"This paper is consented to participate.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"This paper is consented for publication.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}