{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:06:39Z","timestamp":1771329999291,"version":"3.50.1"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:00:00Z","timestamp":1705017600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:00:00Z","timestamp":1705017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mach. Intell. Res."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11633-023-1419-7","type":"journal-article","created":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T16:02:34Z","timestamp":1705075354000},"page":"718-739","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Interpretability of Neural Networks Based on Game-theoretic Interactions"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8834-4665","authenticated-orcid":false,"given":"Huilin","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Jie","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Huiqi","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Jinpeng","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6108-2738","authenticated-orcid":false,"given":"Quanshi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,12]]},"reference":[{"key":"1419_CR1","doi-asserted-by":"publisher","unstructured":"A. Dosovitskiy, T. Brox. Inverting visual representations with convolutional networks. In Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, USA, pp. 4829\u20134837, 2016. DOI: https:\/\/doi.org\/10.1109\/CVPR.2016.522.","DOI":"10.1109\/CVPR.2016.522"},{"key":"1419_CR2","doi-asserted-by":"publisher","unstructured":"A. Mahendran, A. Vedaldi. Understanding deep image representations by inverting them. In Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Boston, USA, pp. 5188\u20135196, 2015. DOI: https:\/\/doi.org\/10.1109\/CVPR.2015.7299155.","DOI":"10.1109\/CVPR.2015.7299155"},{"key":"1419_CR3","doi-asserted-by":"publisher","unstructured":"K. Simonyan, A. Vedaldi, A. Zisserman. Deep inside convolutional networks: Visualising image classification models and saliency maps. In Proceedings of the 2nd International Conference on Learning Representations, Banff, Canada, 2013. DOI: https:\/\/doi.org\/10.48550\/arXiv.1312.6034.","DOI":"10.48550\/arXiv.1312.6034"},{"key":"1419_CR4","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1145\/2939672.2939778","volume-title":"\u201cWhy should I trust you?\u201d: Explaining the predictions of any classifier","author":"M T Ribeiro","year":"2016","unstructured":"M. T. Ribeiro, S. Singh, C. Guestrin. \u201cWhy should I trust you?\u201d: Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, San Francisco, USA, pp. 1135\u20131144, 2016. DOI: https:\/\/doi.org\/10.1145\/2939672.2939778."},{"key":"1419_CR5","unstructured":"S. M. Lundberg, S. I. Lee. A unified approach to interpreting model predictions. In Proceedings of the 31st International Conference on Neural Information Processing Systems, Long Beach, USA, pp. 4768\u20134777, 2017."},{"key":"1419_CR6","unstructured":"P. J. Kindermans, K. T. Schutt, M. Alber, K. R. M\u00fcller, D. Erhan, B. Kim, S. D\u00e4hne. Learning how to explain neural networks: Patternnet and patternattribution. In Proceedings of the 6th International Conference on Learning Representations, Vancouver, Canada, 2018. [Online], Available: https:\/\/dblp.org\/rec\/conf\/iclr\/KindermansSAMEK18.bib."},{"key":"1419_CR7","unstructured":"S. Sabour, N. Frosst, G. E. Hinton. Dynamic routing between capsules. In Proceedings of the 31st International Conference on Neural Information Processing Systems, Long Beach, USA, pp. 3859\u20133869, 2017."},{"key":"1419_CR8","unstructured":"X. Chen, Y. Duan, R. Houthooft, J. Schulman, I. Sutskever, P. Abbeel. InfoGAN: Interpretable representation learning by information maximizing generative adversarial nets. In Proceedings of the 30th International Conference on Neural Information Processing Systems, Barcelona, Spain, pp. 2180\u20132188, 2016."},{"key":"1419_CR9","unstructured":"I. Higgins, L. Matthey, A. Pal, C. Burgess, X. Glorot, M. Botvinick, S. Mohamed, A. Lerchner. Beta-VAE: Learning basic visual concepts with a constrained variational framework. In Proceedings of the 5th International Conference on Learning Representations, Toulon, France, 2017."},{"key":"1419_CR10","unstructured":"T. W. Weng, H. Zhang, P. Y. Chen, J. F. Yi, D. Su, Y. P. Gao, C. J. Hsieh, L. Daniel. Evaluating the robustness of neural networks: An extreme value theory approach. In Proceedings of the 6th International Conference on Learning Representations, Vancouver, Canada, 2018."},{"key":"1419_CR11","unstructured":"S. Fort, P. K. Nowak, S. Jastrzebski, S. Narayanan. Stiffness: A new perspective on generalization in neural networks. [Online], Available: https:\/\/arxiv.org\/abs\/1901.09491, 2019."},{"key":"1419_CR12","unstructured":"R. Novak, Y. Bahri, D. A. Abolafia, J. Pennington, J. Sohl-Dickstein. Sensitivity and generalization in neural networks: An empirical study. In Proceedings of the 6th International Conference on Learning Representations, Vancouver, Canada, 2018."},{"key":"1419_CR13","doi-asserted-by":"publisher","unstructured":"H. Zhang, Y. C. Xie, L. J. Zheng, D. Zhang, Q. S. Zhang. Interpreting multivariate shapley interactions in dnns. In Proceedings of the 35th AAAI Conference on Artificial Intelligence, vol.35, pp. 10877\u201310886, 2021. DOI: https:\/\/doi.org\/10.1609\/aaai.v35i12.17299.","DOI":"10.1609\/aaai.v35i12.17299"},{"key":"1419_CR14","unstructured":"H. Zhang, S. Li, Y. C. Ma, M. J. Li, Y. C. Xie, Q. S. Zhang. Interpreting and boosting dropout from a game-theoretic view. In Proceedings of the 9th International Conference on Learning Representations, 2021."},{"key":"1419_CR15","unstructured":"J. Ren, Z. P. Zhou, Q. R. Chen, Q. S. Zhang. Can we faithfully represent absence states to compute shapley values on a DNN? [Online], Available: https:\/\/arxiv.org\/abs\/2105.10719, 2021."},{"key":"1419_CR16","doi-asserted-by":"publisher","unstructured":"H. Q. Deng, N. Zou, M. N. Du, W. F. Chen, G. C. Feng, X. Hu. A unified taylor framework for revisiting attribution methods. In Proceedings of the 35th AAAI Conference on Artificial Intelligence, vol. 35, pp. 11462\u201311469, 2021. DOI: https:\/\/doi.org\/10.1609\/aaai.v35i13.17365.","DOI":"10.1609\/aaai.v35i13.17365"},{"key":"1419_CR17","unstructured":"J. Ren, M. J. Li, Q. R Chen, H. Q. Deng, Q. S. Zhang. Towards axiomatic, hierarchical, and symbolic explanation for deep models. [Online], Available: https:\/\/arxiv.org\/abs\/2111.06206, 2021."},{"key":"1419_CR18","doi-asserted-by":"publisher","unstructured":"D. Zhang, H. Zhang, H. L. Zhou, X. Y. Bao, D. Huo, R. Z. Chen, X. Cheng, M. Y. Wu, Q. S. Zhang. Building interpretable interaction trees for deep NLP models. In Proceedings of the 35th AAAI Conference on Artificial Intelligence, vol.35, pp. 14328\u201314337, 2021. DOI: https:\/\/doi.org\/10.1609\/aaai.v35i16.17685.","DOI":"10.1609\/aaai.v35i16.17685"},{"key":"1419_CR19","unstructured":"H. Q. Deng, Q. H. Ren, H. Zhang, J. Ren, Q. S. Zhang. Discovering and explaining the representation bottleneck of dnns. In Proceedings of the 10th International Conference on Learning Representations, 2021."},{"key":"1419_CR20","unstructured":"X. Cheng, C. T. Chu, Y. Zheng, J. Ren, Q. S. Zhang. A game-theoretic taxonomy of visual concepts in DNNs. [Online], Available: https:\/\/arxiv.org\/abs\/2106.10938, 2021."},{"key":"1419_CR21","unstructured":"X. Cheng, X. Wang, H. T. Xue, Z. Y. Liang, Q. S. Zhang. A hypothesis for the aesthetic appreciation in neural networks. [Online], Available: https:\/\/arxiv.org\/abs\/2108.02646, 2021."},{"key":"1419_CR22","unstructured":"J. Ren, D. Zhang, Y. S. Wang, L. Chen, Z. P. Zhou, Y. T. Chen, X. Cheng, X. Wang, M. Zhou, J. Shi, Q. S. Zhang. A unified game-theoretic interpretation of adversarial robustness. [Online], Available: https:\/\/arxiv.org\/abs\/2111.03536, 2021."},{"key":"1419_CR23","unstructured":"X. Wang, J. Ren, S. Y. Lin, Y. S. Wang, Q. S. Zhang. A unified approach to interpreting and boosting adversarial transferability. In Proceedings of the 9th International Conference on Learning Representations, 2021."},{"key":"1419_CR24","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1515\/9781400881970-018","volume-title":"Contributions to the Theory of Games","author":"L S Shapley","year":"1953","unstructured":"L. S. Shapley. A value for n-person games. Contributions to the Theory of Games, H. W. Kuhn, A. W. Tucker, Eds., Princeton, USA: Princeton University Press, pp. 307\u2013317, 1953. DOI: https:\/\/doi.org\/10.1515\/9781400881970-018."},{"issue":"2","key":"1419_CR25","doi-asserted-by":"publisher","first-page":"194","DOI":"10.2307\/2525487","volume":"4","author":"J C Harsanyi","year":"1963","unstructured":"J. C. Harsanyi. A simplified bargaining model for the n-person cooperative game. International Economic Review, vol. 4, no. 2, pp. 194\u2013220, 1963. DOI: https:\/\/doi.org\/10.2307\/2525487.","journal-title":"International Economic Review"},{"issue":"4","key":"1419_CR26","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/s001820050125","volume":"28","author":"M Grabisch","year":"1999","unstructured":"M. Grabisch, M. Roubens. An axiomatic approach to the concept of interaction among players in cooperative games. International Journal of Game Theory, vol. 28, no. 4, pp. 547\u2013565, 1999. DOI: https:\/\/doi.org\/10.1007\/s001820050125.","journal-title":"International Journal of Game Theory"},{"key":"1419_CR27","unstructured":"P. Dabkowski, Y. Gal. Real time image saliency for black box classifiers. In Proceedings of the 31st International Conference on Neural Information Processing Systems, Long Beach, USA, pp. 6970\u20136979, 2017."},{"key":"1419_CR28","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1017\/CBO9780511528446.008","volume-title":"The Shapley Value. Essays in Honor of Lloyd S. Shapley","author":"R J Weber","year":"1988","unstructured":"R. J. Weber. Probabilistic values for games. The Shapley Value. Essays in Honor of Lloyd S. Shapley, A. E. Roth, Ed., Cambridge, UK: Cambridge University Press, pp. 101\u2013120, 1988. DOI: https:\/\/doi.org\/10.1017\/CBO9780511528446.008."},{"key":"1419_CR29","unstructured":"M. Sundararajan, K. Dhamdhere, A. Agarwal. The shapley taylor interaction index. In Proceedings of the 37th International Conference on Machine Learning, pp. 9259\u20139268, 2020."},{"issue":"5","key":"1419_CR30","doi-asserted-by":"publisher","first-page":"1726","DOI":"10.1016\/j.cor.2008.04.004","volume":"36","author":"J Castro","year":"2009","unstructured":"J. Castro, D. G\u00f3mez, J. Tejada. Polynomial calculation of the shapley value based on sampling. Computers & Operations Research, vol. 36, no. 5, pp. 1726\u20131730, 2009. DOI: https:\/\/doi.org\/10.1016\/j.cor.2008.04.004.","journal-title":"Computers & Operations Research"},{"key":"1419_CR31","unstructured":"H. Q. Deng, N. Zou, M. N. Du, W. F. Chen, G. C. Feng, X. Hu. A general taylor framework for unifying and revisiting attribution methods. [Online], Available: https:\/\/arxiv.org\/abs\/2105.13841, 2021."},{"key":"1419_CR32","unstructured":"A. Shrikumar, P. Greenside, A. Shcherbina, A. Kundaje. Not just a black box: Learning important features through propagating activation differences. [Online], Available: https:\/\/arxiv.org\/abs\/1605.01713, 2016."},{"key":"1419_CR33","doi-asserted-by":"publisher","unstructured":"S. Bach, A. Binder, G. Montavon, F. Klauschen, K. R. M\u00fcller, W. Samek. On pixel-wise explanations for non-linear classifier decisions by layer-wise relevance propagation. PLoS One, vol. 10, no. 7, Article number e0130140, 2015. DOI: https:\/\/doi.org\/10.1371\/journal.pone.0130140.","DOI":"10.1371\/journal.pone.0130140"},{"key":"1419_CR34","doi-asserted-by":"publisher","unstructured":"R. R. Selvaraju, M. Cogswell, A. Das, R. Vedantam, D. Parikh, D. Batra. Grad-CAM: Visual explanations from deep networks via gradient-based localization. In Proceedings of IEEE International Conference on Computer Vision, Venice, Italy, pp. 618\u2013626, 2017. DOI: https:\/\/doi.org\/10.1109\/ICCV.2017.74.","DOI":"10.1109\/ICCV.2017.74"},{"key":"1419_CR35","unstructured":"L. M. Zintgraf, T. S. Cohen, T. Adel, M. Welling. Visualizing deep neural network decisions: Prediction difference analysis. In Proceedings of the 5th International Conference on Learning Representations, Toulon, France, 2017."},{"key":"1419_CR36","unstructured":"M. Sundararajan, A. Taly, Q. Q. Yan. Axiomatic attribution for deep networks. In Proceedings of the 34th International Conference on Machine Learning, Sydney, Australia, pp. 3319\u20133328, 2017."},{"key":"1419_CR37","unstructured":"A. Shrikumar, P. Greenside, A. Kundaje. Learning important features through propagating activation differences. In Proceedings of the 34th International Conference on Machine Learning, Sydney, Australia, pp. 3145\u20133153, 2017."},{"key":"1419_CR38","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.patcog.2016.11.008","volume":"65","author":"G Montavon","year":"2017","unstructured":"G. Montavon, S. Lapuschkin, A. Binder, W. Samek, K. R. M\u00fcller. Explaining nonlinear classification decisions with deep taylor decomposition. Pattern Recognition, vol. 65, pp. 211\u2013222, 2017. DOI: https:\/\/doi.org\/10.1016\/j.patcog.2016.11.008.","journal-title":"Pattern Recognition"},{"issue":"7","key":"1419_CR39","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1038\/s42256-021-00343-w","volume":"3","author":"G Erion","year":"2021","unstructured":"G. Erion, J. D. Janizek, P. Sturmfels, S. M. Lundberg, S. I. Lee. Improving performance of deep learning models with axiomatic attribution priors and expected gradients. Nature Machine Intelligence, vol. 3, no. 7, pp. 620\u2013631, 2021. DOI: https:\/\/doi.org\/10.1038\/s42256-021-00343-w.","journal-title":"Nature Machine Intelligence"},{"key":"1419_CR40","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1007\/978-3-319-10590-1_53","volume-title":"Visualizing and understanding convolutional networks","author":"M D Zeiler","year":"2014","unstructured":"M. D. Zeiler, R. Fergus. Visualizing and understanding convolutional networks. In Proceedings of the 13th European Conference on Computer Vision, Springer, Zurich, Switzerland, pp. 818\u2013833, 2014. DOI: https:\/\/doi.org\/10.1007\/978-3-319-10590-1_53."},{"key":"1419_CR41","doi-asserted-by":"publisher","first-page":"8827","DOI":"10.1109\/CVPR.2018.00920","volume-title":"Interpretable convolutional neural networks","author":"Q S Zhang","year":"2018","unstructured":"Q. S. Zhang, Y. N. Wu, S. C. Zhu. Interpretable convolutional neural networks. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, IEEE, Salt Lake City, USA, pp. 8827\u20138836, 2018. DOI: https:\/\/doi.org\/10.1109\/CVPR.2018.00920."},{"key":"1419_CR42","doi-asserted-by":"publisher","unstructured":"D. Bau, B. L. Zhou, A. Khosla, A. Oliva, A. Torralba. Network dissection: Quantifying interpretability of deep visual representations. In Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, USA, pp. 3319\u20133327, 2017. DOI: https:\/\/doi.org\/10.1109\/CVPR.2017.354.","DOI":"10.1109\/CVPR.2017.354"},{"key":"1419_CR43","doi-asserted-by":"publisher","first-page":"2725","DOI":"10.1109\/CVPR.2019.00284","volume-title":"Improving transferability of adversarial examples with input diversity","author":"C H Xie","year":"2019","unstructured":"C. H. Xie, Z. S. Zhang, Y. Y. Zhou, S. Bai, J. Y. Wang, Z. Ren, A. L. Yuille. Improving transferability of adversarial examples with input diversity. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, IEEE, Long Beach, USA, pp. 2725\u20132734, 2019. DOI: https:\/\/doi.org\/10.1109\/CVPR.2019.00284."},{"key":"1419_CR44","doi-asserted-by":"publisher","first-page":"9185","DOI":"10.1109\/CV-PR.2018.00957","volume-title":"Boosting adversarial attacks with momentum","author":"Y P Dong","year":"2018","unstructured":"Y. P. Dong, F. Z. Liao, T. Y. Pang, H. Su, J. Zhu, X. L. Hu, J. G. Li. Boosting adversarial attacks with momentum. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, IEEE, Salt Lake City, USA, pp. 9185\u20139193, 2018. DOI: https:\/\/doi.org\/10.1109\/CV-PR.2018.00957."},{"key":"1419_CR45","unstructured":"L. Wu, Z. X. Zhu, C. Tai, W. N. E. Understanding and enhancing the transferability of adversarial examples. [Online], Available: https:\/\/arxiv.org\/abs\/1802.09707, 2018."},{"key":"1419_CR46","unstructured":"D. X. Wu, Y. S. Wang, S. T. Xia, J. Bailey, X. J. Ma. Skip connections matter: On the transferability of adversarial examples generated with resnets. In Proceedings of the 8th International Conference on Learning Representations, Addis Ababa, Ethiopia, 2020."},{"key":"1419_CR47","doi-asserted-by":"publisher","first-page":"4307","DOI":"10.1109\/CVPR.2019.00444","volume-title":"Evading defenses to transferable adversarial examples by translation-invariant attacks","author":"Y P Dong","year":"2019","unstructured":"Y. P. Dong, T. Y. Pang, H. Su, J. Zhu. Evading defenses to transferable adversarial examples by translation-invariant attacks. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, IEEE, Long Beach, USA, pp. 4307\u20134316, 2019. DOI: https:\/\/doi.org\/10.1109\/CVPR.2019.00444."},{"key":"1419_CR48","doi-asserted-by":"publisher","unstructured":"Y. W. Li, S. Bai, Y. Y. Zhou, C. H. Xie, Z. S. Zhang, A. Yuille. Learning transferable adversarial examples via ghost networks. In Proceedings of the 34th AAAI Conference on Artificial Intelligence, New York, USA, vol. 34, pp. 11458\u201311465, 2020. DOI: https:\/\/doi.org\/10.1609\/aaai.v34i07.6810.","DOI":"10.1609\/aaai.v34i07.6810"},{"key":"1419_CR49","unstructured":"N. Inkawhich, K. Liang, L. Carin, Y. R. Chen. Transferable perturbations of deep feature distributions. In Proceedings of the 8th International Conference on Learning Representations, Addis Ababa, Ethiopia, 2020."},{"key":"1419_CR50","doi-asserted-by":"publisher","first-page":"4732","DOI":"10.1109\/ICCV.2019.00483","volume-title":"Enhancing adversarial example transferability with an intermediate level attack","author":"Q Huang","year":"2019","unstructured":"Q. Huang, I. Katsman, H. He, Z. Q. Gu, H. He, S. Belongie, S. N. Lim. Enhancing adversarial example transferability with an intermediate level attack. In Proceedings of IEEE\/CVF International Conference on Computer Vision, IEEE, Seoul, Republic of Korea, pp. 4732\u20134741, 2019. DOI: https:\/\/doi.org\/10.1109\/ICCV.2019.00483."},{"key":"1419_CR51","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-030-58604-1_19","volume-title":"Patch-wise attack for fooling deep neural network","author":"L L Gao","year":"2020","unstructured":"L. L. Gao, Q. L. Zhang, J. K. Song, X. L. Liu, H. T. Shen. Patch-wise attack for fooling deep neural network. In Proceedings of the 16th European Conference on Computer Vision, Springer, Glasgow, UK, pp. 307\u2013322, 2020. DOI: https:\/\/doi.org\/10.1007\/978-3-030-58604-1_19."},{"key":"1419_CR52","unstructured":"Y. W. Guo, Q. Z. Li, H. Chen. Backpropagating linearly improves transferability of adversarial examples. In Proceedings of the 34th International Conference on Neural Information Processing Systems, Vancouver, Canada, vol. 33, pp. 85\u201395, 2020."},{"key":"1419_CR53","unstructured":"Y. Zhu, J. C. Sun, Z. G. Li. Rethinking adversarial transferability from a data distribution perspective. In Proceedings of the 10th International Conference on Learning Representations, 2022."},{"key":"1419_CR54","doi-asserted-by":"publisher","unstructured":"Z. Y. Qin, Y. B. Fan, Y. Liu, L. Shen, Y. Zhang, J. Wang, B. Y. Wu. Boosting the transferability of adversarial attacks with reverse adversarial perturbation. [Online], Available: https:\/\/arxiv.org\/abs\/2210.05968, 2022. DOI: https:\/\/doi.org\/10.48550\/arXiv.2210.05968.","DOI":"10.48550\/arXiv.2210.05968"},{"key":"1419_CR55","doi-asserted-by":"publisher","first-page":"7619","DOI":"10.1109\/ICCV48922.2021.00754","volume-title":"Feature importance-aware transferable adversarial attacks","author":"Z B Wang","year":"2021","unstructured":"Z. B. Wang, H. C. Guo, Z. F. Zhang, W. X. Liu, Z. Qin, K. Ren. Feature importance-aware transferable adversarial attacks. In Proceedings of IEEE\/CVF International Conference on Computer Vision, IEEE, Montreal, Canada, pp. 7619\u20137628, 2021. DOI: https:\/\/doi.org\/10.1109\/ICCV48922.2021.00754."},{"key":"1419_CR56","doi-asserted-by":"crossref","unstructured":"J. M. Springer, M. Mitchell, G. T. Kenyon. Adversarial perturbations are not so weird: Entanglement of robust and non-robust features in neural network classifiers. [Online], Available: https:\/\/arxiv.org\/abs\/2102.05110, 2021.","DOI":"10.2172\/1823733"},{"key":"1419_CR57","unstructured":"J. D. Lin, C. B. Song, K. He, L. W. Wang, J. E. Hopcroft. Nesterov accelerated gradient and scale invariance for adversarial attacks. In Proceedings of the 8th International Conference on Learning Representations, Addis Ababa, Ethiopia, 2020."},{"issue":"3","key":"1419_CR58","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/s10994-017-5663-3","volume":"107","author":"A Fawzi","year":"2018","unstructured":"A. Fawzi, O. Fawzi, P. Frossard. Analysis of classifiers\u2019 robustness to adversarial perturbations. Machine Learning, vol. 107, no. 3, pp. 481\u2013508, 2018. DOI: https:\/\/doi.org\/10.1007\/s10994-017-5663-3.","journal-title":"Machine Learning"},{"key":"1419_CR59","unstructured":"A. Boopathy, S. J. Liu, G. Y. Zhang, C. Liu, P. Y. Chen, S. Y. Chang, L. Daniel. Proper network interpretability helps adversarial robustness in classification. In Proceedings of the 37th International Conference on Machine Learning, pp. 1014\u20131023, 2020."},{"key":"1419_CR60","doi-asserted-by":"crossref","unstructured":"A. Ignatiev, N. Narodytska, J. Marques-Silva. On relating explanations and adversarial examples. In Proceedings of the 33rd International Conference on Neural Information Processing Systems, Vancouver, Canada, pp. 15883\u201315893, 2019.","DOI":"10.1609\/aaai.v33i01.33011511"},{"key":"1419_CR61","doi-asserted-by":"publisher","unstructured":"P. Y. D. Yang, J. B. Chen, C. J. Hsieh, J. L. Wang, M. Jordan. ML-LOO: Detecting adversarial examples with feature attribution. In Proceedings of the 34th AAAI Conference on Artificial Intelligence, New York, USA, vol. 34, pp. 6639\u20136647, 2020. DOI: https:\/\/doi.org\/10.1609\/aaai.v34i04.6140.","DOI":"10.1609\/aaai.v34i04.6140"},{"key":"1419_CR62","unstructured":"T. DeVries, G. W. Taylor. Improved regularization of cs with cutout. [Online], Available: https:\/\/arxiv.org\/abs\/1708.04552, 2017."},{"key":"1419_CR63","unstructured":"M. Jere, M. Kumar, F. Koushanfar. A singular value perspective on model robustness. [Online], Available: https:\/\/arxiv.org\/abs\/2012.03516, 2020."},{"key":"1419_CR64","unstructured":"A. Madry, A. Makelov, L. Schmidt, D. Tsipras, A. Vladu. Towards deep learning models resistant to adversarial attacks. In Proceedings of the 6th International Conference on Learning Representations, Vancouver, Canada, 2018."},{"key":"1419_CR65","unstructured":"X. Bouthillier, K. Konda, P. Vincent, R. Memisevic. Dropout as data augmentation. [Online], Available: https:\/\/arxiv.org\/abs\/1506.08700, 2015."},{"issue":"1","key":"1419_CR66","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, R. Salakhutdinov. Dropout: A simple way to prevent neural networks from overfitting. The Journal of Machine Learning Research, vol. 15, no. 1, pp. 1929\u20131958, 2014.","journal-title":"The Journal of Machine Learning Research"}],"container-title":["Machine Intelligence Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-023-1419-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11633-023-1419-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-023-1419-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T08:12:47Z","timestamp":1721117567000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11633-023-1419-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,12]]},"references-count":66,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["1419"],"URL":"https:\/\/doi.org\/10.1007\/s11633-023-1419-7","relation":{},"ISSN":["2731-538X","2731-5398"],"issn-type":[{"value":"2731-538X","type":"print"},{"value":"2731-5398","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,12]]},"assertion":[{"value":"13 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declared that they have no conflicts of interest to this work.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations of conflict of interest"}}]}}