{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:53:09Z","timestamp":1772830389588,"version":"3.50.1"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T00:00:00Z","timestamp":1726876800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T00:00:00Z","timestamp":1726876800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100004063","name":"Knut and Alice Wallenberg Foundation","doi-asserted-by":"crossref","award":["KAW 2019.0024"],"award-info":[{"award-number":["KAW 2019.0024"]}],"id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the ELLIIT environment for strategic research in Sweden"},{"DOI":"10.13039\/501100003945","name":"Link\u00f6ping University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003945","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Vis"],"published-print":{"date-parts":[[2025,2]]},"abstract":"<jats:sec>\n            <jats:title>Abstract<\/jats:title>\n            <jats:p>Research in ML4VIS investigates how to use machine learning (ML) techniques to generate visualizations, and the field is rapidly growing with high societal impact. However, as with any computational pipeline that employs ML processes, ML4VIS approaches are susceptible to a range of ML-specific adversarial attacks. These attacks can manipulate visualization generations, causing analysts to be tricked and their judgments to be impaired. Due to a lack of synthesis from both visualization and ML perspectives, this security aspect is largely overlooked by the current ML4VIS literature. To bridge this gap, we investigate the potential vulnerabilities of ML-aided visualizations from adversarial attacks using a holistic lens of both visualization and ML perspectives. We first identify the attack surface (i.e., attack entry points) that is unique in ML-aided visualizations. We then exemplify five different adversarial attacks. These examples highlight the range of possible attacks when considering the attack surface and multiple different adversary capabilities. Our results show that adversaries can induce various attacks, such as creating arbitrary and deceptive visualizations, by systematically identifying input attributes that are influential in ML inferences. Based on our observations of the attack surface characteristics and the attack examples, we underline the importance of comprehensive studies of security issues and defense mechanisms as a call of urgency for the ML4VIS community.<\/jats:p>\n          <\/jats:sec>\n          <jats:sec>\n            <jats:title>Graphical abstract<\/jats:title>\n          <\/jats:sec>","DOI":"10.1007\/s12650-024-01029-2","type":"journal-article","created":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T09:01:41Z","timestamp":1726909301000},"page":"133-151","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Adversarial attacks on machine learning-aided visualizations"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6382-2752","authenticated-orcid":false,"given":"Takanori","family":"Fujiwara","sequence":"first","affiliation":[]},{"given":"Kostiantyn","family":"Kucher","sequence":"additional","affiliation":[]},{"given":"Junpeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Rafael M.","family":"Martins","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Kerren","sequence":"additional","affiliation":[]},{"given":"Anders","family":"Ynnerman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,21]]},"reference":[{"key":"1029_CR1","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar N, Mian A (2018) Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6:14410\u201314430","journal-title":"IEEE Access"},{"key":"1029_CR2","doi-asserted-by":"crossref","unstructured":"Al-Mohannadi H, Mirza Q, Namanya A, Awan I, Cullen A, Disso J (2016) Cyber-attack modeling analysis techniques: an overview. In: Proceedings FiCloudW, pp 69\u201376","DOI":"10.1109\/W-FiCloud.2016.29"},{"key":"1029_CR3","unstructured":"Biggio B, Nelson B, Laskov P (2012) Poisoning attacks against support vector machines. In: Proceedings ICML, pp 1467\u20131474"},{"issue":"2","key":"1029_CR4","doi-asserted-by":"publisher","first-page":"1481","DOI":"10.1109\/TVCG.2020.3030455","volume":"27","author":"D Borland","year":"2021","unstructured":"Borland D, Zhang J, Kaul S, Gotz D (2021) Selection-bias-corrected visualization via dynamic reweighting. IEEE Trans Vis Comput Graph 27(2):1481\u20131491","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"7","key":"1029_CR5","doi-asserted-by":"publisher","first-page":"3289","DOI":"10.1109\/TVCG.2020.2969185","volume":"27","author":"K Cao","year":"2021","unstructured":"Cao K, Liu M, Su H, Wu J et al (2021) Analyzing the noise robustness of deep neural networks. IEEE Trans Vis Comput Graph 27(7):3289\u20133304","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"3","key":"1029_CR6","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1111\/cgf.14034","volume":"39","author":"A Chatzimparmpas","year":"2020","unstructured":"Chatzimparmpas A, Martins RM, Jusufi I, Kucher K et al (2020) The state of the art in enhancing trust in machine learning models with the use of visualizations. Comput Graph Forum 39(3):713\u2013756","journal-title":"Comput Graph Forum"},{"issue":"1","key":"1029_CR7","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/TVCG.2021.3114804","volume":"28","author":"Q Chen","year":"2022","unstructured":"Chen Q, Sun F, Xu X, Chen Z et al (2022) VizLinter: a linter and fixer framework for data visualization. IEEE Trans Vis Comput Graph 28(1):206\u2013216","journal-title":"IEEE Trans Vis Comput Graph"},{"key":"1029_CR8","unstructured":"Chen X, Liu C, Li B, Lu K, Song D (2017) Targeted backdoor attacks on deep learning systems using data poisoning. arXiv:1712.05526"},{"key":"1029_CR9","unstructured":"Correll M, Heer J (2017) Black hat visualization. In: Proceedings DECISIVe"},{"issue":"1","key":"1029_CR10","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1109\/TVCG.2019.2934785","volume":"26","author":"W Cui","year":"2020","unstructured":"Cui W, Zhang X, Wang Y, Huang H, Chen B et al (2020) Text-to-Viz: automatic generation of infographics from proportion-related natural language statements. IEEE Trans Vis Comput Graph 26(1):906\u2013916","journal-title":"IEEE Trans Vis Comput Graph"},{"key":"1029_CR11","doi-asserted-by":"crossref","unstructured":"Dalvi N, Domingos P, Sanghai S, Verma D (2004) Adversarial clafssification. In: Proceedings KDD, pp 99\u2013108","DOI":"10.1145\/1014052.1014066"},{"key":"1029_CR12","doi-asserted-by":"crossref","unstructured":"Darwish K, Stefanov P, Aupeti M, Nakov P (2020) Unsupervised user stance detection on Twitter. In: Proceedings ICWSM, pp 141\u2013152","DOI":"10.1609\/icwsm.v14i1.7286"},{"key":"1029_CR13","doi-asserted-by":"crossref","unstructured":"Das N, Park H, Wang ZJ, Hohman F et al. (2020) Bluff: interactively deciphering adversarial attacks on deep neural networks. In: Proceedings VIS, pp 271\u2013275","DOI":"10.1109\/VIS47514.2020.00061"},{"key":"1029_CR14","unstructured":"Department of Digital, Culture, Media and Sport (2022) Establishing a pro-innovation approach to regulating AI. CP 728, https:\/\/www.gov.uk\/government\/publications\/establishing-a-pro-innovation-approach-to-regulating-ai. Accessed 18 July 2024"},{"key":"1029_CR15","unstructured":"Dua D, Graff C (2019) UCI machine learning repository. https:\/\/archive.ics.uci.edu\/ml. Accessed 18 July 2024"},{"key":"1029_CR16","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.neucom.2022.06.111","volume":"503","author":"SR Dubey","year":"2022","unstructured":"Dubey SR, Singh SK, Chaudhuri BB (2022) Activation functions in deep learning: a comprehensive survey and benchmark. Neurocomputing 503:92","journal-title":"Neurocomputing"},{"key":"1029_CR17","unstructured":"Dziugaite GK, Ghahramani Z, Roy DM (2016) A study of the effect of JPG compression on adversarial images. arXiv:1608.00853"},{"key":"1029_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95831-6","volume-title":"Cognitive biases in visualizations","author":"G Ellis","year":"2018","unstructured":"Ellis G (2018) Cognitive biases in visualizations. Springer, Cham, Switzerland"},{"issue":"3","key":"1029_CR19","doi-asserted-by":"publisher","first-page":"2153","DOI":"10.1109\/TVCG.2019.2944182","volume":"27","author":"M Espadoto","year":"2021","unstructured":"Espadoto M, Martins RM, Kerren A, Hirata NST, Telea AC (2021) Toward a quantitative survey of dimension reduction techniques. IEEE Trans Vis Comput Graph 27(3):2153\u20132173","journal-title":"IEEE Trans Vis Comput Graph"},{"key":"1029_CR20","unstructured":"European Commission (2021) The Artificial Intelligence Act. EU Transparency register number 787064543128-10, https:\/\/artificialintelligenceact.eu\/. Accessed 18 July 2024"},{"issue":"3","key":"1029_CR21","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1111\/cgf.13405","volume":"37","author":"C Fan","year":"2018","unstructured":"Fan C, Hauser H (2018) Fast and accurate CNN-based brushing in scatterplots. Comput Graph Forum 37(3):111\u2013120","journal-title":"Comput Graph Forum"},{"key":"1029_CR22","doi-asserted-by":"crossref","unstructured":"Fan A, Ma Y, Mancenido M, Maciejewski R (2022) Annotating line charts for addressing deception. In: Proceedings CHI, pp 1\u201312","DOI":"10.1145\/3491102.3502138"},{"issue":"1","key":"1029_CR23","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/TVCG.2019.2934433","volume":"26","author":"T Fujiwara","year":"2020","unstructured":"Fujiwara T, Chou J-K, Shilpika S, Xu P et al (2020) An incremental dimensionality reduction method for visualizing streaming multidimensional data. IEEE Trans Vis Comput Graph 26(1):418\u2013428","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"1","key":"1029_CR24","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/TVCG.2019.2934251","volume":"26","author":"T Fujiwara","year":"2020","unstructured":"Fujiwara T, Kwon O-H, Ma K-L (2020) Supporting analysis of dimensionality reduction results with contrastive learning. IEEE Trans Vis Comput Graph 26(1):45\u201355","journal-title":"IEEE Trans Vis Comput Graph"},{"key":"1029_CR25","unstructured":"Gao Y, Doan BG, Zhang Z, Ma S et al. (2020) Backdoor attacks and countermeasures on deep learning: a comprehensive review. arXiv:2007.10760"},{"issue":"12","key":"1029_CR26","doi-asserted-by":"publisher","first-page":"4951","DOI":"10.1109\/TVCG.2021.3109460","volume":"28","author":"P Ghahremani","year":"2022","unstructured":"Ghahremani P, Boorboor S, Mirhosseini P, Gudisagar C et al (2022) NeuroConstruct: 3D reconstruction and visualization of neurites in optical microscopy brain images. IEEE Trans Vis Comput Graph 28(12):4951\u20134965","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"7","key":"1029_CR27","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/3134599","volume":"61","author":"I Goodfellow","year":"2018","unstructured":"Goodfellow I, McDaniel P, Papernot N (2018) Making machine learning robust against adversarial inputs. Commun ACM 61(7):56\u201366","journal-title":"Commun ACM"},{"key":"1029_CR28","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. In: Proceedings ICLR"},{"issue":"8","key":"1029_CR29","doi-asserted-by":"publisher","first-page":"2270","DOI":"10.1109\/TVCG.2017.2734659","volume":"24","author":"CC Gramazio","year":"2018","unstructured":"Gramazio CC, Huang J, Laidlaw DH (2018) An analysis of automated visual analysis classification: interactive visualization task inference of cancer genomics domain experts. IEEE Trans Vis Comput Graph 24(8):2270\u20132283","journal-title":"IEEE Trans Vis Comput Graph"},{"key":"1029_CR30","unstructured":"Hamon R, Junklewitz H, Sanchez I (2020) Robustness and explainability of artificial intelligence. Technical report EUR 30040 EN, Publications Office of the European Union"},{"key":"1029_CR31","doi-asserted-by":"crossref","unstructured":"Heer J (2019) Agency plus automation: designing artificial intelligence into interactive systems. In: Proceedings National Academy Science, 116(6):1844\u20131850","DOI":"10.1073\/pnas.1807184115"},{"issue":"8","key":"1029_CR32","doi-asserted-by":"publisher","first-page":"3397","DOI":"10.1109\/TVCG.2021.3073466","volume":"27","author":"J Helske","year":"2021","unstructured":"Helske J, Helske S, Cooper M, Ynnerman A, Besancon L (2021) Can visualization alleviate dichotomous thinking? Effects of visual representations on the cliff effect. IEEE Trans Vis Comput Graph 27(8):3397\u20133409","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"3","key":"1029_CR33","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1111\/cgf.14834","volume":"42","author":"A Hinterreiter","year":"2023","unstructured":"Hinterreiter A, Humer C, Kainz B, Streit M (2023) ParaDime: a framework for parametric dimensionality reduction. Comput Graph Forum 42(3):337\u2013348","journal-title":"Comput Graph Forum"},{"key":"1029_CR34","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-540-71080-6_16","volume-title":"Visual data mining: theory, techniques and tools for visual analytics","author":"ML Huang","year":"2008","unstructured":"Huang ML, Nguyen QV (2008) Context visualization for visual data mining. In: Simoff SJ, B\u00f6hlen MH, Mazeika A (eds) Visual data mining: theory, techniques and tools for visual analytics. Springer, Berlin Heidelberg, pp 248\u2013263"},{"issue":"6","key":"1029_CR35","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1080\/1369118X.2016.1153126","volume":"19","author":"H Kennedy","year":"2016","unstructured":"Kennedy H, Hill RL, Aiello G, Allen W (2016) The work that visualisation conventions do. Inf Commun Soc 19(6):715\u2013735","journal-title":"Inf Commun Soc"},{"issue":"1","key":"1029_CR36","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1109\/TVCG.2019.2934396","volume":"26","author":"O-H Kwon","year":"2020","unstructured":"Kwon O-H, Ma K-L (2020) A deep generative model for graph layout. IEEE Trans Vis Comput Graph 26(1):665\u2013675","journal-title":"IEEE Trans Vis Comput Graph"},{"key":"1029_CR37","doi-asserted-by":"crossref","unstructured":"Lai C-H, Kuo M-F, Lien Y-H, Su K-A, Wang Y-S (2022) Parametric dimension reduction by preserving local structure. In: Proceedings VIS, pp 75\u201379","DOI":"10.1109\/VIS54862.2022.00024"},{"key":"1029_CR38","doi-asserted-by":"crossref","unstructured":"Lauer C, O\u2019Brien S (2020) The deceptive potential of common design tactics used in data visualizations. In: Proceedings DOC, pp 1\u20139","DOI":"10.1145\/3380851.3416762"},{"issue":"1","key":"1029_CR39","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TNNLS.2022.3182979","volume":"35","author":"Y Li","year":"2024","unstructured":"Li Y, Jiang Y, Li Z, Xia S-T (2024) Backdoor learning: a survey. IEEE Trans Neural Netw Learn Syst 35(1):5\u201322","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"4","key":"1029_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3587470","volume":"13","author":"Y Li","year":"2023","unstructured":"Li Y, Wang J, Fujiwara T, Ma K-L (2023) Visual analytics of neuron vulnerability to adversarial attacks on convolutional neural networks. ACM Trans Intell Syst Technol 13(4):1\u201326","journal-title":"ACM Trans Intell Syst Technol"},{"issue":"3","key":"1029_CR41","doi-asserted-by":"publisher","first-page":"1562","DOI":"10.1109\/TVCG.2018.2875702","volume":"26","author":"Y Ma","year":"2018","unstructured":"Ma Y, Tung AK, Wang W, Gao X et al (2018) ScatterNet: a deep subjective similarity model for visual analysis of scatterplots. IEEE Trans Vis Comput Graph 26(3):1562\u20131576","journal-title":"IEEE Trans Vis Comput Graph"},{"key":"1029_CR42","doi-asserted-by":"crossref","unstructured":"McInnes L, Healy J, Melville J (2018) UMAP: uniform manifold approximation and projection for dimension reduction. arXiv:1802.03426","DOI":"10.21105\/joss.00861"},{"key":"1029_CR43","doi-asserted-by":"crossref","unstructured":"McNutt A, Kindlmann G, Correll M (2020) Surfacing visualization mirages. In: Proceedings CHI, pp 1\u201316","DOI":"10.1145\/3313831.3376420"},{"key":"1029_CR44","first-page":"4915","volume":"10","author":"G Neff","year":"2016","unstructured":"Neff G, Nagy P (2016) Talking to bots: symbiotic agency and the case of Tay. Int J Commun 10:4915\u20134931","journal-title":"Int J Commun"},{"issue":"3","key":"1029_CR45","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1111\/cgf.13670","volume":"38","author":"A Ottley","year":"2019","unstructured":"Ottley A, Garnett R, Wan R (2019) Follow the clicks: learning and anticipating mouse interactions during exploratory data analysis. Comput Graph Forum 38(3):41\u201352","journal-title":"Comput Graph Forum"},{"key":"1029_CR46","doi-asserted-by":"crossref","unstructured":"Pandey AV, Rall K, Satterthwaite ML, Nov O, Bertini E (2015) How deceptive are deceptive visualizations? An empirical analysis of common distortion techniques. In: Proceedings CHI, pp 1469\u20131478","DOI":"10.1145\/2702123.2702608"},{"key":"1029_CR47","doi-asserted-by":"crossref","unstructured":"Papernot N, McDaniel P, Goodfellow I, Jha S et al. (2017) Practical black-box attacks against machine learning. In: Proceedings ASIACCS, pp 506\u2013519","DOI":"10.1145\/3052973.3053009"},{"key":"1029_CR48","doi-asserted-by":"crossref","unstructured":"Papernot N, McDaniel P, Sinha, A, Wellman MP (2018) SoK: security and privacy in machine learning. In: Proceedings EuroS &P, pp 399\u2013414","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"1029_CR49","doi-asserted-by":"crossref","unstructured":"Papernot N, McDaniel P, Wu X, Jha S, Swami A (2016) Distillation as a defense to adversarial perturbations against deep neural networks. In: Proceedings SP, pp 582\u2013597","DOI":"10.1109\/SP.2016.41"},{"issue":"3","key":"1029_CR50","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1111\/cgf.13193","volume":"36","author":"J Poco","year":"2017","unstructured":"Poco J, Heer J (2017) Reverse-engineering visualizations: recovering visual encodings from chart images. Comput Graph Forum 36(3):353\u2013363","journal-title":"Comput Graph Forum"},{"key":"1029_CR51","unstructured":"Rauber PE, Falc\u00e3o AX, Telea AC (2016) Visualizing time-dependent data using dynamic t-SNE. In: Proceedings EuroVis, pp 73\u201377"},{"key":"1029_CR52","doi-asserted-by":"crossref","unstructured":"Rubinstein BIP, Nelson B, Huang L, Joseph AD et al. (2009) ANTIDOTE: understanding and defending against poisoning of anomaly detectors. In: Proceedings IMC, pp 1\u201314","DOI":"10.1145\/1644893.1644895"},{"issue":"1","key":"1029_CR53","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1109\/TVCG.2015.2467591","volume":"22","author":"D Sacha","year":"2016","unstructured":"Sacha D, Senaratne H, Kwon BC, Ellis G, Keim DA (2016) The role of uncertainty, awareness, and trust in visual analytics. IEEE Trans Vis Comput Graph 22(1):240\u2013249","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"1","key":"1029_CR54","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1109\/TVCG.2016.2598495","volume":"23","author":"D Sacha","year":"2017","unstructured":"Sacha D, Zhang L, Sedlmair M, Lee JA et al (2017) Visual interaction with dimensionality reduction: a structured literature analysis. IEEE Trans Vis Comput Graph 23(1):241\u2013250","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"11","key":"1029_CR55","first-page":"2881","volume":"33","author":"T Sainburg","year":"2021","unstructured":"Sainburg T, McInnes L, Gentner TQ (2021) Parametric UMAP embeddings for representation and semisupervised learning. Neural Comput 33(11):2881\u20132907","journal-title":"Neural Comput"},{"issue":"1","key":"1029_CR56","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1109\/TVCG.2016.2599030","volume":"23","author":"A Satyanarayan","year":"2017","unstructured":"Satyanarayan A, Moritz D, Wongsuphasawat K, Heer J (2017) Vega-Lite: a grammar of interactive graphics. IEEE Trans Vis Comput Graph 23(1):341\u2013350","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"6","key":"1029_CR57","first-page":"495","volume":"36","author":"B Shneiderman","year":"2020","unstructured":"Shneiderman B (2020) Human-centered artificial intelligence: reliable, safe & trustworthy. Int J Hum-Comput Int 36(6):495\u2013504","journal-title":"Int J Hum-Comput Int"},{"issue":"1","key":"1029_CR58","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1109\/TVCG.2018.2864914","volume":"25","author":"H Song","year":"2019","unstructured":"Song H, Szafir DA (2019) Where\u2019s my data? Evaluating visualizations with missing data. IEEE Trans Vis Comput Graph 25(1):914\u2013924","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"2","key":"1029_CR59","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/JBHI.2020.3032060","volume":"25","author":"K Stacke","year":"2021","unstructured":"Stacke K, Eilertsen G, Unger J, Lundstr\u00f6m C (2021) Measuring domain shift for deep learning in histopathology. IEEE J Biomed Health 25(2):325\u2013336","journal-title":"IEEE J Biomed Health"},{"key":"1029_CR60","doi-asserted-by":"crossref","unstructured":"Steichen B, Carenini G, Conati C (2013) User-adaptive information visualization: using eye gaze data to infer visualization tasks and user cognitive abilities. In: Proceedings IUI, pp 317\u2013328","DOI":"10.1145\/2449396.2449439"},{"issue":"5","key":"1029_CR61","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","volume":"23","author":"J Su","year":"2019","unstructured":"Su J, Vargas DV, Sakurai K (2019) One pixel attack for fooling deep neural networks. IEEE Trans Evol Comput 23(5):828\u2013841","journal-title":"IEEE Trans Evol Comput"},{"key":"1029_CR62","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J et al. (2014) Intriguing properties of neural networks. In: Proceedings ICLR"},{"issue":"2","key":"1029_CR63","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1109\/TVCG.2020.3030467","volume":"27","author":"T Tang","year":"2021","unstructured":"Tang T, Li R, Wu X, Liu S et al (2021) PlotThread: creating expressive storyline visualizations using reinforcement learning. IEEE Trans Vis Comput Graph 27(2):294\u2013303","journal-title":"IEEE Trans Vis Comput Graph"},{"key":"1029_CR64","unstructured":"The Supplementary Materials (2024) https:\/\/takanori-fujiwara.github.io\/s\/adv-attack-on-vis. Accessed 18 July 2024"},{"key":"1029_CR65","unstructured":"The White House (2022) The blueprint for an AI Bill of Rights. https:\/\/www.whitehouse.gov\/ostp\/ai-bill-of-rights\/. Accessed 18 July 2024"},{"key":"1029_CR66","unstructured":"Trimble TE, Bishop R, Morgan JF et al. (2014) Human factors evaluation of Level 2 and Level 3 automated driving concepts: past research, state of automation technology, and emerging system concepts. Technical report DOT HS 812 043, U.S. Department of Transportation-National Highway Traffic Safety Administration"},{"key":"1029_CR67","unstructured":"University of Washington Interactive Data Lab (2015) Vega datasets. https:\/\/github.com\/vega\/vega-datasets. Accessed 18 July 2024"},{"key":"1029_CR68","unstructured":"Van der Maaten L (2009) Learning a parametric embedding by preserving local structure. In: Proceedings AISTATS, vol. 5, pp 384\u2013391"},{"issue":"4","key":"1029_CR74","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1109\/TVCG.2006.80","volume":"12","author":"JJ Van Wijk","year":"2006","unstructured":"Van Wijk JJ (2006) Views on visualization. IEEE Trans Vis Comput Graph 12(4):421\u2013432","journal-title":"IEEE Trans Vis Comput Graph"},{"key":"1029_CR69","doi-asserted-by":"crossref","unstructured":"Wall E, Blaha LM, Franklin L, Endert A (2017) Warning, bias may occur: a proposed approach to detecting cognitive bias in interactive visual analytics. In: Proceedings VAST, pp 104\u2013115","DOI":"10.1109\/VAST.2017.8585669"},{"issue":"12","key":"1029_CR70","doi-asserted-by":"publisher","first-page":"5134","DOI":"10.1109\/TVCG.2021.3106142","volume":"28","author":"Q Wang","year":"2022","unstructured":"Wang Q, Chen Z, Wang Y, Qu H (2022) A survey on ML4VIS: applying machine learning advances to data visualization. IEEE Trans Vis Comput Graph 28(12):5134\u20135153","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"8","key":"1029_CR71","doi-asserted-by":"publisher","first-page":"3714","DOI":"10.1109\/TVCG.2022.3167896","volume":"29","author":"C Wang","year":"2023","unstructured":"Wang C, Han J (2023) DL4SciVis: a state-of-the-art survey on deep learning for scientific visualization. IEEE Trans Vis Comput Graph 29(8):3714\u20133733","journal-title":"IEEE Trans Vis Comput Graph"},{"key":"1029_CR72","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1007\/s11390-016-1663-1","volume":"31","author":"X-M Wang","year":"2016","unstructured":"Wang X-M, Zhang T-Y, Ma Y-X, Xia J, Chen W (2016) A survey of visual analytic pipelines. J Comput Sci Technol 31:787\u2013804","journal-title":"J Comput Sci Technol"},{"issue":"1","key":"1029_CR73","first-page":"960","volume":"26","author":"Y Wang","year":"2020","unstructured":"Wang Y, Zhong Z, Hua J (2020) DeepOrganNet: on-the-fly reconstruction and visualization of 3D\/4D lung models from single-view projections by deep deformation network. IEEE Trans Vis Comput Graph 26(1):960\u2013970","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"12","key":"1029_CR75","doi-asserted-by":"publisher","first-page":"5049","DOI":"10.1109\/TVCG.2021.3099002","volume":"28","author":"A Wu","year":"2022","unstructured":"Wu A, Wang Y, Shu X, Moritz D et al (2022) AI4VIS: survey on artificial intelligence approaches for data visualization. IEEE Trans Vis Comput Graph 28(12):5049\u20135070","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"1","key":"1029_CR76","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1109\/TVCG.2021.3114826","volume":"28","author":"A Wu","year":"2022","unstructured":"Wu A, Wang Y, Zhou M, He X et al (2022) MultiVision: designing analytical dashboards with deep learning based recommendation. IEEE Trans Vis Comput Graph 28(1):162\u2013172","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"1","key":"1029_CR77","first-page":"493","volume":"29","author":"C Xiong","year":"2023","unstructured":"Xiong C, Stokes C, Kim Y-S, Franconeri S (2023) Seeing what you believe or believing what you see? Belief biases correlation estimation. IEEE Trans Vis Comput Graph 29(1):493\u2013503","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"2","key":"1029_CR78","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s11633-019-1211-x","volume":"17","author":"H Xu","year":"2020","unstructured":"Xu H, Ma Y, Liu H-C, Deb D et al (2020) Adversarial attacks and defenses in images, graphs and text: a review. Int J Autom Comput 17(2):151\u2013178","journal-title":"Int J Autom Comput"},{"issue":"3","key":"1029_CR79","doi-asserted-by":"publisher","first-page":"1710","DOI":"10.1109\/TVCG.2022.3223399","volume":"30","author":"Z Zang","year":"2024","unstructured":"Zang Z, Cheng S, Xia H, Li L, Sun Y, Xu Y, Shang L, Sun B, Li SZ (2024) DMT-EV: an explainable deep network for dimension reduction. IEEE Trans Vis Compute Graph 30(3):1710\u20131727","journal-title":"IEEE Trans Vis Compute Graph"},{"issue":"3","key":"1029_CR80","doi-asserted-by":"publisher","first-page":"1500","DOI":"10.1109\/TVCG.2020.3018724","volume":"28","author":"J Zhao","year":"2022","unstructured":"Zhao J, Fan M, Feng M (2022) ChartSeer: interactive steering exploratory visual analysis with machine intelligence. IEEE Trans Vis Comput Graph 28(3):1500\u20131513","journal-title":"IEEE Trans Vis Comput Graph"},{"key":"1029_CR81","doi-asserted-by":"crossref","unstructured":"Zhou M, Li Q, He X, Li Y et al. (2021) Table2Charts: recommending charts by learning shared table representations. In: Proceedings KDD, pp 2389\u20132399","DOI":"10.1145\/3447548.3467279"}],"container-title":["Journal of Visualization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12650-024-01029-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12650-024-01029-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12650-024-01029-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T08:44:18Z","timestamp":1738140258000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12650-024-01029-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,21]]},"references-count":81,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["1029"],"URL":"https:\/\/doi.org\/10.1007\/s12650-024-01029-2","relation":{},"ISSN":["1343-8875","1875-8975"],"issn-type":[{"value":"1343-8875","type":"print"},{"value":"1875-8975","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,21]]},"assertion":[{"value":"7 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}