{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T06:59:21Z","timestamp":1764053961533,"version":"3.37.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T00:00:00Z","timestamp":1736208000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T00:00:00Z","timestamp":1736208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62107021","61971316"],"award-info":[{"award-number":["62107021","61971316"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["CCNU22JC027"],"award-info":[{"award-number":["CCNU22JC027"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018583","name":"Wuhan Science and Technology Project","doi-asserted-by":"publisher","award":["2022010801010273"],"award-info":[{"award-number":["2022010801010273"]}],"id":[{"id":"10.13039\/501100018583","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s40747-024-01704-9","type":"journal-article","created":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T08:45:59Z","timestamp":1736239559000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Batch-in-Batch: a new adversarial training framework for initial perturbation and sample selection"],"prefix":"10.1007","volume":"11","author":[{"given":"Yinting","family":"Wu","sequence":"first","affiliation":[]},{"given":"Pai","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Cai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9191-9367","authenticated-orcid":false,"given":"Le","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,7]]},"reference":[{"key":"1704_CR1","doi-asserted-by":"crossref","unstructured":"Chen T, Liu S, Chang S, Cheng Y, Amini L, Wang Z (2020) Adversarial robustness: From self-supervised pre-training to fine-tuning. In: Proceedings of the IEEE\/CVF Conference on computer vision and pattern recognition, pp. 699\u2013708","DOI":"10.1109\/CVPR42600.2020.00078"},{"key":"1704_CR2","unstructured":"Goodfellow I, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. In: International Conference on Learning Representations (ICLR)"},{"key":"1704_CR3","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","volume":"84","author":"B Biggio","year":"2018","unstructured":"Biggio B, Roli F (2018) Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recogn 84:317\u2013331","journal-title":"Pattern Recogn"},{"key":"1704_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.108889","volume":"131","author":"Z Qian","year":"2022","unstructured":"Qian Z, Huang K, Wang Q-F, Zhang X-Y (2022) A survey of robust adversarial training in pattern recognition: fundamental, theory, and methodologies. Pattern Recogn 131:108889","journal-title":"Pattern Recogn"},{"key":"1704_CR5","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras, D, Vladu, A (2018) Towards deep learning models resistant to adversarial attacks. In: International Conference on learning representations"},{"key":"1704_CR6","first-page":"7779","volume":"33","author":"T Pang","year":"2020","unstructured":"Pang T, Yang X, Dong Y, Xu K, Zhu J, Su H (2020) Boosting adversarial training with hypersphere embedding. Adv Neural Inf Process Syst 33:7779\u20137792","journal-title":"Adv Neural Inf Process Syst"},{"key":"1704_CR7","unstructured":"Wong E, Rice L, Kolter JZ (2020) Fast is better than free: Revisiting adversarial training. International Conference on learning representations (ICLR)"},{"key":"1704_CR8","first-page":"16048","volume":"33","author":"M Andriushchenko","year":"2020","unstructured":"Andriushchenko M, Flammarion N (2020) Understanding and improving fast adversarial training. Adv Neural Inf Process Syst 33:16048\u201316059","journal-title":"Adv Neural Inf Process Syst"},{"key":"1704_CR9","unstructured":"Pang T, Lin M, Yang X, Zhu J, Yan S (2022) Robustness and accuracy could be reconcilable by (proper) definition. In: International Conference on machine learning"},{"key":"1704_CR10","unstructured":"Zhang H, Yu Y, Jiao J, Xing E, El\u00a0Ghaoui L, Jordan M (2019) Theoretically principled trade-off between robustness and accuracy. In: International Conference on machine learning, pp. 7472\u20137482. Proceedings of Machine Learning Research"},{"key":"1704_CR11","unstructured":"Tram\u00e8r F, Kurakin A, Papernot N, Goodfellow I, Boneh D, McDaniel P (2018) Ensemble adversarial training: attacks and defenses. In: International Conference on learning representations"},{"key":"1704_CR12","unstructured":"de Jorge Aranda P, Bibi A, Volpi R, Sanyal A, Torr P, Rogez G, Dokania P (2022) Make Some Noise: Reliable and Efficient Single-Step Adversarial Training. In: Koyejo S, Mohamed S, garwal A, Belgrave D, Cho K, Oh A (eds) Advances in Neural Information Processing Systems, vol. 35, Curran Associates, Inc., pp 12881\u201312893. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2022\/file\/5434a6b40f8f65488e722bc33d796c8b-Paper-Conference.pdf"},{"key":"1704_CR13","unstructured":"Ortiz-Jimenez G, Jorge P, Sanyal A, Bibi A, Dokania PK, Frossard P, Rogez G, Torr P (2023) Catastrophic overfitting can be induced with discriminative non-robust features. Trans Mach Learn Res. https:\/\/openreview.net\/forum?id=10hCbu70Sr (ISSN: 2835\u20138856)"},{"key":"1704_CR14","doi-asserted-by":"crossref","unstructured":"He Z, Li T, Chen S, Huang X (2023) Investigating catastrophic overfitting in fast adversarial training: A self-fitting perspective. In: 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 2314\u20132321","DOI":"10.1109\/CVPRW59228.2023.00227"},{"key":"1704_CR15","unstructured":"Ilyas A, Santurkar S, Tsipras D, Engstrom L, Tran B, Madry A (2019) Adversarial examples are not bugs, they are features. In: Wallach H, Larochelle H, Beygelzimer A, d\u2019Alch\u00e9-Buc F, Fox E, Garnett R (eds) Advances in Neural Information Processing systems, vol. 32, Curran Associates, Inc., pp 125\u2013137. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2019\/file\/e2c420d928d4bf8ce0ff2ec19b371514-Paper.pdf"},{"key":"1704_CR16","doi-asserted-by":"crossref","unstructured":"Kim H, Lee W, Lee J (2021) Understanding catastrophic overfitting in single-step adversarial training. In: Proceedings of the AAAI Conference on artificial intelligence, vol. 35, pp. 8119\u20138127","DOI":"10.1609\/aaai.v35i9.16989"},{"key":"1704_CR17","unstructured":"Rice L, Wong E, Kolter Z (2020) Overfitting in adversarially robust deep learning. In: International Conference on Machine Learning, pp. 8093\u20138104. Proceedings of Machine Learning Research"},{"issue":"2","key":"1704_CR18","first-page":"239","volume":"21","author":"MD McKay","year":"1979","unstructured":"McKay MD, Beckman RJ, Conover WJ (1979) A comparison of three methods for selecting values of input variables in the analysis of output from a computer code. Technometrics 21(2):239\u2013245","journal-title":"Technometrics"},{"key":"1704_CR19","unstructured":"Wang Y, Zou D, Yi J, Bailey J, Ma X, Gu Q (2020) Improving adversarial robustness requires revisiting misclassified examples. In: International Conference on learning representations"},{"key":"1704_CR20","doi-asserted-by":"crossref","unstructured":"Zhou P, Hou Y, Feng J (2018) Deep adversarial subspace clustering. In: Proceedings of the IEEE Conference on computer vision and pattern recognition (CVPR)","DOI":"10.1109\/CVPR.2018.00172"},{"key":"1704_CR21","doi-asserted-by":"crossref","unstructured":"Li T, Wu Y, Chen S, Fang K, Huang X (2022) Subspace adversarial training. In: Proceedings of the IEEE\/CVF Conference on computer vision and pattern recognition (CVPR), pp. 13409\u201313418","DOI":"10.1109\/CVPR52688.2022.01305"},{"key":"1704_CR22","unstructured":"Shafahi A, Najibi M, Ghiasi MA, Xu Z, Dickerson J, Studer C, Davis LS, Taylor G, Goldstein T (2019) Adversarial training for free!. In: Wallach H, Larochelle H, Beygelzimer A, d\u2019Alch\u00e9-Buc F, Fox E, Garnett R (eds) Advances in Neural Information Processing Systems, vol. 32, Curran Associates, Inc., pp 3335\u20133347. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2019\/file\/7503cfacd12053d309b6bed5c89de212-Paper.pdf"},{"key":"1704_CR23","unstructured":"Krizhevsky A, Hinton G, et al (2009) Learning multiple layers of features from tiny images. Master\u2019s thesis, Department of Computer Science, University of Toronto"},{"key":"1704_CR24","unstructured":"Netzer Y, Wang T, Coates A, Bissacco A, Wu B, Ng AY (2021) Reading digits in natural images with unsupervised feature learning. In: NIPS Workshop on Deep Learning and Unsupervised Feature Learning"},{"key":"1704_CR25","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Identity mappings in deep residual networks. In: Computer Vision\u2013ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11\u201314, 2016, Proceedings, Part IV 14, pp. 630\u2013645. Springer","DOI":"10.1007\/978-3-319-46493-0_38"},{"key":"1704_CR26","doi-asserted-by":"crossref","unstructured":"Zagoruyko S, Komodakis N (2016) Wide residual networks. In: Proceedings of the British Machine Vision Conference (BMVC), pp. 87\u201318712","DOI":"10.5244\/C.30.87"},{"key":"1704_CR27","unstructured":"Bengio Y, Goodfellow I, Courville A (2017) Deep Learn 1:292\u2013295"},{"key":"1704_CR28","doi-asserted-by":"crossref","unstructured":"Gu J, Zhao H, Tresp V, Torr PHS (2022) Segpgd: an effective and efficient adversarial attack for evaluating and boosting segmentation robustness. In: Computer Vision\u2014ECCV 2022, pp 308\u2013325","DOI":"10.1007\/978-3-031-19818-2_18"},{"key":"1704_CR29","unstructured":"Croce F, Hein M (2020) Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In: Proceedings of Machine Learning Research, pp. 2206\u20132216"},{"key":"1704_CR30","unstructured":"Keskar NS, Mudigere D, Nocedal J, Smelyanskiy M, Tang PTP. On large-batch training for deep learning: generalization gap and sharp minima. In: International Conference on learning representations (2017)"},{"key":"1704_CR31","unstructured":"Lin T, Stich SU, Patel KK, Jaggi M (2020) Don\u2019t use large mini-batches, use local sgd. In: International Conference on learning representations"},{"key":"1704_CR32","unstructured":"Chen T, Zhang Z, Liu S, Chang S, Wang Z (2021) Robust overfitting may be mitigated by properly learned smoothening. In: International Conference on learning representations"},{"key":"1704_CR33","doi-asserted-by":"crossref","unstructured":"Hein M, Andriushchenko M, Bitterwolf J (2019) Why relu networks yield high-confidence predictions far away from the training data and how to mitigate the problem. In: Proceedings of the IEEE\/CVF Conference on computer vision and pattern recognition, pp. 41\u201350","DOI":"10.1109\/CVPR.2019.00013"},{"key":"1704_CR34","first-page":"39059","volume":"35","author":"J Grabinski","year":"2022","unstructured":"Grabinski J, Gavrikov P, Keuper J, Keuper M (2022) Robust models are less over-confident. Adv Neural Inf Process Syst 35:39059\u201339075","journal-title":"Adv Neural Inf Process Syst"},{"key":"1704_CR35","unstructured":"Stutz D, Hein M, Schiele B (2020) Confidence-calibrated adversarial training: Generalizing to unseen attacks. In: International Conference on Machine Learning, pp. 9155\u20139166. Proceedings of Machine Learning Research"},{"key":"1704_CR36","doi-asserted-by":"crossref","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on computer vision and pattern recognition, pp. 2818\u20132826","DOI":"10.1109\/CVPR.2016.308"},{"key":"1704_CR37","unstructured":"Qin Y, Wang X, Beutel A, Chi E (2021) Improving calibration through the relationship with adversarial robustness. In: Advances in Neural Information Processing Systems, vol. 34, pp. 14358\u201314369"},{"issue":"2","key":"1704_CR38","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0378-3758(90)90122-B","volume":"26","author":"ME Johnson","year":"1990","unstructured":"Johnson ME, Moore LM, Ylvisaker D (1990) Minimax and maximin distance designs. J Stat Plan Infer 26(2):131\u2013148","journal-title":"J Stat Plan Infer"},{"key":"1704_CR39","unstructured":"Joseph VR, Hung Y (2008) Orthogonal-maximin Latin hypercube designs. Stat Sinica 18(1):171\u2013186. http:\/\/www.jstor.org\/stable\/24308251"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01704-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01704-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01704-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T16:29:42Z","timestamp":1738945782000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01704-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,7]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["1704"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01704-9","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2025,1,7]]},"assertion":[{"value":"18 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Ethics Committee approval was obtained from the Institutional Ethics Committee of Central China Normal University to the commencement of the study. Moreover, the authors declare that the manuscript is not submitted to more than one journal for simultaneous consideration; The submitted work is original and was not published elsewhere in any form or language (partially or in full); A single study is not be split up into several parts to increase the quantity of submissions and submitted to various journals or to one journal over time; Results are presented clearly, honestly, and without fabrication, falsification or inappropriate data manipulation; No data, text, or theories by others are presented as if they were the author\u2019s own and proper acknowledgements to other works are given.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical and informed consent for data used"}}],"article-number":"132"}}