{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:18:30Z","timestamp":1757618310391,"version":"3.44.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T00:00:00Z","timestamp":1749513600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T00:00:00Z","timestamp":1749513600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"the Innovation Team Funds of China West Normal University","award":["KCXTD2022-3"],"award-info":[{"award-number":["KCXTD2022-3"]}]},{"name":"the Sichuan Science and Technology Program","award":["2024ZYD0272"],"award-info":[{"award-number":["2024ZYD0272"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s40747-025-01939-0","type":"journal-article","created":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T03:53:27Z","timestamp":1749527607000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A redundant weight removal method inspired by specific immunotherapy for boosting transfer learning security"],"prefix":"10.1007","volume":"11","author":[{"given":"Qing","family":"Huang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0790-6836","authenticated-orcid":false,"given":"Hongli","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Junxiang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Bochuan","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,10]]},"reference":[{"issue":"10","key":"1939_CR1","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"SJ Pan","year":"2010","unstructured":"Pan SJ, Yang Q (2010) A survey on transfer learning. IEEE Trans Knowl Data Eng 22(10):1345\u201359","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1939_CR2","doi-asserted-by":"crossref","unstructured":"Weiss K, Khoshgoftaar TM, Wang D (2016) A survey of transfer learning. J Big Data 3(1)","DOI":"10.1186\/s40537-016-0043-6"},{"key":"1939_CR3","doi-asserted-by":"crossref","unstructured":"Simhadri CG, Kondaveeti HK (2023) Automatic recognition of rice leaf diseases using transfer learning. Agronomy 13(4):961 https:\/\/www.mdpi.com\/2073-4395\/13\/4\/961","DOI":"10.3390\/agronomy13040961"},{"issue":"1","key":"1939_CR4","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1002\/rob.21869","volume":"37","author":"P Bosilj","year":"2019","unstructured":"Bosilj P, Aptoula E, Duckett T, Cielniak G (2019) Transfer learning between crop types for semantic segmentation of crops versus weeds in precision agriculture. J Field Robot 37(1):7\u201319","journal-title":"J Field Robot"},{"key":"1939_CR5","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.biosystemseng.2021.01.014","volume":"204","author":"B Espejo-Garcia","year":"2021","unstructured":"Espejo-Garcia B, Mylonas N, Athanasakos L, Vali E, Fountas S (2021) Combining generative adversarial networks and agricultural transfer learning for weeds identification. Biosyst Eng 204:79\u201389","journal-title":"Biosyst Eng"},{"issue":"4","key":"1939_CR6","doi-asserted-by":"publisher","first-page":"1144","DOI":"10.1007\/s40815-017-0305-2","volume":"19","author":"N Razmjooy","year":"2017","unstructured":"Razmjooy N, Ramezani M, Ghadimi N (2017) Imperialist competitive algorithm-based optimization of neuro-fuzzy system parameters for automatic red-eye removal. Int J Fuzzy Syst 19(4):1144\u201356","journal-title":"Int J Fuzzy Syst"},{"key":"1939_CR7","doi-asserted-by":"publisher","first-page":"105858","DOI":"10.1016\/j.bspc.2023.105858","volume":"90","author":"L Zhang","year":"2024","unstructured":"Zhang L, Zhang J, Gao W, Bai F, Li N, Ghadimi N (2024) A deep learning outline aimed at prompt skin cancer detection utilizing gated recurrent unit networks and improved orca predation algorithm. Biomed Signal Process Control 90:105858\u20138","journal-title":"Biomed Signal Process Control"},{"key":"1939_CR8","doi-asserted-by":"crossref","unstructured":"Han M, Zhao S, Yin H, Hu G, Ghadimi N (2024) Timely detection of skin cancer: an AI-based approach on the basis of the integration of Echo state network and adapted seasons optimization algorithm. Biomed Signal Process Control 94:106324 https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1746809424003823?via%3Dihub","DOI":"10.1016\/j.bspc.2024.106324"},{"key":"1939_CR9","doi-asserted-by":"crossref","unstructured":"Cai X, Li X, Razmjooy N, Ghadimi N (2021) Breast cancer diagnosis by convolutional neural network and advanced thermal exchange optimization algorithm. In: Fantacci ME (ed), Computational and mathematical methods in medicine. pp 1\u201313","DOI":"10.1155\/2021\/5595180"},{"issue":"1","key":"1939_CR10","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1515\/med-2018-0002","volume":"13","author":"N Razmjooy","year":"2018","unstructured":"Razmjooy N, Sheykhahmad FR, Ghadimi N (2018) A hybrid neural network\u2014world cup optimization algorithm for melanoma detection. Open Med 13(1):9\u201316","journal-title":"Open Med"},{"issue":"1","key":"1939_CR11","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1515\/med-2020-0131","volume":"15","author":"Z Xu","year":"2020","unstructured":"Xu Z, Sheykhahmad FR, Ghadimi N, Razmjooy N (2020) Computer-aided diagnosis of skin cancer based on soft computing techniques. Open Med 15(1):860\u201371","journal-title":"Open Med"},{"key":"1939_CR12","doi-asserted-by":"crossref","unstructured":"Liu H, Ghadimi N (2024) Hybrid convolutional neural network and flexible dwarf mongoose optimization algorithm for strong kidney stone diagnosis. Biomed Signal Process Contr 91:106024. https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S174680942400082X","DOI":"10.1016\/j.bspc.2024.106024"},{"key":"1939_CR13","doi-asserted-by":"crossref","unstructured":"Guan J, Cai J, Bai H, You I (2021) Deep transfer learning-based network traffic classification for scarce dataset in 5G IoT systems. Int J Mach Learn Cybern","DOI":"10.1007\/s13042-021-01415-4"},{"key":"1939_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.adapen.2022.100084","volume":"5","author":"G Pinto","year":"2022","unstructured":"Pinto G, Wang Z, Roy A, Hong T, Capozzoli A (2022) Transfer learning for smart buildings: a critical review of algorithms, applications, and future perspectives. Adv Appl Energy 5:100084","journal-title":"Adv Appl Energy"},{"key":"1939_CR15","doi-asserted-by":"publisher","first-page":"107335","DOI":"10.1109\/ACCESS.2020.3000476","volume":"8","author":"L Vu","year":"2020","unstructured":"Vu L, Nguyen QU, Nguyen DN, Hoang DT, Dutkiewicz E (2020) Deep transfer learning for IoT attack detection. IEEE Access 8:107335\u201344","journal-title":"IEEE Access"},{"key":"1939_CR16","doi-asserted-by":"crossref","unstructured":"Zhang Z, Li Y, Wang J, Liu B, Li D, Guo Y, et al. (2022) ReMoS. In: Proceedings of the 44th international conference on software engineering","DOI":"10.1145\/3510003.3510191"},{"key":"1939_CR17","unstructured":"PyTorch [Internet]. www.pytorch.org. Available from: https:\/\/pytorch.org\/hub\/"},{"key":"1939_CR18","doi-asserted-by":"crossref","unstructured":"Qi B, Sun H, Gao X, Zhang H, Li Z, Liu X (2023) Reusing deep neural network models through model re-engineering. arXiv (Cornell University), pp 983\u2013994","DOI":"10.1109\/ICSE48619.2023.00090"},{"key":"1939_CR19","doi-asserted-by":"crossref","unstructured":"Liu K, Dolan-Gavitt B, Garg S (2018) Fine-pruning: defending against backdooring attacks on deep neural networks. Res Attacks Intrus Defen 273\u2013294 https:\/\/moyix.net\/finepruning.pdf","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"1939_CR20","unstructured":"Li X, Xiong H, Wang H, Rao Y, Liu L, Huan J (2019) Delta: deep learning transfer using feature map with attention for convolutional networks. In: International conference on learning representations"},{"key":"1939_CR21","doi-asserted-by":"crossref","unstructured":"Chin TW, Zhang C, Marculescu D (2021) Renofeation: a simple transfer learning method for improved adversarial robustness. In: 2022 IEEE\/CVF conference on computer vision and pattern recognition workshops (CVPRW) 1: 3237\u20133246","DOI":"10.1109\/CVPRW53098.2021.00362"},{"issue":"8","key":"1939_CR22","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1111\/all.14218","volume":"75","author":"H Lou","year":"2020","unstructured":"Lou H, Huang Y, Ouyang Y, Zhang Y, Xi L, Chu X et al (2020) Artemisia annusublingual immunotherapy for seasonal allergic rhinitis: a randomized controlled trial. Allergy 75(8):2026\u201336","journal-title":"Allergy"},{"key":"1939_CR23","unstructured":"Ariadna Q, Torralba A (2009) Recognizing indoor scenes. Comput Vis Patt Recog"},{"key":"1939_CR24","unstructured":"Wah C, Branson S, Welinder P, Perona P, Belongie S (2011) The caltech-UCSD birds-200-2011 dataset"},{"key":"1939_CR25","unstructured":"Khosla A, Jayadevaprakash N, Yao B, Li FF. Novel dataset for fine-grained image categorization: stanford dogs"},{"key":"1939_CR26","doi-asserted-by":"crossref","unstructured":"Nilsback ME, Zisserman A (2008) Automated flower classification over a large number of classes. In: 2008 sixth Indian conference on computer vision, graphics & image processing [Internet]. http:\/\/yadda.icm.edu.pl\/yadda\/element\/bwmeta1.element.ieee-000004756141","DOI":"10.1109\/ICVGIP.2008.47"},{"issue":"12","key":"1939_CR27","doi-asserted-by":"publisher","first-page":"2247","DOI":"10.1109\/TPAMI.2007.70711","volume":"29","author":"L Gorelick","year":"2007","unstructured":"Gorelick L, Blank M, Shechtman E, Irani M, Basri R (2007) Actions as space-time shapes. IEEE Trans Patt Anal Mach Intell 29(12):2247\u201353","journal-title":"IEEE Trans Patt Anal Mach Intell"},{"key":"1939_CR28","unstructured":"Kermany DS, Goldbaum M, Cai W (2018) Chest x-ray images (pneumonia) dataset"},{"key":"1939_CR29","unstructured":"Huang L, Ph DP (2019) Traffic sign recognition database (TSRD)"},{"key":"1939_CR30","unstructured":"fastai (2019) GitHub-fastai\/imagenette: A smaller subset of 10 easily classified classes from Imagenet, and a little more French [Internet]. GitHub. [cited 2025 Apr 5]. https:\/\/github.com\/fastai\/imagenette#imagewoof"},{"key":"1939_CR31","unstructured":"Rezaei S, Liu X (2019) A target-agnostic attack on deep models: exploiting security vulnerabilities of transfer learning. arXiv (Cornell University)"},{"key":"1939_CR32","doi-asserted-by":"crossref","unstructured":"Yao Y, Li H, Zheng H, Zhao BY (2019) Latent backdoor attacks on deep neural networks. In: Proceedings of the 2019 ACM SIGSAC conference on computer and communications security [Internet]. 2019 [cited 2020 Oct 29]; https:\/\/people.cs.uchicago.edu\/~ravenben\/publications\/pdf\/pbackdoor-ccs19.pdf","DOI":"10.1145\/3319535.3354209"},{"key":"1939_CR33","unstructured":"Madry A, Aleksandar Makelov, Schmidt L, Dimitris Tsipras, Vladu A (2017) Towards deep learning models resistant to adversarial attacks"},{"key":"1939_CR34","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389","volume-title":"Artificial intelligence safety and security","author":"RV Yampolskiy","year":"2018","unstructured":"Yampolskiy RV (2018) Artificial intelligence safety and security. Crc Press\/Taylor & Francis Group, Boca Raton"},{"key":"1939_CR35","unstructured":"Goodfellow I, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv (Cornell University)"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-01939-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-025-01939-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-01939-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T19:39:49Z","timestamp":1757187589000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-025-01939-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,10]]},"references-count":35,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1939"],"URL":"https:\/\/doi.org\/10.1007\/s40747-025-01939-0","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2025,6,10]]},"assertion":[{"value":"26 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"330"}}