{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:36:57Z","timestamp":1763203017442,"version":"3.44.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:00:00Z","timestamp":1753920000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:00:00Z","timestamp":1753920000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Song Shan Laboratory","award":["221100210700-3"],"award-info":[{"award-number":["221100210700-3"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s40747-025-02038-w","type":"journal-article","created":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T10:38:18Z","timestamp":1753958298000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards fair class-wise robustness: class optimal distribution adversarial training"],"prefix":"10.1007","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-5235-7243","authenticated-orcid":false,"given":"Hongxin","family":"Zhi","sequence":"first","affiliation":[]},{"given":"Hongtao","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Shaomei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiuming","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yiteng","family":"wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,31]]},"reference":[{"key":"2038_CR1","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv e-prints. arXiv:1412.6572 [stat.ML]"},{"key":"2038_CR2","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. arXiv e-prints. arXiv:1312.6199 [cs.CV]"},{"key":"2038_CR3","doi-asserted-by":"publisher","unstructured":"Chen C, Seff A, Kornhauser A, Xiao J (2015) Deepdriving: learning affordance for direct perception in autonomous driving. In: 2015 IEEE international conference on computer vision (ICCV). https:\/\/doi.org\/10.1109\/iccv.2015.312","DOI":"10.1109\/iccv.2015.312"},{"key":"2038_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107332","volume":"110","author":"X Ma","year":"2021","unstructured":"Ma X, Niu Y, Gu L, Wang Y, Zhao Y, Bailey J, Lu F (2021) Understanding adversarial attacks on deep learning based medical image analysis systems. Pattern Recognit 110:107332. https:\/\/doi.org\/10.1016\/j.patcog.2020.107332","journal-title":"Pattern Recognit"},{"key":"2038_CR5","unstructured":"Morgulis N, Kreines A, Mendelowitz S, Weisglass Y (2019) Fooling a real car with adversarial traffic signs. arXiv e-prints arXiv:1907.00374 [cs.CR]"},{"key":"2038_CR6","doi-asserted-by":"publisher","unstructured":"Sharif M, Bhagavatula S, Bauer L, Reiter MK (2016) Accessorize to a crime. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. https:\/\/doi.org\/10.1145\/2976749.2978392","DOI":"10.1145\/2976749.2978392"},{"issue":"4","key":"2038_CR7","first-page":"479","volume":"6","author":"T Kalai Selvi","year":"2024","unstructured":"Kalai Selvi T, Abirami S, Aravind S, Ariharan M (2024) Fake profile identification in e-learning platform using machine learning. J Artif Intell 6(4):479\u2013493","journal-title":"J Artif Intell"},{"issue":"1","key":"2038_CR8","doi-asserted-by":"publisher","first-page":"67","DOI":"10.36548\/jtcsst.2024.1.005","volume":"6","author":"RK Jha","year":"2024","unstructured":"Jha RK, Jha M (2024) Optimizing e-government cybersecurity through artificial intelligence integration. J Trends Comput Sci Smart Technol 6(1):67\u201387","journal-title":"J Trends Comput Sci Smart Technol"},{"key":"2038_CR9","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2017) Towards deep learning models resistant to adversarial attacks. arXiv e-prints arXiv:1706.06083 [stat.ML]"},{"key":"2038_CR10","doi-asserted-by":"publisher","unstructured":"Papernot N, McDaniel P, Wu X, Jha S, Swami A (2016) Distillation as a defense to adversarial perturbations against deep neural networks. In: 2016 IEEE symposium on security and privacy (SP). https:\/\/doi.org\/10.1109\/sp.2016.41","DOI":"10.1109\/sp.2016.41"},{"key":"2038_CR11","unstructured":"Raghunathan A, Steinhardt J, Liang P (2018) Certified defenses against adversarial examples. In: International conference on learning representations"},{"key":"2038_CR12","doi-asserted-by":"publisher","unstructured":"Xie C, Wu Y, Maaten LVD, Yuille AL, He K (2019) Feature denoising for improving adversarial robustness. In: 2019 IEEE\/CVF conference on computer vision and pattern recognition (CVPR). https:\/\/doi.org\/10.1109\/cvpr.2019.00059","DOI":"10.1109\/cvpr.2019.00059"},{"key":"2038_CR13","doi-asserted-by":"publisher","unstructured":"Xu W, Evans D, Qi Y (2018) Feature squeezing: Detecting adversarial examples in deep neural networks. In: Proceedings 2018 network and distributed system security symposium. https:\/\/doi.org\/10.14722\/ndss.2018.23198","DOI":"10.14722\/ndss.2018.23198"},{"key":"2038_CR14","doi-asserted-by":"publisher","first-page":"2300658","DOI":"10.1002\/aisy.202300658","volume":"6","author":"H Zhi","year":"2024","unstructured":"Zhi H, Yu H, Li S, Huang R (2024) MA-CAT: misclassification-aware contrastive adversarial training. Adv Intell Syst 6:2300658","journal-title":"Adv Intell Syst"},{"key":"2038_CR15","unstructured":"Zhang H, Yu Y, Jiao J, Xing E, Ghaoui L, Jordan M (2019) Theoretically principled trade-off between robustness and accuracy. In: International conference on machine learning"},{"key":"2038_CR16","unstructured":"Benz P, Zhang C, Karjauv A, Kweon IS (2021) Robustness may be at odds with fairness: an empirical study on class-wise accuracy. In: NeurIPS 2020 workshop on pre-registration in machine learning. PMLR, pp 325\u2013342"},{"key":"2038_CR17","doi-asserted-by":"crossref","unstructured":"Tian Q, Kuang K, Jiang K, Wu F, Wang Y (2021) Analysis and applications of class-wise robustness in adversarial training. arXiv:2105.14240 [cs.CV]","DOI":"10.1145\/3447548.3467403"},{"key":"2038_CR18","unstructured":"Xu H, Liu X, Li Y, Jain A, Tang J (2021) To be robust or to be fair: towards fairness in adversarial training. In: International conference on machine learning. PMLR, pp 11492\u201311501"},{"key":"2038_CR19","unstructured":"Lee H, Lee S, Jang H, Park J, Bae H, Yoon S (2024) DAFA: distance-aware fair adversarial training. arXiv preprint arXiv:2401.12532"},{"key":"2038_CR20","doi-asserted-by":"crossref","unstructured":"Li B, Liu W (2023) WAT: improve the worst-class robustness in adversarial training. In: Proceedings of the AAAI conference on artificial intelligence, vol 37, pp 14982\u201314990","DOI":"10.1609\/aaai.v37i12.26749"},{"key":"2038_CR21","unstructured":"Pethick T, Chrysos GG, Cevher V (2023) Revisiting adversarial training for the worst-performing class. arXiv e-prints arXiv:2302.08872 [cs.LG]"},{"key":"2038_CR22","doi-asserted-by":"crossref","unstructured":"Sun C, Xu C, Yao C, Liang S, Wu Y, Liang D, Liu X, Liu A (2023) Improving robust fariness via balance adversarial training. In: Proceedings of the AAAI conference on artificial intelligence, vol 37, pp 15161\u201315169","DOI":"10.1609\/aaai.v37i12.26769"},{"key":"2038_CR23","doi-asserted-by":"publisher","unstructured":"Wei Z, Wang Y, Guo Y, Wang Y (2023) CFA: class-wise calibrated fair adversarial training. In: 2023 IEEE\/CVF conference on computer vision and pattern recognition (CVPR), pp 8193\u20138201. https:\/\/doi.org\/10.1109\/CVPR52729.2023.00792","DOI":"10.1109\/CVPR52729.2023.00792"},{"key":"2038_CR24","unstructured":"Rahimian H, Mehrotra S (2019) Distributionally robust optimization: a review. arXiv e-prints arXiv:1908.05659 [math.OC]"},{"key":"2038_CR25","unstructured":"Tsipras D, Santurkar S, Engstrom L, Turner A, Madry A (2018) Robustness may be at odds with accuracy. In: International conference on learning representations"},{"key":"2038_CR26","unstructured":"Yang Y-Y, Rashtchian C, Zhang H, Salakhutdinov R, Chaudhuri K (2020) A closer look at accuracy vs. robustness. In: Neural information processing systems"},{"key":"2038_CR27","unstructured":"Rice L, Wong E, Zico Kolter J (2020) Overfitting in adversarially robust deep learning. arXiv e-prints arXiv:2002.11569 [cs.LG]"},{"key":"2038_CR28","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1997","unstructured":"Freund Y, Schapire RE (1997) A decision-theoretic generalization of on-line learning and an application to boosting. J Comput Syst Sci 55:119\u2013139. https:\/\/doi.org\/10.1006\/jcss.1997.1504","journal-title":"J Comput Syst Sci"},{"key":"2038_CR29","doi-asserted-by":"publisher","first-page":"21","DOI":"10.21314\/jor.2000.038","volume":"2","author":"RT Rockafellar","year":"2016","unstructured":"Rockafellar RT, Uryasev S (2016) Optimization of conditional value-at-risk. J Risk 2:21\u201341. https:\/\/doi.org\/10.21314\/jor.2000.038","journal-title":"J Risk"},{"key":"2038_CR30","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1137\/s0097539701398375","volume":"32","author":"P Auer","year":"2002","unstructured":"Auer P, Cesa-Bianchi N, Freund Y, Schapire RE (2002) The nonstochastic multiarmed bandit problem. SIAM J Comput 32:48\u201377. https:\/\/doi.org\/10.1137\/s0097539701398375","journal-title":"SIAM J Comput"},{"key":"2038_CR31","doi-asserted-by":"crossref","unstructured":"McInnes L, Healy J, Melville J (2018) UMAP: uniform manifold approximation and projection for dimension reduction. arXiv e-prints arXiv:1802.03426 [stat.ML]","DOI":"10.21105\/joss.00861"},{"key":"2038_CR32","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1038\/s42256-020-00257-z","volume":"2","author":"R Geirhos","year":"2020","unstructured":"Geirhos R, Jacobsen J-H, Michaelis C, Zemel R, Brendel W, Bethge M, Wichmann FA (2020) Shortcut learning in deep neural networks. Nat Mach Intell 2:665\u2013673. https:\/\/doi.org\/10.1038\/s42256-020-00257-z","journal-title":"Nat Mach Intell"},{"key":"2038_CR33","unstructured":"Qi Q, Guo Z, Xu Y, Jin R, Yang T (2020) An online method for a class of distributionally robust optimization with non-convex objectives. arXiv e-prints arXiv:2006.10138 [cs.LG]"},{"key":"2038_CR34","first-page":"16020","volume":"34","author":"J Wang","year":"2021","unstructured":"Wang J, Zhang T, Liu S, Chen P-Y, Xu J, Fardad M, Li B (2021) Adversarial attack generation empowered by min-max optimization. Adv Neural Inf Process Syst 34:16020\u201316033","journal-title":"Adv Neural Inf Process Syst"},{"key":"2038_CR35","unstructured":"Krizhevsky A, Hinton G et al (2009) Learning multiple layers of features from tiny images"},{"key":"2038_CR36","unstructured":"Netzer Y, Wang T, Coates A, Bissacco A, Wu B, Ng AY et\u00a0al (2011) Reading digits in natural images with unsupervised feature learning. In: NIPS workshop on deep learning and unsupervised feature learning, vol 2011, p. 7"},{"key":"2038_CR37","unstructured":"Coates A, Ng A, Lee H (2011) An analysis of single-layer networks in unsupervised feature learning. In: International conference on artificial intelligence and statistics"},{"key":"2038_CR38","doi-asserted-by":"publisher","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: 2016 IEEE conference on computer vision and pattern recognition (CVPR). https:\/\/doi.org\/10.1109\/cvpr.2016.90","DOI":"10.1109\/cvpr.2016.90"},{"key":"2038_CR39","doi-asserted-by":"publisher","unstructured":"Zagoruyko S, Komodakis N (2016) Wide residual networks. In: Proceedings of the British machine vision conference 2016. https:\/\/doi.org\/10.5244\/c.30.87","DOI":"10.5244\/c.30.87"},{"key":"2038_CR40","doi-asserted-by":"publisher","unstructured":"Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 IEEE symposium on security and privacy (SP). https:\/\/doi.org\/10.1109\/sp.2017.49","DOI":"10.1109\/sp.2017.49"},{"key":"2038_CR41","unstructured":"Croce F, Hein M (2020) Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In: International conference on machine learning"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-02038-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-025-02038-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-02038-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T08:57:12Z","timestamp":1757321832000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-025-02038-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,31]]},"references-count":41,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2038"],"URL":"https:\/\/doi.org\/10.1007\/s40747-025-02038-w","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2025,7,31]]},"assertion":[{"value":"17 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"403"}}