{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:35:33Z","timestamp":1774542933092,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T00:00:00Z","timestamp":1662768000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T00:00:00Z","timestamp":1662768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["SCHM 2796\/5 and GRK 2497"],"award-info":[{"award-number":["SCHM 2796\/5 and GRK 2497"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["05H2021"],"award-info":[{"award-number":["05H2021"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007210","name":"RWTH Aachen University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007210","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Softw Big Sci"],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Deep learning is a standard tool in the field of high-energy physics, facilitating considerable sensitivity enhancements for numerous analysis strategies. In particular, in identification of physics objects, such as jet flavor tagging, complex neural network architectures play a major role. However, these methods are reliant on accurate simulations. Mismodeling can lead to non-negligible differences in performance in data that need to be measured and calibrated against. We investigate the classifier response to input data with injected mismodelings and probe the vulnerability of flavor tagging algorithms via application of adversarial attacks. Subsequently, we present an adversarial training strategy that mitigates the impact of such simulated attacks and improves the classifier robustness. We examine the relationship between performance and vulnerability and show that this method constitutes a promising approach to reduce the vulnerability to poor modeling.<\/jats:p>","DOI":"10.1007\/s41781-022-00087-1","type":"journal-article","created":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T05:02:36Z","timestamp":1662786156000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Improving Robustness of Jet Tagging Algorithms with Adversarial Training"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0713-811X","authenticated-orcid":false,"given":"Annika","family":"Stein","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3791-2009","authenticated-orcid":false,"given":"Xavier","family":"Coubez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0153-7590","authenticated-orcid":false,"given":"Spandan","family":"Mondal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0389-5896","authenticated-orcid":false,"given":"Andrzej","family":"Novak","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2711-8984","authenticated-orcid":false,"given":"Alexander","family":"Schmidt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,10]]},"reference":[{"issue":"7553","key":"87_CR1","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y Lecun","year":"2015","unstructured":"Lecun Y, Bengio Y, Hinton G (2015) Deep learning. Nat Cell Biol 521(7553):436. https:\/\/doi.org\/10.1038\/nature14539","journal-title":"Nat Cell Biol"},{"key":"87_CR2","unstructured":"Goodfellow I, Bengio Y, Courville A (2016) Deep learning. MIT Press. http:\/\/www.deeplearningbook.org. Accessed 2 Aug 2022"},{"key":"87_CR3","doi-asserted-by":"publisher","unstructured":"Albertsson K et\u00a0al (2018) Machine learning in high energy physics community white paper. J Phys Conf Ser 1085(2):022008. https:\/\/doi.org\/10.1088\/1742-6596\/1085\/2\/022008, arXiv:1807.02876","DOI":"10.1088\/1742-6596\/1085\/2\/022008"},{"key":"87_CR4","doi-asserted-by":"publisher","first-page":"52138","DOI":"10.1109\/ACCESS.2018.2870052","volume":"6","author":"A Adadi","year":"2018","unstructured":"Adadi A, Berrada M (2018) Peeking inside the black-box: a survey on Explainable Artificial Intelligence (XAI). IEEE Access 6:52138\u201352160. https:\/\/doi.org\/10.1109\/ACCESS.2018.2870052","journal-title":"IEEE Access"},{"key":"87_CR5","unstructured":"Amodei D et\u00a0al (2016) Concrete problems in AI safety. arXiv e-prints. arXiv:1606.06565"},{"key":"87_CR6","unstructured":"Szegedy C et\u00a0al (2014) Intriguing properties of neural networks. arXiv e-prints. arXiv:1312.6199"},{"key":"87_CR7","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. arXiv e-prints. arXiv:1412.6572"},{"issue":"5","key":"87_CR8","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/0893-6080(89)90020-8","volume":"2","author":"K Hornik","year":"1989","unstructured":"Hornik K, Stinchcombe M, White H (1989) Multilayer feedforward networks are universal approximators. Neural Netw 2(5):359\u2013366. https:\/\/doi.org\/10.1016\/0893-6080(89)90020-8","journal-title":"Neural Netw"},{"key":"87_CR9","doi-asserted-by":"publisher","unstructured":"Su J, Vargas DV, Sakurai K (2019) One pixel attack for fooling Deep Neural Networks. IEEE Trans Evol Comput 23:828\u2013841. https:\/\/doi.org\/10.1109\/tevc.2019.2890858, arXiv:1710.08864","DOI":"10.1109\/tevc.2019.2890858"},{"key":"87_CR10","unstructured":"Nachman B, Shimmin C (2019) AI safety for high energy physics. arXiv e-prints. arXiv:1910.08606"},{"key":"87_CR11","unstructured":"Shimmin C (2020) advjets-mlhep2020. GitHub repository. https:\/\/github.com\/cshimmin\/advjets-mlhep2020. Accessed 2 Aug 2022"},{"key":"87_CR12","doi-asserted-by":"publisher","unstructured":"CMS Collaboration (2018) Identification of heavy-flavour jets with the CMS detector in pp collisions at 13 TeV. JINST. 13(05): P05011. https:\/\/doi.org\/10.1088\/1748-0221\/13\/05\/P05011, arXiv:1712.07158","DOI":"10.1088\/1748-0221\/13\/05\/P05011"},{"key":"87_CR13","doi-asserted-by":"publisher","unstructured":"Guest D et\u00a0al (2016) Jet flavor classification in high-energy physics with Deep Neural Networks. Phys Rev D 94(11):112002. https:\/\/doi.org\/10.1103\/PhysRevD.94.112002, arXiv:1607.08633","DOI":"10.1103\/PhysRevD.94.112002"},{"key":"87_CR14","doi-asserted-by":"publisher","first-page":"S08004","DOI":"10.1088\/1748-0221\/3\/08\/S08004","volume":"3","author":"CMS Collaboration","year":"2008","unstructured":"CMS Collaboration (2008) The CMS experiment at the CERN LHC. JINST 3:S08004. https:\/\/doi.org\/10.1088\/1748-0221\/3\/08\/S08004","journal-title":"JINST"},{"key":"87_CR15","doi-asserted-by":"publisher","unstructured":"ATLAS Collaboration (2008) The ATLAS experiment at the CERN Large Hadron Collider. JINST 3:S08003. https:\/\/doi.org\/10.1088\/1748-0221\/3\/08\/S08003","DOI":"10.1088\/1748-0221\/3\/08\/S08003"},{"key":"87_CR16","doi-asserted-by":"publisher","unstructured":"ATLAS Collaboration (2019) ATLAS b-jet identification performance and efficiency measurement with $$t{\\bar{t}}$$ events in pp collisions at $$\\sqrt{s}=13$$ TeV. Eur Phys J C 79(11):970. https:\/\/doi.org\/10.1140\/epjc\/s10052-019-7450-8, arXiv:1907.05120","DOI":"10.1140\/epjc\/s10052-019-7450-8"},{"key":"87_CR17","doi-asserted-by":"publisher","unstructured":"CMS Collaboration (2018) Observation of Higgs boson decay to bottom quarks. Phys Rev Lett 121(12):121801. https:\/\/doi.org\/10.1103\/PhysRevLett.121.121801, arXiv:1808.08242","DOI":"10.1103\/PhysRevLett.121.121801"},{"key":"87_CR18","doi-asserted-by":"publisher","unstructured":"ATLAS Collaboration (2018) Observation of $$H \\rightarrow b\\bar{b}$$ decays and $$VH$$ production with the ATLAS detector. Phys Lett B 786:59\u201386. https:\/\/doi.org\/10.1016\/j.physletb.2018.09.013, arXiv:1808.08238","DOI":"10.1016\/j.physletb.2018.09.013"},{"key":"87_CR19","doi-asserted-by":"publisher","unstructured":"Kogler R et\u00a0al (2019) Jet substructure at the large hadron collider: experimental review. Rev Mod Phys 91(4):045003. https:\/\/doi.org\/10.1103\/RevModPhys.91.045003, arXiv:1803.06991","DOI":"10.1103\/RevModPhys.91.045003"},{"key":"87_CR20","unstructured":"CMS Collaboration (2016) Identification of c-quark jets at the CMS experiment. CERN Document Server. https:\/\/cds.cern.ch\/record\/2205149. Accessed 2 Aug 2022"},{"key":"87_CR21","doi-asserted-by":"publisher","unstructured":"CMS Collaboration (2022) A new calibration method for charm jet identification validated with proton-proton collision events at $$\\sqrt{s}$$ =13 TeV. JINST 17(03):P03014. https:\/\/doi.org\/10.1088\/1748-0221\/17\/03\/P03014, arXiv:2111.03027","DOI":"10.1088\/1748-0221\/17\/03\/P03014"},{"key":"87_CR22","doi-asserted-by":"publisher","unstructured":"ATLAS Collaboration (2022) Measurement of the c-jet mistagging efficiency in $$t\\bar{t}$$\u00a0events using pp collision data at $$\\sqrt{s}=13$$\u00a0$$\\text{TeV}$$ collected with the ATLAS detector. Eur Phys J C 82(1):95. https:\/\/doi.org\/10.1140\/epjc\/s10052-021-09843-w, arXiv:2109.10627","DOI":"10.1140\/epjc\/s10052-021-09843-w"},{"key":"87_CR23","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/JHEP03(2020)131","volume":"03","author":"CMS Collaboration","year":"2020","unstructured":"CMS\u00a0Collaboration (2020) A search for the standard model Higgs boson decaying to charm quarks. JHEP 03:131. https:\/\/doi.org\/10.1007\/JHEP03(2020)131, arXiv:1912.01662","journal-title":"JHEP"},{"key":"87_CR24","unstructured":"ATLAS Collaboration (2022) Direct constraint on the Higgs-charm coupling from a search for Higgs boson decays into charm quarks with the ATLAS detector. arXiv e-prints. arXiv:2201.11428"},{"key":"87_CR25","unstructured":"CMS Collaboration (2022) Search for Higgs boson decay to a charm quark-antiquark pair in proton-proton collisions at $$\\sqrt{s}$$ = 13 TeV. arXiv e-prints. arXiv:2205.05550"},{"key":"87_CR26","unstructured":"Chakraborty A et\u00a0al (2018) Adversarial attacks and defences: a survey. arXiv e-prints. arXiv:1810.00069"},{"key":"87_CR27","doi-asserted-by":"publisher","unstructured":"Shaham U, Yamada Y, Negahban S (2018) Understanding adversarial training: Increasing local stability of supervised models through robust optimization. Neurocomputing 307:195\u2013204. https:\/\/doi.org\/10.1016\/j.neucom.2018.04.027, arXiv:1511.05432","DOI":"10.1016\/j.neucom.2018.04.027"},{"key":"87_CR28","unstructured":"Madry A et\u00a0al (2019) Towards deep learning models resistant to adversarial attacks. arXiv e-prints. arXiv:1706.06083"},{"key":"87_CR29","unstructured":"Louppe G, Kagan M, Cranmer K (2016) Learning to pivot with adversarial networks. arXiv e-prints. arXiv:1611.01046"},{"key":"87_CR30","unstructured":"Ganin Y, Lempitsky V (2015) Unsupervised domain adaptation by backpropagation. arXiv e-prints. arXiv:1409.7495"},{"key":"87_CR31","doi-asserted-by":"publisher","DOI":"10.1088\/2632-2153\/ab9023","volume":"1","author":"CMS Collaboration","year":"2020","unstructured":"CMS Collaboration (2020) A deep neural network to search for new long-lived particles decaying to jets. Mach Learn Sci Tech 1:035012. https:\/\/doi.org\/10.1088\/2632-2153\/ab9023, arXiv:1912.12238","journal-title":"Mach Learn Sci Tech"},{"key":"87_CR32","doi-asserted-by":"crossref","unstructured":"\u0106iprijanovi\u0107 A et\u00a0al (2021) DeepAdversaries: examining the robustness of deep learning models for galaxy morphology classification. arXiv e-prints. arXiv:2112.14299","DOI":"10.1088\/2632-2153\/ac7f1a"},{"key":"87_CR33","doi-asserted-by":"publisher","unstructured":"Babicz M, Alonso-Monsalve S, Dolan S, Terao K (2022) Adversarial methods to reduce simulation bias in neutrino interaction event filtering at liquid argon time projection chambers. Phys Rev D 105(11):112009. https:\/\/doi.org\/10.1103\/PhysRevD.105.112009, arXiv:2201.11009","DOI":"10.1103\/PhysRevD.105.112009"},{"key":"87_CR34","doi-asserted-by":"publisher","unstructured":"Ghosh A, Nachman B, Whiteson D (2021) Uncertainty-aware machine learning for high energy physics. Phys Rev D 104(5):056026. https:\/\/doi.org\/10.1103\/PhysRevD.104.056026, arXiv:2105.08742","DOI":"10.1103\/PhysRevD.104.056026"},{"key":"87_CR35","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/JHEP06(2011)128","volume":"06","author":"J Alwall","year":"2011","unstructured":"Alwall J et al (2011) MadGraph 5: going beyond. JHEP 06:128. https:\/\/doi.org\/10.1007\/JHEP06(2011)128, arXiv:1106.0522","journal-title":"JHEP"},{"key":"87_CR36","doi-asserted-by":"publisher","unstructured":"Sjostrand T, Mrenna S, Skands PZ (2006) PYTHIA 6.4 physics and manual. JHEP 05:026. https:\/\/doi.org\/10.1088\/1126-6708\/2006\/05\/026, arXiv:hep-ph\/0603175","DOI":"10.1088\/1126-6708\/2006\/05\/026"},{"key":"87_CR37","doi-asserted-by":"publisher","unstructured":"DELPHES 3 Collaboration (2014) DELPHES 3, a modular framework for fast simulation of a generic collider experiment. JHEP 02:057. https:\/\/doi.org\/10.1007\/JHEP02(2014)057, arXiv:1307.6346","DOI":"10.1007\/JHEP02(2014)057"},{"key":"87_CR38","doi-asserted-by":"publisher","unstructured":"Cacciari M, Salam GP, Soyez G (2008) The anti-$$k_t$$ jet clustering algorithm. JHEP 2008:063\u2013063. https:\/\/doi.org\/10.1088\/1126-6708\/2008\/04\/063, arXiv:0802.1189","DOI":"10.1088\/1126-6708\/2008\/04\/063"},{"key":"87_CR39","doi-asserted-by":"publisher","first-page":"1896","DOI":"10.1140\/epjc\/s10052-012-1896-2","volume":"72","author":"M Cacciari","year":"2012","unstructured":"Cacciari M, Salam GP, Soyez G (2012) FastJet user manual. Eur Phys J C 72:1896. https:\/\/doi.org\/10.1140\/epjc\/s10052-012-1896-2, arXiv:1111.6097","journal-title":"Eur Phys J C"},{"key":"87_CR40","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1109\/TNS.2011.2119492","volume":"58","author":"W Waltenberger","year":"2011","unstructured":"Waltenberger W (2011) RAVE: a detector-independent toolkit to reconstruct vertices. IEEE Trans Nucl Sci 58:434\u2013444. https:\/\/doi.org\/10.1109\/TNS.2011.2119492","journal-title":"IEEE Trans Nucl Sci"},{"key":"87_CR41","volume-title":"Deep learning with PyTorch","author":"E Stevens","year":"2020","unstructured":"Stevens E, Antiga L, Viehmann T (2020) Deep learning with PyTorch. Manning Publications Company"},{"key":"87_CR42","doi-asserted-by":"publisher","DOI":"10.1201\/9781315108230","volume-title":"Feature engineering and selection: a practical approach for predictive models","author":"M Kuhn","year":"2019","unstructured":"Kuhn M, Johnson K (2019) Feature engineering and selection: a practical approach for predictive models. CRC Press"},{"key":"87_CR43","unstructured":"Srivastava N et al (2014) Dropout: a simple way to prevent neural networks from overfitting. J Mach Learn Res 15(1):1929\u20131958. https:\/\/jmlr.org\/papers\/volume15\/srivastava14a\/srivastava14a.pdf. Accessed 2 Aug 2022"},{"key":"87_CR44","unstructured":"PyTorch (2022) CrossEntropyLoss. https:\/\/pytorch.org\/docs\/stable\/generated\/torch.nn.CrossEntropyLoss.html. Accessed 2 Aug 2022"},{"key":"87_CR45","doi-asserted-by":"publisher","unstructured":"Lin T-Y et\u00a0al (2017) Focal loss for dense object detection. In: 2017 IEEE International Conference on Computer Vision (ICCV), pp\u00a02999\u20133007. arXiv:1708.02002, https:\/\/doi.org\/10.1109\/ICCV.2017.324","DOI":"10.1109\/ICCV.2017.324"},{"key":"87_CR46","doi-asserted-by":"publisher","unstructured":"Hassan A (2021) Adeelh\/pytorch-multi-class-focal-loss: 1.1. Zenodo. https:\/\/doi.org\/10.5281\/zenodo.5547584","DOI":"10.5281\/zenodo.5547584"},{"key":"87_CR47","unstructured":"CMS Collaboration (2022) Search for new physics using top quark pairs produced in associated with a boosted Z or Higgs boson in effective field theory. CERN Document Server. https:\/\/cds.cern.ch\/record\/2802060. Accessed 2 Aug 2022"},{"key":"87_CR48","unstructured":"Kingma DP, Ba J (2015) Adam: a method for stochastic optimization. In: 3rd International conference for learning representations (ICLR). arXiv:1412.6980"},{"key":"87_CR49","unstructured":"Paszke A et\u00a0al (2019) PyTorch: an imperative style, high-performance deep learning library. In: Advances in Neural Information Processing Systems 32., pp\u00a08024\u20138035. Curran Associates, Inc. arXiv:1912.01703. NeurIPS 2019"},{"key":"87_CR50","doi-asserted-by":"publisher","unstructured":"Darken C, Chang J, Moody J (1992) Learning rate schedules for faster stochastic gradient search. In: Neural Networks for signal processing II proceedings of the 1992 IEEE Workshop, pp\u00a03\u201312. https:\/\/doi.org\/10.1109\/NNSP.1992.253713","DOI":"10.1109\/NNSP.1992.253713"},{"key":"87_CR51","doi-asserted-by":"publisher","unstructured":"Davis J, Goadrich M (2006) The relationship between precision-recall and ROC curves. In: Proceedings of the 23rd International Conference on Machine Learning. ICML \u201906, pp\u00a0233\u2013240. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/1143844.1143874","DOI":"10.1145\/1143844.1143874"},{"key":"87_CR52","unstructured":"Powers D (2020) Evaluation: from precision, recall and F-factor to ROC, Informedness, Markedness & Correlation. arXiv e-prints. arXiv:2010.16061"},{"key":"87_CR53","doi-asserted-by":"publisher","unstructured":"Galar M et al (2012) A review on ensembles for the class imbalance problem: bagging-, boosting-, and hybrid-based approaches. IEEE Trans Syst Man Cybern. Part C (Applications and Reviews) 42(4):463\u2013484. https:\/\/doi.org\/10.1109\/TSMCC.2011.2161285","DOI":"10.1109\/TSMCC.2011.2161285"},{"key":"87_CR54","doi-asserted-by":"publisher","unstructured":"Branco P, Torgo L, Ribeiro RP (2016) A survey of predictive modeling on imbalanced domains. ACM Comput Surv. https:\/\/doi.org\/10.1145\/2907070, arXiv:1505.01658","DOI":"10.1145\/2907070"},{"key":"87_CR55","unstructured":"Fawzi A, Moosavi-Dezfooli S-M, Frossard P (2016) Robustness of classifiers: from adversarial to random noise. arXiv e-prints. arXiv:1608.08967. Accepted to NIPS 2016"},{"key":"87_CR56","doi-asserted-by":"publisher","unstructured":"Fawzi A, Fawzi O, Frossard P (2018) Analysis of classifiers\u2019 robustness to adversarial perturbations. Mach Learn 107(3):481\u2013508. https:\/\/doi.org\/10.1007\/s10994-017-5663-3, arXiv:1502.02590","DOI":"10.1007\/s10994-017-5663-3"},{"key":"87_CR57","unstructured":"Li H et\u00a0al (2018) Visualizing the loss landscape of neural nets. arXiv e-prints. arXiv:1712.09913. NIPS 2018"},{"key":"87_CR58","unstructured":"Fort S, Hu H, Lakshminarayanan B (2020) Deep ensembles: a loss landscape perspective. arXiv e-prints. arXiv:1912.02757"},{"key":"87_CR59","unstructured":"Kurakin A, Goodfellow I, Bengio S (2017) Adversarial machine learning at scale. arXiv e-prints. arXiv:1611.01236"},{"key":"87_CR60","doi-asserted-by":"publisher","unstructured":"Stutz D, Hein M, Schiele B (2019) Disentangling adversarial robustness and generalization. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 6969\u20136980. https:\/\/doi.org\/10.1109\/CVPR.2019.00714, arXiv:1812.00740","DOI":"10.1109\/CVPR.2019.00714"},{"key":"87_CR61","unstructured":"Guest D (2016) delphes-rave. GitHub repository. https:\/\/github.com\/dguest\/delphes-rave. Accessed 2 Aug 2022"},{"key":"87_CR62","unstructured":"Stein A (2022) Adversarial-training-for-jet-tagging. GitHub repository. https:\/\/github.com\/AnnikaStein\/Adversarial-Training-for-Jet-Tagging. Accessed 2 Aug 2022"},{"key":"87_CR63","unstructured":"Fleshgrinder (2009) Gaussian distribution. Wikimedia Commons. Released into the public domain. https:\/\/commons.wikimedia.org\/wiki\/File:Gaussian_distribution.svg. Accessed 2 Aug 2022"},{"key":"87_CR64","doi-asserted-by":"publisher","unstructured":"Pivarski J et\u00a0al (2020) scikit-hep\/awkward-1.0: 0.4.5. Zenodo. https:\/\/doi.org\/10.5281\/zenodo.4341376","DOI":"10.5281\/zenodo.4341376"},{"key":"87_CR65","doi-asserted-by":"publisher","unstructured":"Gray L et al (2020) CoffeaTeam\/coffea: release v0.6.46. Zenodo. https:\/\/doi.org\/10.5281\/zenodo.3266454","DOI":"10.5281\/zenodo.3266454"},{"issue":"3","key":"87_CR66","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCSE.2007.55","volume":"9","author":"JD Hunter","year":"2007","unstructured":"Hunter JD (2007) Matplotlib: a 2D graphics environment. Comput Sci Eng 9(3):90\u201395. https:\/\/doi.org\/10.1109\/MCSE.2007.55","journal-title":"Comput Sci Eng"},{"key":"87_CR67","unstructured":"ATLAS Collaboration (2010) Impact parameter-based b-tagging algorithms in the 7 TeV collision data with the ATLAS detector: the TrackCounting and JetProb algorithms. CERN Document Server. https:\/\/cds.cern.ch\/record\/1277681. Accessed 2 Aug 2022"}],"container-title":["Computing and Software for Big Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41781-022-00087-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41781-022-00087-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41781-022-00087-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T19:14:54Z","timestamp":1672514094000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41781-022-00087-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,10]]},"references-count":67,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["87"],"URL":"https:\/\/doi.org\/10.1007\/s41781-022-00087-1","relation":{},"ISSN":["2510-2036","2510-2044"],"issn-type":[{"value":"2510-2036","type":"print"},{"value":"2510-2044","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,10]]},"assertion":[{"value":"25 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"15"}}