{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T21:28:06Z","timestamp":1768685286494,"version":"3.49.0"},"reference-count":103,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003725","name":"Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (MSIT) and Future Planning","doi-asserted-by":"publisher","award":["2018R1C1B3008159"],"award-info":[{"award-number":["2018R1C1B3008159"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Institute of Information and Communications Technology Planning and Evaluation (IITP) funded by the Korean Government (MSIT) through Artificial Intelligence Innovation Hub","award":["2021-0-02068"],"award-info":[{"award-number":["2021-0-02068"]}]},{"name":"Institute of Information & Communications Technology Planning & Evaluation (IITP) funded by the Korea Government","award":["RS-2022-00155911"],"award-info":[{"award-number":["RS-2022-00155911"]}]},{"DOI":"10.13039\/501100002597","name":"Artificial Intelligence Convergence Innovation Human Resources Development through Kyung Hee University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002597","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3216291","type":"journal-article","created":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T22:05:56Z","timestamp":1667513156000},"page":"118815-118830","source":"Crossref","is-referenced-by-count":18,"title":["A Survey on Efficient Methods for Adversarial Robustness"],"prefix":"10.1109","volume":"10","author":[{"given":"Awais","family":"Muhammad","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Kyung-Hee University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2677-3186","authenticated-orcid":false,"given":"Sung-Ho","family":"Bae","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Kyung-Hee University, Seoul, South Korea"}]}],"member":"263","reference":[{"key":"ref39","first-page":"18527","article-title":"Bullettrain: Accelerating robust neural network training via boundary example mining","volume":"34","author":"hua","year":"2021","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2843369"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00398"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3236009"},{"key":"ref30","article-title":"Towards deep neural network architectures robust to adversarial examples","author":"gu","year":"2014","journal-title":"arXiv 1412 5068 [cs]"},{"key":"ref37","article-title":"Distilling the knowledge in a neural network","author":"hinton","year":"2015","journal-title":"ArXiv 1503 02531"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013779"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00201"},{"key":"ref34","first-page":"2712","article-title":"Using pre-training can improve model robustness and uncertainty","author":"hendrycks","year":"2019","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref28","first-page":"1","article-title":"Generative adversarial nets","volume":"27","author":"goodfellow","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5816"},{"key":"ref29","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"arXiv 1412 6572"},{"key":"ref20","article-title":"??-robustness and beyond: Unleashing efficient adversarial training","author":"dolatabadi","year":"2021","journal-title":"arXiv 2112 00378"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref21","first-page":"647","article-title":"DeCAF: A deep convolutional activation feature for generic visual recognition","author":"donahue","year":"2014","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref24","article-title":"Adversarial robustness as a prior for learned representations","author":"engstrom","year":"2019","journal-title":"arXiv 1906 00945"},{"key":"ref23","article-title":"An image is worth 16&#x00D7;16 words: Transformers for image recognition at scale","author":"dosovitskiy","year":"2020","journal-title":"arXiv 2010 11929"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.319"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2437384"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00126"},{"key":"ref25","article-title":"On the connection between adversarial robustness and saliency map interpretability","author":"etmann","year":"2019","journal-title":"arXiv 1905 04172"},{"key":"ref50","article-title":"Adversarial examples in the physical world","author":"kurakin","year":"2016","journal-title":"arXiv 1607 02533"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref59","article-title":"Mixed precision training","author":"micikevicius","year":"2017","journal-title":"arXiv 1710 03740"},{"key":"ref58","article-title":"On the benefits of knowledge distillation for adversarial robustness","author":"maroto","year":"2022","journal-title":"arXiv 2203 07159"},{"key":"ref57","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2017","journal-title":"arXiv 1706 06083"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107332"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2018.8297407"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2021.03.011"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref40","article-title":"Like what you like: Knowledge distill via neuron selectivity transfer","author":"huang","year":"2017","journal-title":"arXiv 1707 01219"},{"key":"ref4","first-page":"274","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","author":"athalye","year":"2018","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref3","first-page":"16048","article-title":"Understanding and improving fast adversarial training","volume":"33","author":"andriushchenko","year":"2020","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref6","first-page":"4555","article-title":"MixACM: Mixup-based robustness transfer via distillation of activated channel maps","volume":"34","author":"awais","year":"2021","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref5","article-title":"Towards an adversarially robust normalization approach","author":"awais","year":"2020","journal-title":"arXiv 2006 11007"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00845"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref9","article-title":"Adversarial patch","author":"brown","year":"2017","journal-title":"arXiv 1712 09665"},{"key":"ref46","first-page":"3509","article-title":"LIT: Learned intermediate representation training for model compression","author":"koratana","year":"2019","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref45","first-page":"2765","article-title":"Paraphrasing complex network: Network compression via factor transfer","author":"kim","year":"2018","journal-title":"Proc 32nd Int Conf Neural Inf Process Syst"},{"key":"ref48","author":"krizhevsky","year":"2009","journal-title":"Learning multiple layers of features from tiny images"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00277"},{"key":"ref42","first-page":"1","article-title":"Adversarial examples are not bugs, they are features","volume":"32","author":"ilyas","year":"2019","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref41","article-title":"What makes ImageNet good for transfer learning?","author":"huh","year":"2016","journal-title":"arXiv 1608 08614"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_5"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3149052"},{"key":"ref73","article-title":"Adversarial training for free!","author":"shafahi","year":"2019","journal-title":"arXiv 1904 12843"},{"key":"ref72","first-page":"1262","article-title":"Image synthesis with a single (robust) classifier","author":"santurkar","year":"2019","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref71","article-title":"Do adversarially robust ImageNet models transfer better?","author":"salman","year":"2020","journal-title":"arXiv 2007 08489"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11504"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014886"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2017.58"},{"key":"ref74","first-page":"1","article-title":"Adversarially robust transfer learning","author":"shafahi","year":"2019","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref75","article-title":"How and when adversarial robustness transfers in knowledge distillation?","author":"shao","year":"2021","journal-title":"arXiv 2110 12072"},{"key":"ref78","first-page":"4723","article-title":"Knowledge transfer with Jacobian matching","author":"srinivas","year":"2018","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref79","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"arXiv 1312 6199"},{"key":"ref60","first-page":"3523","article-title":"Image segmentation using deep learning: A survey","volume":"44","author":"minaee","year":"2022","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref61","first-page":"6950","article-title":"Coresets for data-efficient training of machine learning models","author":"mirzasoleiman","year":"2020","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref66","article-title":"Defend deep neural networks against adversarial examples via fixed and dynamic quantized activation functions","author":"rakin","year":"2018","journal-title":"arXiv 1807 06714"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref68","first-page":"1","article-title":"Faster R-CNN: Towards real-time object detection with region proposal networks","volume":"28","author":"ren","year":"2015","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"ref69","article-title":"FitNets: Hints for thin deep nets","author":"romero","year":"2014","journal-title":"arXiv 1412 6550"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"ref95","article-title":"Revisiting and advancing fast adversarial training through the lens of bi-level optimization","author":"zhang","year":"2021","journal-title":"arXiv 2112 12376"},{"key":"ref94","first-page":"7472","article-title":"Theoretically principled trade-off between robustness and accuracy","author":"zhang","year":"2019","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref93","first-page":"1","article-title":"You only propagate once: Accelerating adversarial training via maximal principle","volume":"32","author":"zhang","year":"2019","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref92","article-title":"Paying more attention to attention: Improving the performance of convolutional neural networks via attention transfer","author":"zagoruyko","year":"2016","journal-title":"arXiv 1612 03928"},{"key":"ref91","article-title":"How transferable are features in deep neural networks?","author":"yosinski","year":"2014","journal-title":"arXiv 1411 1792"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.754"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01613"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00763"},{"key":"ref98","article-title":"Synthesizing informative training samples with GAN","author":"zhao","year":"2022","journal-title":"arXiv 2204 07513"},{"key":"ref99","first-page":"3","article-title":"Dataset condensation with gradient matching","volume":"1","author":"zhao","year":"2021","journal-title":"Proc ICLR"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2021.3100641"},{"key":"ref97","first-page":"12674","article-title":"Dataset condensation with differentiable Siamese augmentation","author":"zhao","year":"2021","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150464"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref12","first-page":"4750","article-title":"Dataset distillation by matching training trajectories","author":"cazenavette","year":"2022","journal-title":"Proc IEEE\/CVF Conf Comput Vis Pattern Recognit (CVPR)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2017.8397411"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00041"},{"key":"ref15","article-title":"Efficient robust training via backward smoothing","author":"chen","year":"2020","journal-title":"arXiv 2010 01278"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2699184"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00145"},{"key":"ref17","first-page":"1","article-title":"Compression to the rescue: Defending from adversarial attacks across modalities","author":"das","year":"2018","journal-title":"Proc ACM SIGKDD Conf Knowl Discovery Data Mining"},{"key":"ref81","article-title":"Robustness may be at odds with accuracy","author":"tsipras","year":"2018","journal-title":"arXiv 1805 12152"},{"key":"ref18","article-title":"Make some noise: Reliable and efficient single-step adversarial training","author":"de jorge","year":"2022","journal-title":"arXiv 2202 01181"},{"key":"ref84","article-title":"Transferring adversarial robustness through robust representation matching","author":"vaishnavi","year":"2022","journal-title":"arXiv 2202 09994"},{"key":"ref19","first-page":"1","article-title":"Stochastic activation pruning for robust adversarial defense","author":"dhillon","year":"2018","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref83","article-title":"Adversarially-trained deep nets transfer better: Illustration on image classification","author":"utrera","year":"2020","journal-title":"arXiv 2007 05869"},{"key":"ref80","first-page":"1","article-title":"Contrastive representation distillation","author":"tian","year":"2019","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01070"},{"key":"ref85","first-page":"1","article-title":"Improving adversarial robustness requires revisiting misclassified examples","author":"wang","year":"2019","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref86","first-page":"5276","article-title":"Towards fast computation of certified robustness for ReLU networks","author":"weng","year":"2018","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref87","article-title":"Fast is better than free: Revisiting adversarial training","author":"wong","year":"2020","journal-title":"arXiv 2001 03994"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00059"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09926085.pdf?arnumber=9926085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T20:06:09Z","timestamp":1670875569000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9926085\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":103,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3216291","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}