{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T09:21:28Z","timestamp":1725787288369},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T00:00:00Z","timestamp":1701734400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T00:00:00Z","timestamp":1701734400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,5]]},"DOI":"10.1109\/bibm58861.2023.10385800","type":"proceedings-article","created":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T13:27:43Z","timestamp":1705584463000},"page":"1144-1149","source":"Crossref","is-referenced-by-count":2,"title":["Assessing and Enhancing Robustness of Deep Learning Models with Corruption Emulation in Digital Pathology"],"prefix":"10.1109","author":[{"given":"Peixiang","family":"Huang","sequence":"first","affiliation":[{"name":"Peking University,College of Engineering,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Songtao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Peking University,College of Engineering,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yulu","family":"Gan","sequence":"additional","affiliation":[{"name":"Peking University,College of Engineering,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rui","family":"Xu","sequence":"additional","affiliation":[{"name":"Peking University,College of Engineering,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rongqi","family":"Zhu","sequence":"additional","affiliation":[{"name":"Peking University,College of Engineering,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wenkang","family":"Qin","sequence":"additional","affiliation":[{"name":"Peking University,College of Engineering,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Limei","family":"Guo","sequence":"additional","affiliation":[{"name":"Peking University Health Science Center,Third Hospital,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shan","family":"Jiang","sequence":"additional","affiliation":[{"name":"Beijing Institute of Collaborative Innovation,Institute of Biomedical Engineering,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lin","family":"Luo","sequence":"additional","affiliation":[{"name":"Peking University,College of Engineering,Beijing,China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-26351-4_8"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3389\/fmed.2022.1070072"},{"article-title":"What a whole slide image can tell? subtype-guided masked transformer for pathological image captioning","year":"2023","author":"Qin","key":"ref3"},{"article-title":"Scaat: Improving neural network interpretability via saliency constrained adaptive adversarial training","year":"2023","author":"Xu","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59722-1_36"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/s41379-021-00859-x"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16434-7_24"},{"article-title":"Augmix: A simple data processing method to improve robustness and uncertainty","year":"2019","author":"Hendrycks","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISBI.2009.5193250"},{"volume-title":"Finite element simulations with ANSYS Workbench 18","year":"2018","author":"Lee","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00934-2_24"},{"article-title":"100,000 histological images of human colorectal cancer and healthy tissue","year":"2018","author":"Kather","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"article-title":"Very deep convolutional networks for large-scale image recognition","year":"2014","author":"Simonyan","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2022.102485"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.273"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.189"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.21037\/qims-19-1090"},{"key":"ref22","first-page":"5637","article-title":"Wilds: A benchmark of in-the-wild distribution shifts","volume-title":"International Conference on Machine Learning","author":"Koh"},{"article-title":"Focus on the common good: Group distributional robustness follows","year":"2021","author":"Piratla","key":"ref23"},{"article-title":"Gradient matching for domain generalization","year":"2021","author":"Shi","key":"ref24"},{"key":"ref25","first-page":"25 407","article-title":"Improving out-of-distribution robustness via selective augmentation","volume-title":"International Conference on Machine Learning","author":"Yao"},{"article-title":"Extending the wilds benchmark for unsupervised adaptation","year":"2021","author":"Sagawa","key":"ref26"},{"article-title":"Out-of-distribution robustness via targeted augmentations","volume-title":"NeurIPS 2022 Workshop on Distribution Shifts: Connecting Methods and Applications","author":"Gao","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2018.2820199"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"}],"event":{"name":"2023 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)","start":{"date-parts":[[2023,12,5]]},"location":"Istanbul, Turkiye","end":{"date-parts":[[2023,12,8]]}},"container-title":["2023 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10385250\/10385251\/10385800.pdf?arnumber=10385800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T13:20:22Z","timestamp":1705670422000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10385800\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/bibm58861.2023.10385800","relation":{},"subject":[],"published":{"date-parts":[[2023,12,5]]}}}