{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:35:44Z","timestamp":1772120144145,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,5]],"date-time":"2021-09-05T00:00:00Z","timestamp":1630800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,5]],"date-time":"2021-09-05T00:00:00Z","timestamp":1630800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,5]],"date-time":"2021-09-05T00:00:00Z","timestamp":1630800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,5]]},"DOI":"10.1109\/iscc53001.2021.9631485","type":"proceedings-article","created":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T15:46:50Z","timestamp":1639583210000},"page":"1-7","source":"Crossref","is-referenced-by-count":9,"title":["Exemplars and Counterexemplars Explanations for Image Classifiers, Targeting Skin Lesion Labeling"],"prefix":"10.1109","author":[{"given":"Carlo","family":"Metta","sequence":"first","affiliation":[]},{"given":"Riccardo","family":"Guidotti","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Gallinari","sequence":"additional","affiliation":[]},{"given":"Salvatore","family":"Rinzivillo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"4765","article-title":"A unified approach to interpreting model predictions","author":"lundberg","year":"2017","journal-title":"NIPS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16148-4_5"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/978-3-030-46150-8_12","article-title":"Black box explanation by learning image exemplars in the latent feature space","volume":"11906","author":"guidotti","year":"2019","journal-title":"ECML\/PKDD (1) ser Lecture Notes in Computer Science"},{"key":"ref13","article-title":"Axiomatic attribution for dnn","author":"sundararajan","year":"2017","journal-title":"ICML-JMLR W&CP"},{"key":"ref14","article-title":"Not just a black box: Learning important features through propagating activation differences","volume":"abs 1605 1713","author":"shrikumar","year":"2016","journal-title":"CoRR"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130140"},{"key":"ref16","article-title":"Adversarial autoencoders","volume":"abs 1511 5644","author":"makhzani","year":"2015","journal-title":"CoRR"},{"key":"ref17","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"NIPS"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2019.2957223"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207181"},{"key":"ref4","first-page":"94","article-title":"Application of data mining techniques for medical image classification","author":"antonie","year":"2001","journal-title":"MDM\/KDD"},{"key":"ref3","first-page":"844","article-title":"Medical image classification with convolutional neural network","author":"li","year":"2014","journal-title":"ICARCV"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2018.07.007"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870052"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372855"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3236009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compmedimag.2020.101843"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33019780"},{"key":"ref20","article-title":"Improved techniques for training gans","author":"salimans","year":"2016","journal-title":"NIPS"},{"key":"ref22","article-title":"Unrolled generative adversarial networks","author":"metz","year":"2017","journal-title":"ICLRE"},{"key":"ref21","article-title":"Wasserstein of wasserstein loss for learning generative models","author":"dukler","year":"2019","journal-title":"Proceedings of the 36th International Conference on Machine Learning"},{"key":"ref24","article-title":"Progressive growing of gans for improved quality, stability, and variation","author":"karras","year":"2018","journal-title":"ICLRE"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.463"},{"key":"ref26","article-title":"Towards principled methods for training generative adversarial networks","author":"arjovsky","year":"2017","journal-title":"ICLRE"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390294"}],"event":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","location":"Athens, Greece","start":{"date-parts":[[2021,9,5]]},"end":{"date-parts":[[2021,9,8]]}},"container-title":["2021 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9631377\/9631248\/09631485.pdf?arnumber=9631485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:54:23Z","timestamp":1652187263000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9631485\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,5]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/iscc53001.2021.9631485","relation":{},"subject":[],"published":{"date-parts":[[2021,9,5]]}}}