{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:55:43Z","timestamp":1773377743562,"version":"3.50.1"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,26]]},"DOI":"10.1109\/isit50566.2022.9834717","type":"proceedings-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T15:34:22Z","timestamp":1659540862000},"page":"127-132","source":"Crossref","is-referenced-by-count":4,"title":["Asymptotic Behavior of Adversarial Training in Binary Linear Classification"],"prefix":"10.1109","author":[{"given":"Hossein","family":"Taheri","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara,Electrical and Computer Engineering,Santa Barbara,USA"}]},{"given":"Ramtin","family":"Pedarsani","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara,Electrical and Computer Engineering,Santa Barbara,USA"}]},{"given":"Christos","family":"Thrampoulidis","sequence":"additional","affiliation":[{"name":"University of British Columbia,Electrical and Computer Engineering,Vancouver,Canada"}]}],"member":"263","reference":[{"key":"ref38","article-title":"Theoretically principled trade-off between robustness and accuracy","author":"zhang","year":"2019"},{"key":"ref33","first-page":"1683","article-title":"Regularized linear regression: A precise analysis of the estimation error","author":"thrampoulidis","year":"2015","journal-title":"Proceedings of The 28th Conference on Learning Theory"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2840720"},{"key":"ref31","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013"},{"key":"ref30","article-title":"A framework to characterize performance of lasso algorithms","author":"stojnic","year":"2013"},{"key":"ref37","article-title":"Robustness may be at odds with accuracy","author":"tsipras","year":"2018"},{"key":"ref36","first-page":"2773","article-title":"Fundamental limits of ridge-regularized empirical risk minimization in high dimensions","author":"taheri","year":"2021","journal-title":"International Conference on Artificial Intelligence and Statistics"},{"key":"ref35","first-page":"3739","article-title":"Sharp asymptotics and optimal performance for inference in binary models","author":"taheri","year":"2020","journal-title":"International Conference on Artificial Intelligence and Statistics"},{"key":"ref34","article-title":"Asymptotic behavior of adversarial training in binary classification","author":"taheri","year":"2020"},{"key":"ref10","article-title":"A precise performance analysis of learning with random features","author":"dhifallah","year":"2020"},{"key":"ref11","article-title":"On the inherent regularization effects of noise injection during training","author":"dhifallah","year":"2021"},{"key":"ref12","article-title":"Sharp statistical guarantees for adversarially robust gaussian classification","author":"dan","year":"2020"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevX.10.041044"},{"key":"ref14","article-title":"Limitations of lazy training of two-layers neural network","author":"ghorbani","year":"0"},{"key":"ref15","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014"},{"key":"ref16","article-title":"Surprises in high-dimensional ridgeless least squares interpolation","author":"hastie","year":"2019"},{"key":"ref17","article-title":"Precise statistical analysis of classification accuracies for adversarial training","author":"javanmard","year":"2020"},{"key":"ref18","article-title":"Precise tradeoffs in adversarial training for linear regression","author":"javanmard","year":"2020"},{"key":"ref19","first-page":"2574","article-title":"Deepfool: a simple and accurate method to fool deep neural networks","author":"moosavi-dezfooli","year":"2016","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref28","first-page":"5014","article-title":"Adversarially robust generalization requires more data","author":"schmidt","year":"0"},{"key":"ref4","article-title":"Two models of double descent for weak features","author":"belkin","year":"2019"},{"key":"ref27","article-title":"Opportunities and challenges in deep learning adversarial robustness: A survey","author":"silva","year":"2020"},{"key":"ref3","article-title":"Reconciling modern machine learning and the bias-variance trade-off","author":"belkin","year":"2018"},{"key":"ref6","article-title":"Unlabeled data improves adversarial robustness","author":"carmon","year":"2019"},{"key":"ref29","article-title":"Various thresholds for ? 1-optimization in compressed sensing","author":"stojnic","year":"2009"},{"key":"ref5","article-title":"Anupam Chattopadhyay, and Debdeep Mukhopadhyay. Adversarial attacks and defences: A survey","author":"chakraborty","year":"2018"},{"key":"ref8","article-title":"The phase transition for the existence of the maximum likelihood estimate in high-dimensional logistic regression","author":"cand\u00e8s","year":"2018"},{"key":"ref7","article-title":"Convergence and margin of adversarial training on separable data","author":"charles","year":"2019"},{"key":"ref2","first-page":"7498","article-title":"Lower bounds on adversarial robustness from optimal transport","author":"bhagoji","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref9","article-title":"Provable tradeoffs in adversarially robust classification","author":"dobriban","year":"2020"},{"key":"ref1","article-title":"Feature purification: How adversarial training performs robust deep learning","author":"allen-zhu","year":"2020"},{"key":"ref20","article-title":"The generalization error of random features regression: Precise asymptotics and double descent curve","author":"mei","year":"2019"},{"key":"ref22","article-title":"The generalization error of max-margin linear classifiers: High-dimensional asymptotics in the overparametrized regime","author":"montanari","year":"2019"},{"key":"ref21","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2017"},{"key":"ref24","article-title":"Adversarial training can hurt generalization","author":"raghunathan","year":"2019"},{"key":"ref23","volume":"317","author":"rockafellar","year":"2009","journal-title":"Variational Analysis"},{"key":"ref26","article-title":"The impact of regularization on high-dimensional logistic regression","author":"salehi","year":"2019"},{"key":"ref25","article-title":"Understanding and mitigating the tradeoff between robustness and accuracy","author":"raghunathan","year":"2020"}],"event":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","location":"Espoo, Finland","start":{"date-parts":[[2022,6,26]]},"end":{"date-parts":[[2022,7,1]]}},"container-title":["2022 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9834325\/9834269\/09834717.pdf?arnumber=9834717","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:35:02Z","timestamp":1773347702000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9834717\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,26]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/isit50566.2022.9834717","relation":{},"subject":[],"published":{"date-parts":[[2022,6,26]]}}}