{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T05:25:54Z","timestamp":1747459554813},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["Grant No. 61872337"],"award-info":[{"award-number":["Grant No. 61872337"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-11-LABX-0025-01"],"award-info":[{"award-number":["ANR-11-LABX-0025-01"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001711","name":"Schweizerischer Nationalfonds zur Frderung der Wissenschaftlichen Forschung","doi-asserted-by":"publisher","award":["NRP75 project 407540_167266"],"award-info":[{"award-number":["NRP75 project 407540_167266"]}],"id":[{"id":"10.13039\/501100001711","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/tdsc.2021.3063947","type":"journal-article","created":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T20:43:46Z","timestamp":1614890626000},"page":"1-1","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing Robustness of On-line Learning Models on Highly Noisy Data"],"prefix":"10.1109","author":[{"given":"Zilong","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Robert","family":"Birke","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Han","sequence":"additional","affiliation":[]},{"given":"Bogdan","family":"Robu","sequence":"additional","affiliation":[]},{"given":"Sara","family":"Bouchenak","sequence":"additional","affiliation":[]},{"given":"Sonia","family":"Ben Mokhtar","sequence":"additional","affiliation":[]},{"given":"Lydia Y.","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2543718"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2017.11.006"},{"key":"ref33","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.240"},{"key":"ref31","first-page":"343","article-title":"A data-driven approach to cleaning large face datasets","author":"ng","year":"2015","journal-title":"Proc IEEE Int Conf Image Process"},{"key":"ref30","first-page":"1196","article-title":"Learning with noisy labels","author":"natarajan","year":"2013","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref37","first-page":"1","article-title":"Google cluster-usage traces: Format+ schema","author":"reiss","year":"2011"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2465470.2465473"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2575829"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2015.110"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.211"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02319-4_50"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.11.023"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-014-0309-2"},{"key":"ref20","first-page":"10477","article-title":"Using trusted data to train deep networks on labels corrupted by severe noise","author":"hendrycks","year":"2018","journal-title":"Proc Conf Neural Inf Process Syst"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.20965\/jaciii.2010.p0297"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAAI.2017.30"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.05.001"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2801861"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1998.675487"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.03.006"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007626913721"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2794409"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422327"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2020.2981984"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CCTA.2019.8920662"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00068"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/837"},{"key":"ref52","article-title":"Understanding deep learning requires rethinking generalization","author":"zhang","year":"2017","journal-title":"Proc 5th Int Conf Learn Representations"},{"key":"ref10","article-title":"Duo learning for classifications with noisy labels","author":"cerf","year":"2018","journal-title":"Proc Adv Conf Neural Inf Process Syst"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2812812"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.37"},{"key":"ref12","article-title":"A study of machine learning models in epidemic surveillance: Using the query logs of search engines","author":"fang","year":"2010","journal-title":"Proc Pacific Asia Conf Inf Syst"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2292894"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA48467.2019.00038"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48989-6_18"},{"key":"ref16","first-page":"145","article-title":"Discovering informative patterns and data cleaning","author":"guyon","year":"1994","journal-title":"Proc Int Conf Knowl Discov Data Mining"},{"key":"ref17","first-page":"8536","article-title":"Co-teaching: Robust training of deep neural networks with extremely noisy labels","author":"han","year":"2018","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2703842"},{"key":"ref4","first-page":"661","article-title":"Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning","author":"banescu","year":"2017","journal-title":"Proc 26th USENIX Secur Symp"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-017-9519-8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.18"},{"key":"ref5","first-page":"97","article-title":"Support vector machines under adversarial label noise","author":"biggio","year":"2011","journal-title":"Proc Asian Conf Mach Learn"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS.1996.516669"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2601646"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00552"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2018.00014"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-011-0028-x"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89376-9_10"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.696"},{"key":"ref47","first-page":"5601","article-title":"Toward robustness against label noise in training deep discriminative neural networks","author":"vahdat","year":"2017","journal-title":"Proc 31st Int Conf Neural Inf Process Syst"},{"key":"ref42","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref43","article-title":"Training convolutional networks with noisy labels","author":"sukhbaatar","year":"2014","journal-title":"arXiv 1406 2080"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/4358699\/09369874.pdf?arnumber=9369874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:06:34Z","timestamp":1642003594000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9369874\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/tdsc.2021.3063947","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}