{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T16:09:10Z","timestamp":1770739750162,"version":"3.49.0"},"reference-count":210,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372378"],"award-info":[{"award-number":["62372378"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72225011"],"award-info":[{"award-number":["72225011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72434005"],"award-info":[{"award-number":["72434005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2024YFC3014300"],"award-info":[{"award-number":["2024YFC3014300"]}]},{"DOI":"10.13039\/501100001809","name":"Innovation Foundation for Doctor Dissertation of Northwestern Polytechnical University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Neural Netw. Learning Syst."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1109\/tnnls.2025.3610948","type":"journal-article","created":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T17:37:31Z","timestamp":1759772251000},"page":"526-546","source":"Crossref","is-referenced-by-count":0,"title":["Hard Sample Mining: A New Paradigm of Efficient and Robust Model Training"],"prefix":"10.1109","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5145-2654","authenticated-orcid":false,"given":"Lei","family":"Liu","sequence":"first","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8381-8187","authenticated-orcid":false,"given":"Yunji","family":"Liang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"given":"Xiaokai","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3926-7901","authenticated-orcid":false,"given":"Luwen","family":"Huangfu","sequence":"additional","affiliation":[{"name":"Fowler College of Business (FCB) and the Center for Human Dynamics in the Mobile Age (HDMA), San Diego State University (SDSU), San Diego, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4513-805X","authenticated-orcid":false,"given":"Sagar","family":"Samtani","sequence":"additional","affiliation":[{"name":"Data Science and Artificial Intelligence Lab, Indiana University Bloomington, Bloomington, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9905-3238","authenticated-orcid":false,"given":"Zhiwen","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9046-798X","authenticated-orcid":false,"given":"Yanyong","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, University of Science and Technology of China, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9046-222X","authenticated-orcid":false,"given":"Daniel D.","family":"Zeng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Management and Control for Complex Systems, Institute of Automation Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/p19-1355"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-018-0059-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1126\/science.adi8474"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3306378"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3339770"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-021-04223-6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3316168"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00176"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3263593"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i7.26071"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3269795"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-025-01008-8"},{"key":"ref13","first-page":"22629","article-title":"Sampling-decomposable generative adversarial recommender","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Jin"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3297607"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.181"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i10.21428"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3240851"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01545"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC57777.2023.10422642"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00547"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i8.28709"},{"key":"ref22","article-title":"Metric learning with adaptive density discrimination","volume-title":"Proc. 4th Int. Conf. Learn. Represent. (ICLR)","author":"Rippel"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01231-1_17"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6103"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.65109\/blpg6343"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-023-42992-y"},{"key":"ref27","first-page":"1666","article-title":"Less is better: Recovering intended-feature subspace to robustify NLU models","volume-title":"Proc. 29th Int. Conf. Comput. Linguistics","author":"Wu"},{"key":"ref28","first-page":"10842","article-title":"Data valuation using reinforcement learning","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Yoon"},{"key":"ref29","article-title":"Moderate coreset: A universal method of data selection for real-world data-efficient deep learning","volume-title":"Proc. 11th Int. Conf. Learn. Represent.","author":"Xia"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-023-01860-4"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01774"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2963387"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3185668"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i6.28381"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599374"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3371473"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3636512"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3793855"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3137005"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00742"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.11.094"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC51575.2020.9344879"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045155"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.3035231"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00320"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00250"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414389"},{"key":"ref48","article-title":"Margin sample mining loss: A deep learning based method for person re-identification","author":"Xiao","year":"2017","journal-title":"arXiv:1710.00478"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2019.2895291"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3040854"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2021.102287"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.554"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2300479"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01514"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2020.3048705"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00044"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00632"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2017.225"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.180"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/279"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.307"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2017.226"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ISBI.2019.8759478"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623322"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449897"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TSTE.2020.2985217"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.06.007"},{"key":"ref68","article-title":"Contrastive learning with hard negative samples","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Robinson"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3061412"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2972125"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.23919\/ChiCC.2019.8866028"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CBD51900.2020.00027"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58601-0_33"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01236"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-022-00914-w"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.05.028"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1703.07737"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00013"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-2662"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58598-3_38"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-26316-3_6"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00797"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01015"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01046"},{"key":"ref86","article-title":"Image-text retrieval with binary and continuous label supervision","author":"Li","year":"2022","journal-title":"arXiv:2210.11319"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00270"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i4.16385"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3632406"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983872"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159695"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1128"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.127229"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.127044"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIEC61773.2024.10561842"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01451"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.3390\/s17020336"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-019-01004-0"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2017.06.002"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-1103-2_7"},{"key":"ref101","article-title":"Augmented hard example mining for generalizable person re-identification","author":"Tamura","year":"2019","journal-title":"arXiv:1910.05280"},{"key":"ref102","article-title":"Empirical analysis of unlabeled entity problem in named entity recognition","volume-title":"Proc. 9th Int. Conf. Learn. Represent.","author":"Li"},{"key":"ref103","first-page":"775","article-title":"Metric learning to rank","volume-title":"Proc.Int. Conf. Mach. Learn.","author":"McFee","year":"2010"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10446388"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2025.104084"},{"key":"ref106","first-page":"4334","article-title":"Learning to reweight examples for robust deep learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ren"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01154"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00695"},{"key":"ref109","first-page":"18527","article-title":"BulletTrain: Accelerating robust neural network training via boundary example mining","volume-title":"Proc. NIPS","volume":"34","author":"Hua"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i17.34000"},{"key":"ref111","article-title":"DOS: Diverse outlier sampling for out-of-distribution detection","volume-title":"Proc. 12th Int. Conf. Learn. Represent.","author":"Jiang"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1145\/3627673.3679710"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86523-8_26"},{"key":"ref114","article-title":"AdaSample: Adaptive sampling of hard positives for descriptor learning","author":"Zhang","year":"2019","journal-title":"arXiv:1911.12110"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.01.088"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01144"},{"key":"ref117","article-title":"Progressive hard-case mining across pyramid levels for object detection","author":"Wu","year":"2021","journal-title":"arXiv:2109.07217"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8545388"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01512"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ICWAPR.2017.8076680"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2815149"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58536-5_9"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00978"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86517-7_18"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489071"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00049"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS.2017.8127089"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2019.00007"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2022.3173356"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58598-3_4"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58539-6_21"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553380"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3376539"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3069908"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2021.104489"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/BigMM.2018.8499463"},{"key":"ref137","first-page":"1270","article-title":"Local similarity-aware deep feature embedding","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"29","author":"Huang"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58520-4_1"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01079"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58577-8_9"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8545814"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00364"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01659"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00148"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58529-7_24"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00252"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00642"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3463032"},{"key":"ref149","first-page":"1857","article-title":"Improved deep metric learning with multi-class N-pair loss objective","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"29","author":"Sohn"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109881"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3184415"},{"key":"ref152","first-page":"2440","article-title":"End-to-end memory networks","volume-title":"Proc. Conf. Neural Inf. Process. Syst. (NIPS)","author":"Sukhbaatar"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i3.16365"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00393"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00080"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/IC-NIDC54101.2021.9660560"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-023-01997-1"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2980549"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2024.3453600"},{"key":"ref161","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20119"},{"key":"ref163","first-page":"27356","article-title":"Robust contrastive learning using negative samples with diminished semantics","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Ge"},{"key":"ref164","first-page":"9912","article-title":"Unsupervised learning of visual features by contrasting cluster assignments","volume-title":"Proc. NIPS","author":"Caron"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-009-0275-4"},{"key":"ref167","first-page":"22682","article-title":"Aligning pretraining for detection via object-level contrastive learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Wei"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01464"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00173"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.05.032"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01376"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119157"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2905559"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.11.001"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1145\/3539597.3570488"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109973"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1145\/3539618.3591995"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539248"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583499"},{"key":"ref180","first-page":"1311","article-title":"Automated curriculum learning for neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Graves"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3164190"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3401050"},{"key":"ref183","first-page":"2078","article-title":"Self-paced learning with diversity","volume-title":"Proc. Conf. Neural Inf. Process. Syst.","author":"Jiang"},{"key":"ref184","first-page":"1189","article-title":"Self-paced learning for latent variable models","volume-title":"Proc. Conf. Neural Inf. Process. Syst.","author":"Kumar"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3304567"},{"key":"ref186","article-title":"Are all training examples equally valuable","volume-title":"arXiv:1311.6510","author":"Lapedriza","year":"2013"},{"key":"ref187","first-page":"1002","article-title":"Active bias: Training more accurate neural networks by emphasizing high variance samples","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Chang"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557343"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2022.3151394"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599262"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02302"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19778-9_6"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2023.109003"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121771"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1145\/2898359"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.3115\/981658.981684"},{"key":"ref197","first-page":"3833","article-title":"Rethinking pre-training and self-training","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst.","volume":"33","author":"Zoph"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-5619"},{"key":"ref199","first-page":"41413","article-title":"Doubly-robust self-training","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"36","author":"Zhu"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.710"},{"key":"ref201","article-title":"Large language model enhanced hard sample identification for denoising recommendation","author":"Song","year":"2024","journal-title":"arXiv:2409.10343"},{"key":"ref202","article-title":"Hard-synth: Synthesizing diverse hard samples for ASR using zero-shot TTS and LLM","author":"Yu","year":"2024","journal-title":"arXiv:2411.13159"},{"key":"ref203","article-title":"Take the bull by the horns: Hard sample-reweighted continual training improves LLM generalization","author":"Chen","year":"2024","journal-title":"arXiv:2402.14270"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1145\/3701036"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.2300747"},{"key":"ref206","first-page":"20612","article-title":"Adversarial style mining for one-shot unsupervised domain adaptation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Luo"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-024-02194-5"},{"key":"ref208","article-title":"Adaptive2: Adaptive domain mining for fine-grained domain adaptation modeling","author":"Sun","year":"2024","journal-title":"arXiv:2412.08198"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.110409"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3486204"}],"container-title":["IEEE Transactions on Neural Networks and Learning Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/5962385\/11372199\/11185261.pdf?arnumber=11185261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T21:07:18Z","timestamp":1770671238000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185261\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":210,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnnls.2025.3610948","relation":{},"ISSN":["2162-237X","2162-2388"],"issn-type":[{"value":"2162-237X","type":"print"},{"value":"2162-2388","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2]]}}}