{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T17:12:17Z","timestamp":1765041137554,"version":"3.37.3"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2018AAA0102003"],"award-info":[{"award-number":["2018AAA0102003"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61620106009","U1936208","61733007","U1736219","61931008","61976202","61836002"],"award-info":[{"award-number":["61620106009","U1936208","61733007","U1736219","61931008","61976202","61836002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research Program of Frontier Sciences, CAS","award":["QYZDJ-SSW-SYS013"],"award-info":[{"award-number":["QYZDJ-SSW-SYS013"]}]},{"name":"Beijing Education Committee Cooperation Beijing Natural Science Foundation","award":["KZ201910005007"],"award-info":[{"award-number":["KZ201910005007"]}]},{"DOI":"10.13039\/501100004739","name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004739","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Strategic Priority Research Program of Chinese Academy of Sciences","award":["XDB28000000"],"award-info":[{"award-number":["XDB28000000"]}]},{"name":"Hong Kong Research Grant Council","award":["16303817","ITF UIM\/390"],"award-info":[{"award-number":["16303817","ITF UIM\/390"]}]},{"name":"Tencent AI Lab"},{"name":"Si Family Foundation"},{"DOI":"10.13039\/100016909","name":"Microsoft Research Asia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016909","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Pattern Anal. Mach. Intell."],"published-print":{"date-parts":[[2022,6,1]]},"DOI":"10.1109\/tpami.2020.3047817","type":"journal-article","created":{"date-parts":[[2020,12,29]],"date-time":"2020-12-29T20:53:11Z","timestamp":1609275191000},"page":"3154-3169","source":"Crossref","is-referenced-by-count":5,"title":["Not All Samples are Trustworthy: Towards Deep Robust SVP Prediction"],"prefix":"10.1109","volume":"44","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3512-7277","authenticated-orcid":false,"given":"Qianqian","family":"Xu","sequence":"first","affiliation":[{"name":"Key Laboratory of Intelligent Information Processing, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4409-4999","authenticated-orcid":false,"given":"Zhiyong","family":"Yang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0148-8306","authenticated-orcid":false,"given":"Yangbangyan","family":"Jiang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7141-708X","authenticated-orcid":false,"given":"Xiaochun","family":"Cao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China"}]},{"given":"Yuan","family":"Yao","sequence":"additional","affiliation":[{"name":"Department of Mathematics, and by courtesy, Computer Science and Engineering, Hong Kong University of Science and Technology, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7542-296X","authenticated-orcid":false,"given":"Qingming","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2815842"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.647"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102363"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1631272.1631339"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3148148"},{"issue":"Nov","key":"ref7","first-page":"933","article-title":"An efficient boosting algorithm for combining preferences","volume":"4","author":"Freund","year":"2003","journal-title":"J. Mach. Learn. Res."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2307\/2699986"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10605-2_32"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2456887"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2792062"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"author":"Huang","key":"ref13","article-title":"Labeled faces in the wild: A database for studying face recognition in unconstrained environments"},{"volume-title":"Robust Statistics","year":"2004","author":"Huber","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-010-0419-x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3240508.3240582"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0121"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2644866"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/775066.775067"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-014-0798-1"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50077-5_5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2552172"},{"volume-title":"Foundations of Machine Learning","year":"2018","author":"Mohri","key":"ref23"},{"key":"ref24","first-page":"1061","article-title":"Hamming distance metric learning","volume-title":"Proc. Annu. Conf. Neural Inf. Process. Syst.","author":"Norouzi"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.240"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.462"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462292"},{"key":"ref28","first-page":"5601","article-title":"Toward robustness against label noise in training deep discriminative neural networks","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst.","author":"Vahdat"},{"key":"ref29","first-page":"489","article-title":"DART: Dropouts meet multiple additive regression trees","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Vinayak"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2393347.2393400"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2502081.2502083"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123267"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00920"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2582379"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2877939"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.278"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00941"}],"container-title":["IEEE Transactions on Pattern Analysis and Machine Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/34\/9769881\/09310271.pdf?arnumber=9310271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:46:39Z","timestamp":1704840399000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9310271\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,1]]},"references-count":37,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tpami.2020.3047817","relation":{},"ISSN":["0162-8828","2160-9292","1939-3539"],"issn-type":[{"type":"print","value":"0162-8828"},{"type":"electronic","value":"2160-9292"},{"type":"electronic","value":"1939-3539"}],"subject":[],"published":{"date-parts":[[2022,6,1]]}}}