{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T23:30:07Z","timestamp":1774049407009,"version":"3.50.1"},"reference-count":97,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61806039"],"award-info":[{"award-number":["61806039"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62176042"],"award-info":[{"award-number":["62176042"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62073059"],"award-info":[{"award-number":["62073059"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Sichuan Science and Technology Program","award":["2020YFG0080"],"award-info":[{"award-number":["2020YFG0080"]}]},{"name":"Sichuan Science and Technology Program","award":["2020YFG0481"],"award-info":[{"award-number":["2020YFG0481"]}]},{"name":"CCF-Baidu Open Fund","award":["2021PP15002000"],"award-info":[{"award-number":["2021PP15002000"]}]},{"name":"CCF-Tencent Open Fund","award":["RAGR20210107"],"award-info":[{"award-number":["RAGR20210107"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Pattern Anal. Mach. Intell."],"published-print":{"date-parts":[[2022,11,1]]},"DOI":"10.1109\/tpami.2021.3109287","type":"journal-article","created":{"date-parts":[[2021,9,3]],"date-time":"2021-09-03T20:24:49Z","timestamp":1630700689000},"page":"8196-8211","source":"Crossref","is-referenced-by-count":103,"title":["Divergence-Agnostic Unsupervised Domain Adaptation by Adversarial Attacks"],"prefix":"10.1109","volume":"44","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5504-2529","authenticated-orcid":false,"given":"Jingjing","family":"Li","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9406-3920","authenticated-orcid":false,"given":"Zhekai","family":"Du","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2993-7142","authenticated-orcid":false,"given":"Lei","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Shandong Normal University, Jinan, China"}]},{"given":"Zhengming","family":"Ding","sequence":"additional","affiliation":[{"name":"Tulane University, New Orleans, LA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3456-4993","authenticated-orcid":false,"given":"Ke","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2999-2088","authenticated-orcid":false,"given":"Heng Tao","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2991050"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-014-0696-6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3060473"},{"key":"ref5","first-page":"97","article-title":"Learning transferable features with deep adaptation networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Long"},{"key":"ref6","first-page":"1180","article-title":"Unsupervised domain adaptation by backpropagation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ganin"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00966"},{"key":"ref8","first-page":"6028","article-title":"Do we really need to access the source data? Source hypothesis transfer for unsupervised domain adaptation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Liang"},{"key":"ref9","first-page":"10","article-title":"Domain generalization via invariant feature representation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Muandet"},{"key":"ref10","first-page":"16096","article-title":"Domain generalization via entropy regularization","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Zhao","year":"2020"},{"key":"ref11","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2015","journal-title":"Proc. Int. Conf. Learn. Representations"},{"key":"ref12","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11672"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1200"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/72.501725"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49409-8_39"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1155"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2820174"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2924174"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2868854"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3062644"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01219-9_18"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00525"},{"key":"ref24","article-title":"Central moment discrepancy (CMD) for domain-invariant representation learning","author":"Zellinger","year":"2017","journal-title":"Proc. Int. Conf. Learn. Representations"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btl242"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2964173"},{"key":"ref27","first-page":"1640","article-title":"Conditional adversarial domain adaptation","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Long"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1017\/9781108891530.013"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3350902"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2615921"},{"key":"ref31","first-page":"2208","article-title":"Deep transfer learning with joint adaptation networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Long"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00503"},{"key":"ref33","first-page":"136","article-title":"Unsupervised domain adaptation with residual transfer networks","author":"Long","year":"2016","journal-title":"Proc. Advances Neural Inf. Process. Syst."},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.5555\/2946645.2946704"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.310"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3110179"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00460"},{"key":"ref39","article-title":"Unsupervised domain adaptation without source data by casting a bait","author":"Yang","year":"2020"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00309"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.57"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2011.2178556"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.477"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.591"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00153"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2017.8202133"},{"key":"ref47","article-title":"Generalizing across domains via cross-gradient training","author":"Shankar","year":"2018","journal-title":"Proc. Int. Conf. Learn. Representations"},{"key":"ref48","first-page":"5339","article-title":"Generalizing to unseen domains via adversarial data augmentation","author":"Volpi","year":"2018","journal-title":"Proc. Advances Neural Inf. Process. Syst."},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00566"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6846"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00233"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58545-7_10"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58536-5_8"},{"key":"ref54","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-020-05924-1"},{"key":"ref56","article-title":"Certifiable distributional robustness with principled adversarial training","author":"Sinha","year":"2018","journal-title":"Proc. Int. Conf. Learn. Representations"},{"key":"ref57","article-title":"Generalizable adversarial training via spectral normalization","author":"Farnia","year":"2019","journal-title":"Proc. Int. Conf. Learn. Representations"},{"key":"ref58","article-title":"Fast is better than free: Revisiting adversarial training","author":"Wong","year":"2020","journal-title":"Proc. Int. Conf. Learn. Representations"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/543"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01149"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2858821"},{"key":"ref62","article-title":"On the convergence and robustness of adversarial training","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Wang"},{"key":"ref63","article-title":"Adversarially-trained deep nets transfer better","author":"Utrera","year":"2021","journal-title":"Proc. Int. Conf. Learn. Representations"},{"key":"ref64","article-title":"Adversarially robust transfer learning","author":"Shafahi","year":"2020","journal-title":"Proc. Int. Conf. Learn. Representations"},{"key":"ref65","article-title":"Adversarial attacks and defences: A survey","author":"Chakraborty","year":"2018"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17027"},{"key":"ref67","article-title":"Adversarial robustness as a prior for learned representations","author":"Engstrom","year":"2019"},{"key":"ref68","first-page":"814","article-title":"Black box variational inference","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Ranganath"},{"key":"ref69","first-page":"531","article-title":"Mutual information neural estimation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Belghazi"},{"key":"ref70","article-title":"Representation learning with contrastive predictive coding","author":"Oord","year":"2018"},{"key":"ref71","first-page":"1597","article-title":"A simple framework for contrastive learning of visual representations","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Chen"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-009-5152-4"},{"key":"ref73","article-title":"Domain adaptation: Learning bounds and algorithms","author":"Mansour","year":"2009"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24412-4_25"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2014.12.003"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00889"},{"key":"ref77","article-title":"Ensemble adversarial training: Attacks and defenses","author":"Tram\u00e8r","year":"2018","journal-title":"Proc. Int. Conf. Learn. Representations"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2814042"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00392"},{"key":"ref81","article-title":"Adversarial dropout regularization","author":"Saito","year":"2017"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01053"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00151"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00400"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00913"},{"key":"ref86","first-page":"529","article-title":"Semi-supervised learning by entropy minimization","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Grandvalet"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15561-1_16"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.572"},{"key":"ref89","article-title":"VisDA: The visual domain adaptation challenge","author":"Peng","year":"2017"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.5555\/3454287.3455008"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref92","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2015","journal-title":"Proc. Int. Conf. Learn. Representations"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58536-5_8"},{"key":"ref94","first-page":"6450","article-title":"Domain generalization via model-agnostic learning of semantic features","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Dou"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12939-2_14"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1162\/089976698300017197"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-011-0841-3"}],"container-title":["IEEE Transactions on Pattern Analysis and Machine Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/34\/9910243\/09528987.pdf?arnumber=9528987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:08:07Z","timestamp":1705018087000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9528987\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":97,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tpami.2021.3109287","relation":{},"ISSN":["0162-8828","2160-9292","1939-3539"],"issn-type":[{"value":"0162-8828","type":"print"},{"value":"2160-9292","type":"electronic"},{"value":"1939-3539","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,1]]}}}