{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T16:48:15Z","timestamp":1777654095710,"version":"3.51.4"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62022002"],"award-info":[{"award-number":["62022002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hong Kong Research Grants Council","award":["21211018"],"award-info":[{"award-number":["21211018"]}]},{"name":"General Research Fund","award":["11203220"],"award-info":[{"award-number":["11203220"]}]},{"name":"CityU New Research Initiatives\/Infrastructure Support","award":["APRC 9610528"],"award-info":[{"award-number":["APRC 9610528"]}]},{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","award":["NRF2018NCR-NCR005-0001"],"award-info":[{"award-number":["NRF2018NCR-NCR005-0001"]}],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NRF Investigatorship","award":["NRFI06-2020-0022-0001"],"award-info":[{"award-number":["NRFI06-2020-0022-0001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Pattern Anal. Mach. Intell."],"published-print":{"date-parts":[[2023,1,1]]},"DOI":"10.1109\/tpami.2022.3157441","type":"journal-article","created":{"date-parts":[[2022,3,8]],"date-time":"2022-03-08T21:49:27Z","timestamp":1646776167000},"page":"1302-1311","source":"Crossref","is-referenced-by-count":34,"title":["Neuron Coverage-Guided Domain Generalization"],"prefix":"10.1109","volume":"45","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6709-0261","authenticated-orcid":false,"given":"Chris Xing","family":"Tian","sequence":"first","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong SAR, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8723-8112","authenticated-orcid":false,"given":"Haoliang","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, City University of Hong Kong, Hong Kong SAR, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaofei","family":"Xie","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7300-9215","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3583-959X","authenticated-orcid":false,"given":"Shiqi","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong SAR, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref38","author":"gonzalez","year":"2004","journal-title":"Digital Image Processing Using Matlab"},{"key":"ref33","volume":"2033","author":"koltchinskii","year":"2011","journal-title":"Oracle Inequalities in Empirical Risk Minimization and Sparse Recovery Problems Ecole d&#x2019;Et&#x00E9; de Probabilit&#x00E9;s de Saint-Flour XXXVIII-2008"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/291"},{"key":"ref31","first-page":"8580","article-title":"Neural tangent kernel: Convergence and generalization in neural networks","author":"jacot","year":"2018","journal-title":"Proc Neural Inf Process Syst"},{"key":"ref30","article-title":"Representation learning with contrastive predictive coding","author":"oord","year":"2018"},{"key":"ref37","first-page":"323","article-title":"Neural network recognizer for hand-written zip code digits","author":"denker","year":"1989","journal-title":"Proc Neural Inf Process Syst"},{"key":"ref36","first-page":"1180","article-title":"Unsupervised domain adaptation by backpropagation","author":"ganin","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref35","article-title":"Reading digits in natural images with unsupervised feature learning","author":"netzer","year":"2011"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref28","first-page":"1126","article-title":"Model-agnostic meta-learning for fast adaptation of deep networks","author":"finn","year":"2017","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref27","first-page":"630","article-title":"Identity mappings in deep residual networks","author":"he","year":"0","journal-title":"Proc IEEE Eur Conf Comput Vis"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"key":"ref2","article-title":"Generalization in deep learning","author":"kawaguchi","year":"2017"},{"key":"ref1","article-title":"Understanding deep learning requires rethinking generalization","author":"zhang","year":"2016"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58536-5_8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00153"},{"key":"ref21","first-page":"1006","article-title":"Metareg: Towards domain generalization using meta-regularization","author":"balaji","year":"2018","journal-title":"Proc Neural Inf Process Syst"},{"key":"ref24","first-page":"6450","article-title":"Domain generalization via model-agnostic learning of semantic features","author":"dou","year":"2019","journal-title":"Proc Neural Inf Process Syst"},{"key":"ref23","article-title":"Feature-critic networks for heterogeneous domain generalization","author":"li","year":"2019"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref25","article-title":"Logic tensor networks: Deep learning and logical reasoning from data and knowledge","author":"serafini","year":"2016"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01141"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2551724"},{"key":"ref59","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Proc Neural Inf Process Syst"},{"key":"ref58","first-page":"8828","article-title":"Informative dropout for robust representation learning: A shape-bias perspective","author":"shi","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58542-6_5"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58545-7_10"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58517-4_33"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12939-2_14"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00566"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.572"},{"key":"ref10","article-title":"Wasserstein auto-encoders","author":"tolstikhin","year":"2017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"key":"ref40","article-title":"Benchmarking neural network robustness to common corruptions and perturbations","author":"hendrycks","year":"2019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1907375117"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.293"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.609"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.591"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00233"},{"key":"ref18","article-title":"Learning robust representations by projecting superficial statistics out","author":"wang","year":"2019","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.7003"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref3","first-page":"3320","author":"yosinski","year":"2014","journal-title":"Proc Neural Inf Process Syst"},{"key":"ref6","article-title":"Learning to generalize: Meta-learning for domain generalization","author":"li","year":"2017"},{"key":"ref5","first-page":"10","article-title":"Domain generalization via invariant feature representation","author":"muandet","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref8","first-page":"5339","article-title":"Generalizing to unseen domains via adversarial data augmentation","author":"volpi","year":"2018","journal-title":"Proc Neural Inf Process Syst"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995347"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01225-0_29"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01257"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.350"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.352"},{"key":"ref48","first-page":"801","article-title":"Encoder-decoder with atrous separable convolution for semantic image segmentation","author":"chen","year":"0","journal-title":"Proc Eur Conf Comput Vis"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.75"},{"key":"ref42","article-title":"Augmix: A simple data processing method to improve robustness and uncertainty","author":"hendrycks","year":"2019"},{"key":"ref41","doi-asserted-by":"crossref","DOI":"10.5244\/C.30.87","article-title":"Wide residual networks","author":"zagoruyko","year":"2016"},{"key":"ref44","first-page":"102","article-title":"Playing for data: Ground truth from computer games","author":"richter","year":"2016","journal-title":"Proc IEEE Eur Conf Comput Vis"},{"key":"ref43","article-title":"Domain stylization: A strong, simple baseline for synthetic to real image domain adaptation","author":"dundar","year":"2018"}],"container-title":["IEEE Transactions on Pattern Analysis and Machine Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/34\/9970415\/09730006.pdf?arnumber=9730006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T19:15:53Z","timestamp":1672082153000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9730006\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,1]]},"references-count":59,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tpami.2022.3157441","relation":{},"ISSN":["0162-8828","2160-9292","1939-3539"],"issn-type":[{"value":"0162-8828","type":"print"},{"value":"2160-9292","type":"electronic"},{"value":"1939-3539","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,1]]}}}