{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:43:09Z","timestamp":1775324589755,"version":"3.50.1"},"reference-count":86,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62201014"],"award-info":[{"award-number":["62201014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372014"],"award-info":[{"award-number":["62372014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372115"],"award-info":[{"award-number":["62372115"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971142"],"award-info":[{"award-number":["61971142"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62111530195"],"award-info":[{"award-number":["62111530195"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Pattern Anal. Mach. Intell."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1109\/tpami.2024.3361978","type":"journal-article","created":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T18:37:45Z","timestamp":1707158265000},"page":"5288-5305","source":"Crossref","is-referenced-by-count":15,"title":["Evidential Multi-Source-Free Unsupervised Domain Adaptation"],"prefix":"10.1109","volume":"46","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5996-2701","authenticated-orcid":false,"given":"Jiangbo","family":"Pei","sequence":"first","affiliation":[{"name":"National Institute of Health Data Science, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6168-9276","authenticated-orcid":false,"given":"Aidong","family":"Men","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4259-3882","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Wangxuan Institute of Computer Technology at Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4351-4979","authenticated-orcid":false,"given":"Xiahai","family":"Zhuang","sequence":"additional","affiliation":[{"name":"School of Data Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1216-5609","authenticated-orcid":false,"given":"Qingchao","family":"Chen","sequence":"additional","affiliation":[{"name":"National Institute of Health Data Science, Peking University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-021-01479-3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5555\/2946645.2946704"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-021-01549-6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-021-01496-2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-020-01394-z"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-023-01749-2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3184848"},{"key":"ref8","first-page":"97","article-title":"Learning transferable features with deep adaptation networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Long"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-009-5152-4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7503.003.0069"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-014-0730-8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-023-01778-x"},{"key":"ref13","article-title":"Conditional adversarial domain adaptation","author":"Long","year":"2017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3186537"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3186531"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-020-01364-5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3476098.3485051"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3476098.3485050"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-018-01143-3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-021-01447-x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3109530"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3073285"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-021-01474-8"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-021-01519-y"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-020-01395-y"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-69525-5_20"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-014-0718-4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-013-0693-1"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-014-0719-3"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-014-0720-x"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-013-0689-x"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-016-0953-y"},{"key":"ref33","first-page":"6028","article-title":"Do we really need to access the source data? source hypothesis transfer for unsupervised domain adaptation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Liang"},{"key":"ref34","article-title":"Divide and contrast: Source-free domain adaptation via adaptive contrastive learning","author":"Zhang","year":"2022"},{"key":"ref35","first-page":"5802","article-title":"Attracting and dispersing: A simple approach for source-free domain adaptation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Yang"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-023-06432-8"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2023.08.005"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00707"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00997"},{"key":"ref40","first-page":"2848","article-title":"Confident anchor-induced multi-source free domain adaptation","volume":"34","author":"Dong","year":"2021","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref41","first-page":"3274","article-title":"KD3A: Unsupervised multi-source decentralized domain adaptation via knowledge distillation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Feng"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3103390"},{"key":"ref43","article-title":"Exploiting the intrinsic neighborhood structure for source-free domain adaptation","author":"Yang","year":"2021"},{"key":"ref44","article-title":"Evidential deep learning to quantify classification uncertainty","author":"Sensoy","year":"2018"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3171983"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-43904-9_18"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i6.20575"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475384"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3130530"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-021-1106-5"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00066"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00966"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"ref54","article-title":"Towards principled methods for training generative adversarial networks","author":"Arjovsky","year":"2017"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1498"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58568-6_36"},{"key":"ref57","first-page":"8256","article-title":"Algorithms and theory for multiple-source adaptation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Hoffman"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00149"},{"key":"ref59","first-page":"8568","article-title":"Adversarial multiple source domain adaptation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Zhao"},{"key":"ref60","first-page":"7285","article-title":"Multi-source domain adaptation for semantic segmentation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Zhao"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i03.5651"},{"key":"ref62","article-title":"Repurposing pretrained models for robust out-of-domain few-shot learning","author":"Kwon","year":"2021"},{"key":"ref63","article-title":"What uncertainties do we need in Bayesian deep learning for computer vision?","author":"Kendall","year":"2017"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10562-9"},{"key":"ref65","volume-title":"Bayesian Learning for Neural Networks","volume":"118","author":"Neal","year":"2012"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19806-9_31"},{"key":"ref67","article-title":"Simple and scalable predictive uncertainty estimation using deep ensembles","author":"Lakshminarayanan","year":"2016"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.5555\/3045390.3045502"},{"key":"ref69","first-page":"1356","article-title":"Posterior network: Uncertainty estimation without OOD samples via density-based pseudo-counts","volume":"33","author":"Charpentier","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref70","article-title":"Ensemble distribution distillation","author":"Malinin","year":"2019"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.2307\/2347257"},{"key":"ref72","first-page":"14927","article-title":"Deep evidential regression","volume":"33","author":"Amini","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref73","first-page":"1081","article-title":"Transferability vs. discriminability: Batch spectral penalization for adversarial domain adaptation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Chen"},{"key":"ref74","article-title":"Dirichlet-based uncertainty calibration for active domain adaptation","author":"Xie","year":"2023"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-44792-4_3"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2023.3258753"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15561-1_16"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.572"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00417"},{"key":"ref80","article-title":"Multi-source domain adaptation in the deep learning era: A systematic survey","author":"Zhao","year":"2020"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58598-3_43"},{"key":"ref82","article-title":"Unsupervised domain adaptation without source data by casting a bait","author":"Yang","year":"2020"},{"key":"ref83","article-title":"Progressive domain adaptation from a source pre-trained model","author":"Kim","year":"2020"},{"issue":"11","key":"ref84","first-page":"2579","article-title":"Visualizing data using t-sne","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref85","first-page":"1","article-title":"A scalable laplace approximation for neural networks","volume-title":"Proc. 6th Int. Conf. Learn. Representations","author":"Ritter"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.01.103"}],"container-title":["IEEE Transactions on Pattern Analysis and Machine Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/34\/10582780\/10420513.pdf?arnumber=10420513","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T09:44:32Z","timestamp":1725961472000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10420513\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":86,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tpami.2024.3361978","relation":{},"ISSN":["0162-8828","2160-9292","1939-3539"],"issn-type":[{"value":"0162-8828","type":"print"},{"value":"2160-9292","type":"electronic"},{"value":"1939-3539","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8]]}}}