{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T16:37:00Z","timestamp":1769272620965,"version":"3.49.0"},"reference-count":177,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100018537","name":"National Science and Technology Major Project","doi-asserted-by":"publisher","award":["2021ZD0111901"],"award-info":[{"award-number":["2021ZD0111901"]}],"id":[{"id":"10.13039\/501100018537","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62376259"],"award-info":[{"award-number":["62376259"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Pattern Anal. Mach. Intell."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1109\/tpami.2025.3598147","type":"journal-article","created":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T18:01:55Z","timestamp":1755021715000},"page":"11644-11661","source":"Crossref","is-referenced-by-count":1,"title":["PIT: A Plug-and-Play Image Translator for Making Off-the-Shelf Models Adapt to Corruptions"],"prefix":"10.1109","volume":"47","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4481-0895","authenticated-orcid":false,"given":"Yinqi","family":"Li","sequence":"first","affiliation":[{"name":"State Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2668-0070","authenticated-orcid":false,"given":"Hong","family":"Chang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8348-392X","authenticated-orcid":false,"given":"Shiguang","family":"Shan","sequence":"additional","affiliation":[{"name":"State Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3024-4404","authenticated-orcid":false,"given":"Xilin","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"ImageNet classification with deep convolutional neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Krizhevsky","year":"2012"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.634"},{"key":"ref4","article-title":"An image is worth 16x16 words: Transformers for image recognition at scale","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Dosovitskiy","year":"2021"},{"key":"ref5","article-title":"Intriguing properties of neural networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Szegedy","year":"2014"},{"key":"ref6","article-title":"Benchmarking neural network robustness to common corruptions and perturbations","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Hendrycks","year":"2019"},{"key":"ref7","first-page":"5637","article-title":"WILDS: A benchmark of in-the-wild distribution shifts","volume-title":"Proc. 38th Int. Conf. Mach. Learn.","author":"Koh","year":"2021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00823"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20074-8_10"},{"key":"ref10","article-title":"ImageNet-trained CNNs are biased towards texture; increasing shape bias improves accuracy and robustness","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Geirhos","year":"2019"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58580-8_4"},{"key":"ref12","article-title":"AugMix: A simple method to improve robustness and uncertainty under data shift","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Hendrycks","year":"2020"},{"key":"ref13","first-page":"11539","article-title":"Improving robustness against common corruptions by covariate shift adaptation","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Schneider","year":"2020"},{"key":"ref14","article-title":"Tent: Fully test-time adaptation by entropy minimization","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Wang","year":"2021"},{"key":"ref15","first-page":"38629","article-title":"MEMO: Test time robustness via adaptation and augmentation","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Zhang","year":"2022"},{"key":"ref16","first-page":"9229","article-title":"Test-time training with self-supervision for generalization under distribution shifts","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Sun","year":"2020"},{"key":"ref17","first-page":"21808","article-title":"TTT: When does self-supervised test-time training fail or thrive","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Liu","year":"2021"},{"key":"ref18","first-page":"29374","article-title":"Test-time training with masked autoencoders","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Gandelsman","year":"2022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-024-02181-w"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01212"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01693"},{"key":"ref22","first-page":"71275","article-title":"PromptIR: Prompting for all-in-one image restoration","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Potlapalli","year":"2023"},{"key":"ref23","article-title":"AdaIR: Adaptive all-in-one image restoration via frequency mining and modulation","volume-title":"Proc. 13th Int. Conf. Learn. Representations","author":"Cui","year":"2025"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref26","first-page":"700","article-title":"Unsupervised image-to-image Translation Networks","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Liu","year":"2017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58545-7_43"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3477533"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00502"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01553"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICVGIP.2008.47"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6248092"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"ref37","article-title":"Rethinking atrous convolution for semantic image segmentation","author":"Chen","year":"2017"},{"key":"ref38","article-title":"Mixup: Beyond empirical risk minimization","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Zhang","year":"2018"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00612"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00020"},{"key":"ref41","first-page":"2731","article-title":"Population based augmentation: Efficient learning of augmentation policy schedules","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Ho","year":"2019"},{"key":"ref42","first-page":"6665","article-title":"Fast Autoaugment","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Lim","year":"2019"},{"key":"ref43","first-page":"13276","article-title":"A fourier perspective on model robustness in computer vision","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Yin","year":"2019"},{"key":"ref44","article-title":"Improving robustness without sacrificing accuracy with patch Gaussian augmentation","author":"Lopes","year":"2020"},{"key":"ref45","first-page":"237","article-title":"AugMax: Adversarial composition of random augmentations for robust training","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Wang","year":"2021"},{"key":"ref46","article-title":"Defending against image corruptions through adversarial augmentations","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Calian","year":"2022"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19806-9_36"},{"key":"ref48","first-page":"63660","article-title":"IPMix: Label-preserving data augmentation method for training robust classifiers","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Huang","year":"2023"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00816"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00706"},{"key":"ref51","article-title":"If your data distribution shifts, use self-learning","author":"Rusak","year":"2022","journal-title":"Trans. Mach. Learn. Res."},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01528"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02314"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01134"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-72943-0_11"},{"key":"ref56","first-page":"38298","article-title":"Test-time model adaptation with only forward passes","author":"Niu","year":"2024","journal-title":"Proc. 41st Int. Conf. Mach. Learn."},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02707"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.5555\/3045118.3045167"},{"key":"ref59","first-page":"97","article-title":"Learning transferable features with deep adaptation networks","volume-title":"Proc. 32nd Int. Conf. Mach. Learn.","author":"Long","year":"2015"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.5555\/2946645.2946704"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.316"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00392"},{"key":"ref63","first-page":"7404","article-title":"Bridging theory and algorithm for domain adaptation","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Zhang","year":"2019"},{"key":"ref64","first-page":"6028","article-title":"Do we really need to access the source data? Source hypothesis transfer for unsupervised domain adaptation","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Liang","year":"2020"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3103390"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01834"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01128"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3174526"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.18"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.241"},{"key":"ref71","first-page":"1989","article-title":"CyCADA: Cycle-consistent adversarial domain adaptation","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Hoffman","year":"2018"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00473"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00845"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00189"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00081"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46484-8_31"},{"key":"ref77","article-title":"Unsupervised cross-domain image generation","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Taigman","year":"2017"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58545-7_19"},{"key":"ref79","first-page":"3609","article-title":"EGSDE: Unpaired image-to-image translation via energy-guided stochastic differential equations","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Zhao","year":"2022"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3284003"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3287774"},{"key":"ref82","article-title":"Unpaired image-to-image translation via neural Schr\u00f6dinger bridge","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Kim","year":"2024"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.168"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2662206"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.511"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2873610"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00397"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2895793"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2925793"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00288"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00210"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00416"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3088914"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00564"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02403"},{"key":"ref96","first-page":"2965","article-title":"Noise2Noise: Learning image restoration without clean data","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Lehtinen","year":"2018"},{"key":"ref97","first-page":"3261","article-title":"Training deep learning based denoisers without ground truth data","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Soltanayev","year":"2018"},{"key":"ref98","first-page":"524","article-title":"Noise2Self: Blind denoising by self-supervision","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Batson","year":"2019"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00223"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01208"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3070382"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00333"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5834"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58548-8_21"},{"key":"ref105","article-title":"GAN2GAN: Generative noise learning for blind denoising with single noisy images","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Cha","year":"2021"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00235"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01162"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02427"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2019.2959133"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01449"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3051462"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00208"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3153685"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2022.3163554"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2021.3139209"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3170155"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2023.3309408"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2759252"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2867951"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2820807"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00925"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3007828"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3063604"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01249-6_42"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-018-1072-8"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2996538"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.518"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/117"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20072"},{"key":"ref130","first-page":"4461","article-title":"Rethinking Image Restoration for Object Detection","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Sun","year":"2022"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3547991"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i3.25479"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3234976"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2024.3350917"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3183243"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01351"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2024.3358962"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00420"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01106"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01208"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20053-3_32"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02341"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2024.3395455"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1603.08155"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00981"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.304"},{"key":"ref147","article-title":"Adam: A method for stochastic optimization","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Kingma","year":"2015"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2675998"},{"key":"ref149","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-009-0275-4"},{"key":"ref151","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Ho","year":"2020"},{"key":"ref152","article-title":"SDEdit: Guided image synthesis and editing with stochastic differential equations","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Meng","year":"2022"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref154","article-title":"TorchVision: PyTorch\u2019s computer vision library","year":"2016"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1007\/s12524-018-0891-y"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2018.6248"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.107432"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1080\/10106049.2022.2082545"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2021.3116489"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1080\/22797254.2022.2037468"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2022.3213768"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2012.2194787"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E93.D.1690"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58558-7_29"},{"key":"ref165","article-title":"MMDetection: Open MMLab detection toolbox and benchmark","author":"Chen","year":"2019"},{"key":"ref166","article-title":"MMSegmentation: OpenMMLab semantic segmentation toolbox and benchmark","year":"2020"},{"key":"ref167","article-title":"Towards deep learning models resistant to adversarial attacks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Madry","year":"2018"},{"key":"ref168","article-title":"Torchattacks: A Pytorch repository for adversarial attacks","author":"Kim","year":"2020"},{"key":"ref169","first-page":"16805","article-title":"Diffusion models for adversarial purification","volume-title":"Proc. 41st Int. Conf. Mach. Learn.","author":"Nie","year":"2022"},{"key":"ref170","first-page":"6643","article-title":"Robust classification via a single diffusion model","volume-title":"Proc. 41st Int. Conf. Mach. Learn.","author":"Chen","year":"2024"},{"key":"ref171","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"Proc. 38th Int. Conf. Mach. Learn.","author":"Radford","year":"2021"},{"key":"ref172","article-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Radford","year":"2016"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.437"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.350"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2017.544"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-73195-2_27"}],"container-title":["IEEE Transactions on Pattern Analysis and Machine Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/34\/11230086\/11122869.pdf?arnumber=11122869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T18:53:34Z","timestamp":1762455214000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11122869\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":177,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tpami.2025.3598147","relation":{},"ISSN":["0162-8828","2160-9292","1939-3539"],"issn-type":[{"value":"0162-8828","type":"print"},{"value":"2160-9292","type":"electronic"},{"value":"1939-3539","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]}}}