{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T10:30:43Z","timestamp":1760524243427,"version":"3.37.3"},"reference-count":110,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"JSPS KAKENHI","award":["JP20H04168","JP19K24348","JP19H04086","JP21H04877"],"award-info":[{"award-number":["JP20H04168","JP19K24348","JP19H04086","JP21H04877"]}]},{"DOI":"10.13039\/501100020959","name":"JST-Mirai Program","doi-asserted-by":"publisher","award":["JPMJMI20B8"],"award-info":[{"award-number":["JPMJMI20B8"]}],"id":[{"id":"10.13039\/501100020959","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Canada CIFAR AI Program"},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tr.2021.3096332","type":"journal-article","created":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T20:06:00Z","timestamp":1628280360000},"page":"1401-1416","source":"Crossref","is-referenced-by-count":34,"title":["<i>DeepRepair:<\/i> Style-Guided Repairing for Deep Neural Networks in the Real-World Operational Environment"],"prefix":"10.1109","volume":"71","author":[{"given":"Bing","family":"Yu","sequence":"first","affiliation":[{"name":"Kyushu University, Fukuoka, Japan"}]},{"given":"Hua","family":"Qi","sequence":"additional","affiliation":[{"name":"Kyushu University, Fukuoka, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0974-9299","authenticated-orcid":false,"given":"Qing","family":"Guo","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0857-8611","authenticated-orcid":false,"given":"Felix","family":"Juefei-Xu","sequence":"additional","affiliation":[{"name":"Alibaba Group, Sunnyvale, CA, USA"}]},{"given":"Xiaofei","family":"Xie","sequence":"additional","affiliation":[{"name":"Kyushu University, Fukuoka, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8621-2420","authenticated-orcid":false,"given":"Lei","family":"Ma","sequence":"additional","affiliation":[{"name":"University of Alberta, Edmonton, AB, Canada"}]},{"given":"Jianjun","family":"Zhao","sequence":"additional","affiliation":[{"name":"Kyushu University, Fukuoka, Japan"}]}],"member":"263","reference":[{"article-title":"Ccmatrix: Mining billions of high-quality parallel sentences on the web","year":"2019","author":"schwenk","key":"ref39"},{"key":"ref38","first-page":"1","article-title":"Beyond English-centric multilingual machine translation","volume":"22","author":"fan","year":"2021","journal-title":"J Mach Learn Res"},{"article-title":"Efficientderain: Learning pixel-wise dilation filtering for high-efficiency single-image deraining","year":"2020","author":"guo","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00406"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791174"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00153"},{"article-title":"Language models are few-shot learners","year":"2020","author":"brown","key":"ref37"},{"article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","year":"2018","author":"devlin","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00253"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00114"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2015.7351398"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00185"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358787"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICME51207.2021.9428437"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00037"},{"article-title":"Adversarial exposure attack on diabetic retinopathy imagery","year":"2020","author":"cheng","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.01.032"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2439281"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380415"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00265"},{"key":"ref100","article-title":"Renet: A recurrent neural network based alternative to convolutional networks","author":"visin","year":"2015","journal-title":"&#x201D;"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01208"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1177\/0278364919887447"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1038\/nature16961","article-title":"Mastering the game of go with deep neural networks and tree search","volume":"529","author":"silver","year":"2016","journal-title":"Nature"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132785"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"goodfellow","key":"ref58"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"article-title":"Adversarial examples in the physical world","year":"2017","author":"kurakin","key":"ref56"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/772"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1126\/science.aao1733"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1126\/science.aar6404"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1038\/nature24270"},{"article-title":"A massive collection of cross-lingual web-document pairs","year":"2019","author":"el-kishky","key":"ref40"},{"key":"ref4","first-page":"2636","article-title":"Bdd100 k: A diverse driving dataset for heterogeneous multitask learning","author":"yu","year":"0","journal-title":"Proc IEEE Conf Comput Vis and Pattern Recog"},{"journal-title":"Proc Submitted Int Conf Learn Representations Under Rev","article-title":"Lambdanetworks: Modeling long-range interactions without attention","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.312"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6248074"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref49","first-page":"2659","article-title":"ELF: An extensive, lightweight and flexible research platform for real-time strategy games","author":"tian","year":"0","journal-title":"Proc Adv Neural Informat Process Syst"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01164"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/476"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461368"},{"article-title":"Wavenet: A generative model for raw audio","year":"2016","author":"oord","key":"ref45"},{"article-title":"Dota 2 with large scale deep reinforcement learning","year":"2019","author":"berner","key":"ref48"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1038\/s41586-019-1724-z","article-title":"Grandmaster level in starcraft II using multi-agent reinforcement learning","volume":"575","author":"vinyals","year":"2019","journal-title":"Nature"},{"article-title":"Toxic language detection in social media for brazilian portuguese: New dataset and multilingual analysis","year":"2020","author":"leite","key":"ref42"},{"article-title":"Ethos: An online hate speech detection dataset","year":"2020","author":"mollas","key":"ref41"},{"key":"ref44","first-page":"452","article-title":"Opinion mining and sentiment analysis","author":"bakshi","year":"0","journal-title":"Proc 3rd Int Conf Comput Sustain Glob Develop"},{"key":"ref43","first-page":"30","article-title":"Sentiment analysis of twitter data","author":"agarwal","year":"0","journal-title":"Proc Workshop Lang Social Media"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01219-9_28"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.740"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.265"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00913"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2019.00030"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409754"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8668044"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00108"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338954"},{"key":"ref79","first-page":"4901","article-title":"Tensorfuzz: Debugging neural networks with coverage-guided fuzzing","author":"odena","year":"0","journal-title":"Proc 36th Int Conf Mach Learn"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330579"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2755013"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3105906"},{"key":"ref65","first-page":"2113","article-title":"Gradient-based hyperparameter optimization through reversible learning","author":"maclaurin","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00043"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236082"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16722-6_10"},{"article-title":"Efficientnet: Rethinking model scaling for convolutional neural networks","year":"2019","author":"tan","key":"ref2"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2924172"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"article-title":"It&#x2019;s raining cats or dogs? adversarial rain attack on DNN perception","year":"2020","author":"zhai","key":"ref109"},{"key":"ref95","first-page":"1","article-title":"Benchmarking neural network robustness to common corruptions and perturbations","author":"hendrycks","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01043"},{"article-title":"Raw experimental data of &#x2018;deeprepair: Style-guided repairing for DNNS in the real-world operational environment","year":"0","author":"yu","key":"ref94"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/145"},{"key":"ref93","article-title":"AugMix: A simple data processing method to improve robustness and uncertainty","author":"hendrycks","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413544"},{"key":"ref92","first-page":"11383","article-title":"RNNrepair: Automatic RNN repair via model-based analysis","author":"xie","year":"0","journal-title":"Proc 38th Int Conf Mach Learn"},{"article-title":"Pasadena: Perceptually aware and stealthy adversarial denoise attack","year":"2020","author":"cheng","key":"ref105"},{"key":"ref91","first-page":"1","article-title":"AugMix: A simple data processing method to improve robustness and uncertainty","author":"hendrycks","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"article-title":"Gridmask data augmentation","year":"2020","author":"chen","key":"ref90"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"goodfellow","key":"ref103"},{"article-title":"Towards deep learning models resistant to adversarial attacks","year":"2017","author":"madry","key":"ref102"},{"article-title":"Advhaze: Adversarial haze attack","year":"2021","author":"gao","key":"ref110"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.5244\/C.30.87"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref96","article-title":"Striving for simplicity: The all convolutional net","author":"springenberg","year":"0","journal-title":"Proc ICLR (Workshop Track"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2468173"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2015.10.007"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20893-6_1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"},{"article-title":"Yolov4: Optimal speed and accuracy of object detection","year":"2020","author":"bochkovskiy","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380415"},{"article-title":"Detectors: Detecting objects with recursive feature pyramid and switchable atrous convolution","year":"2020","author":"qiao","key":"ref17"},{"article-title":"Machine learning testing: Survey, landscapes and horizons","year":"2020","author":"zhang","key":"ref81"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00682"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380378"},{"key":"ref19","first-page":"975","article-title":"Watch out! motion is blurring the vision of your deep neural networks","author":"guo","year":"0","journal-title":"Proc Adv Neural Informat Process Syst"},{"article-title":"Search based repair of deep neural networks","year":"2019","author":"sohn","key":"ref83"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380368"},{"article-title":"Yolov4: Optimal speed and accuracy of object detection","year":"2020","author":"bochkovskiy","key":"ref89"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00079"},{"article-title":"Improved regularization of convolutional neural networks with cutout","year":"2017","author":"devries","key":"ref86"},{"key":"ref87","article-title":"Mixup: Beyond empirical risk minimization","author":"zhang","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00612"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/9967421\/09508369.pdf?arnumber=9508369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T19:38:11Z","timestamp":1671478691000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9508369\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":110,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tr.2021.3096332","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"type":"print","value":"0018-9529"},{"type":"electronic","value":"1558-1721"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}