{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:10Z","timestamp":1750221010694,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T00:00:00Z","timestamp":1564012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1838159"],"award-info":[{"award-number":["1838159"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,25]]},"DOI":"10.1145\/3292500.3330957","type":"proceedings-article","created":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T13:17:26Z","timestamp":1564147046000},"page":"1665-1673","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Towards Robust and Discriminative Sequential Data Learning"],"prefix":"10.1145","author":[{"given":"Xiaowei","family":"Jia","sequence":"first","affiliation":[{"name":"University of Minnesota &amp; Adobe Research, Minneapolis, MN, USA"}]},{"given":"Sheng","family":"Li","sequence":"additional","affiliation":[{"name":"University of Georgia, Athens, GA, USA"}]},{"given":"Handong","family":"Zhao","sequence":"additional","affiliation":[{"name":"Adobe Research, San Jose, CA, USA"}]},{"given":"Sungchul","family":"Kim","sequence":"additional","affiliation":[{"name":"Adobe Research, San Jose, CA, USA"}]},{"given":"Vipin","family":"Kumar","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3272032"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098126"},{"key":"e_1_3_2_1_3_1","unstructured":"Andrew M Dai and Quoc V Le. 2015. Semi-supervised sequence learning. In NIPS. 3079--3087.   Andrew M Dai and Quoc V Le. 2015. Semi-supervised sequence learning. In NIPS. 3079--3087."},{"key":"e_1_3_2_1_4_1","volume-title":"Boosting adversarial attacks with momentum. arXiv preprint arXiv:1710.06081","author":"Dong Yinpeng","year":"2017","unstructured":"Yinpeng Dong , Fangzhou Liao , Tianyu Pang , Hang Su , Xiaolin Hu , Jianguo Li , and Jun Zhu . 2017. Boosting adversarial attacks with momentum. arXiv preprint arXiv:1710.06081 ( 2017 ). Yinpeng Dong, Fangzhou Liao, Tianyu Pang, Hang Su, Xiaolin Hu, Jianguo Li, and Jun Zhu. 2017. Boosting adversarial attacks with momentum. arXiv preprint arXiv:1710.06081 (2017)."},{"key":"e_1_3_2_1_5_1","volume-title":"HotFlip: White-Box Adversarial Examples for NLP. arXiv preprint arXiv:1712.06751","author":"Ebrahimi Javid","year":"2017","unstructured":"Javid Ebrahimi , Anyi Rao , Daniel Lowd , and Dejing Dou . 2017. HotFlip: White-Box Adversarial Examples for NLP. arXiv preprint arXiv:1712.06751 ( 2017 ). Javid Ebrahimi, Anyi Rao, Daniel Lowd, and Dejing Dou. 2017. HotFlip: White-Box Adversarial Examples for NLP. arXiv preprint arXiv:1712.06751 (2017)."},{"key":"e_1_3_2_1_6_1","volume-title":"Deep learning for time-series analysis. arXiv preprint arXiv:1701.01887","author":"Borges Gamboa John Cristian","year":"2017","unstructured":"John Cristian Borges Gamboa . 2017. Deep learning for time-series analysis. arXiv preprint arXiv:1701.01887 ( 2017 ). John Cristian Borges Gamboa. 2017. Deep learning for time-series analysis. arXiv preprint arXiv:1701.01887 (2017)."},{"key":"e_1_3_2_1_7_1","volume-title":"Adversarial spheres. arXiv preprint arXiv:1801.02774","author":"Gilmer Justin","year":"2018","unstructured":"Justin Gilmer , Luke Metz , Fartash Faghri , Samuel S Schoenholz , Maithra Raghu , Martin Wattenberg , and Ian Goodfellow . 2018. Adversarial spheres. arXiv preprint arXiv:1801.02774 ( 2018 ). Justin Gilmer, Luke Metz, Fartash Faghri, Samuel S Schoenholz, Maithra Raghu, Martin Wattenberg, and Ian Goodfellow. 2018. Adversarial spheres. arXiv preprint arXiv:1801.02774 (2018)."},{"key":"e_1_3_2_1_8_1","unstructured":"I. J. Goodfellow J. Shlens and C. Szegedy. 2014. Explaining and Harnessing Adversarial Examples. ArXiv e-prints (Dec. 2014). arxiv: stat.ML\/1412.6572  I. J. Goodfellow J. Shlens and C. Szegedy. 2014. Explaining and Harnessing Adversarial Examples. ArXiv e-prints (Dec. 2014). arxiv: stat.ML\/1412.6572"},{"key":"e_1_3_2_1_9_1","volume-title":"An Introductory Survey on Attention Mechanisms in NLP Problems. arXiv preprint arXiv:1811.05544","author":"Dichao Hu.","year":"2018","unstructured":"Dichao Hu. 2018. An Introductory Survey on Attention Mechanisms in NLP Problems. arXiv preprint arXiv:1811.05544 ( 2018 ). Dichao Hu. 2018. An Introductory Survey on Attention Mechanisms in NLP Problems. arXiv preprint arXiv:1811.05544 (2018)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2017.2728698"},{"key":"e_1_3_2_1_11_1","volume-title":"Improving DNN Robustness to Adversarial Attacks using Jacobian Regularization. arXiv preprint arXiv:1803.08680","author":"Jakubovitz Daniel","year":"2018","unstructured":"Daniel Jakubovitz and Raja Giryes . 2018. Improving DNN Robustness to Adversarial Attacks using Jacobian Regularization. arXiv preprint arXiv:1803.08680 ( 2018 ). Daniel Jakubovitz and Raja Giryes. 2018. Improving DNN Robustness to Adversarial Attacks using Jacobian Regularization. arXiv preprint arXiv:1803.08680 (2018)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098112"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975673.58"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3291019"},{"key":"e_1_3_2_1_15_1","volume-title":"Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882","author":"Kim Yoon","year":"2014","unstructured":"Yoon Kim . 2014. Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882 ( 2014 ). Yoon Kim. 2014. Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882 (2014)."},{"key":"e_1_3_2_1_16_1","volume-title":"Provable defenses against adversarial examples via the convex outer adversarial polytope. arXiv preprint arXiv:1711.00851","author":"Zico Kolter J","year":"2017","unstructured":"J Zico Kolter and Eric Wong . 2017. Provable defenses against adversarial examples via the convex outer adversarial polytope. arXiv preprint arXiv:1711.00851 ( 2017 ). J Zico Kolter and Eric Wong. 2017. Provable defenses against adversarial examples via the convex outer adversarial polytope. arXiv preprint arXiv:1711.00851 (2017)."},{"key":"e_1_3_2_1_17_1","unstructured":"Arun D Kulkarni and Barrett Lowe. 2016. Random forest algorithm for land cover classification. (2016).  Arun D Kulkarni and Barrett Lowe. 2016. Random forest algorithm for land cover classification. (2016)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098115"},{"key":"e_1_3_2_1_19_1","volume-title":"Understanding neural networks through representation erasure. arXiv preprint arXiv:1612.08220","author":"Li Jiwei","year":"2016","unstructured":"Jiwei Li , Will Monroe , and Dan Jurafsky . 2016. Understanding neural networks through representation erasure. arXiv preprint arXiv:1612.08220 ( 2016 ). Jiwei Li, Will Monroe, and Dan Jurafsky. 2016. Understanding neural networks through representation erasure. arXiv preprint arXiv:1612.08220 (2016)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220027"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220036"},{"key":"e_1_3_2_1_22_1","volume-title":"Effective approaches to attention-based neural machine translation. arXiv preprint arXiv:1508.04025","author":"Luong Minh-Thang","year":"2015","unstructured":"Minh-Thang Luong , Hieu Pham , and Christopher D Manning . 2015. Effective approaches to attention-based neural machine translation. arXiv preprint arXiv:1508.04025 ( 2015 ). Minh-Thang Luong, Hieu Pham, and Christopher D Manning. 2015. Effective approaches to attention-based neural machine translation. arXiv preprint arXiv:1508.04025 (2015)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098088"},{"key":"e_1_3_2_1_24_1","volume-title":"Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083","author":"Madry Aleksander","year":"2017","unstructured":"Aleksander Madry , Aleksandar Makelov , Ludwig Schmidt , Dimitris Tsipras , and Adrian Vladu . 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 ( 2017 ). Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2507157.2507163"},{"key":"e_1_3_2_1_26_1","volume-title":"Efficient estimation of word representations in vector space. arXiv:1301.3781","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Kai Chen , Greg Corrado , and Jeffrey Dean . 2013. Efficient estimation of word representations in vector space. arXiv:1301.3781 ( 2013 ). Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv:1301.3781 (2013)."},{"key":"e_1_3_2_1_27_1","volume-title":"Adversarial training methods for semi-supervised text classification. arXiv preprint:1605.07725","author":"Miyato Takeru","year":"2016","unstructured":"Takeru Miyato , Andrew M Dai , and Ian Goodfellow . 2016. Adversarial training methods for semi-supervised text classification. arXiv preprint:1605.07725 ( 2016 ). Takeru Miyato, Andrew M Dai, and Ian Goodfellow. 2016. Adversarial training methods for semi-supervised text classification. arXiv preprint:1605.07725 (2016)."},{"key":"e_1_3_2_1_28_1","volume-title":"Virtual adversarial training: a regularization method for supervised and semi-supervised learning","author":"Miyato Takeru","year":"2018","unstructured":"Takeru Miyato , Shin-ichi Maeda, Shin Ishii , and Masanori Koyama . 2018. Virtual adversarial training: a regularization method for supervised and semi-supervised learning . IEEE transactions on pattern analysis and machine intelligence ( 2018 ). Takeru Miyato, Shin-ichi Maeda, Shin Ishii, and Masanori Koyama. 2018. Virtual adversarial training: a regularization method for supervised and semi-supervised learning. IEEE transactions on pattern analysis and machine intelligence (2018)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975321.29"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219828"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3115\/1219840.1219855"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795300"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.94"},{"key":"e_1_3_2_1_34_1","volume-title":"Certified defenses against adversarial examples. arXiv preprint arXiv:1801.09344","author":"Raghunathan Aditi","year":"2018","unstructured":"Aditi Raghunathan , Jacob Steinhardt , and Percy Liang . 2018. Certified defenses against adversarial examples. arXiv preprint arXiv:1801.09344 ( 2018 ). Aditi Raghunathan, Jacob Steinhardt, and Percy Liang. 2018. Certified defenses against adversarial examples. arXiv preprint arXiv:1801.09344 (2018)."},{"key":"e_1_3_2_1_35_1","volume-title":"Improving the adversarial robustness and interpretability of deep neural networks by regularizing their input gradients. arXiv preprint arXiv:1711.09404","author":"Ross Andrew Slavin","year":"2017","unstructured":"Andrew Slavin Ross and Finale Doshi-Velez . 2017. Improving the adversarial robustness and interpretability of deep neural networks by regularizing their input gradients. arXiv preprint arXiv:1711.09404 ( 2017 ). Andrew Slavin Ross and Finale Doshi-Velez. 2017. Improving the adversarial robustness and interpretability of deep neural networks by regularizing their input gradients. arXiv preprint arXiv:1711.09404 (2017)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.193"},{"key":"e_1_3_2_1_37_1","volume-title":"Multi-temporal land cover classification with sequential recurrent encoders. ISPRS International Journal of Geo-Information","author":"Ru\u00dfwurm Marc","year":"2018","unstructured":"Marc Ru\u00dfwurm and Marco K\u00f6rner . 2018. Multi-temporal land cover classification with sequential recurrent encoders. ISPRS International Journal of Geo-Information ( 2018 ). Marc Ru\u00dfwurm and Marco K\u00f6rner. 2018. Multi-temporal land cover classification with sequential recurrent encoders. ISPRS International Journal of Geo-Information (2018)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219909"},{"key":"e_1_3_2_1_39_1","volume-title":"Survey on the attention based RNN model and its applications in computer vision. arXiv preprint arXiv:1601.06823","author":"Wang Feng","year":"2016","unstructured":"Feng Wang and David MJ Tax . 2016. Survey on the attention based RNN model and its applications in computer vision. arXiv preprint arXiv:1601.06823 ( 2016 ). Feng Wang and David MJ Tax. 2016. Survey on the attention based RNN model and its applications in computer vision. arXiv preprint arXiv:1601.06823 (2016)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098158"},{"key":"e_1_3_2_1_41_1","unstructured":"Sida Wang and Christopher D Manning. 2012. Baselines and bigrams: Simple good sentiment and topic classification. In ACL.   Sida Wang and Christopher D Manning. 2012. Baselines and bigrams: Simple good sentiment and topic classification. In ACL."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1174"},{"key":"e_1_3_2_1_43_1","unstructured":"Quanzeng You Hailin Jin Zhaowen Wang Chen Fang and Jiebo Luo. 2016. Image captioning with semantic attention. In CVPR.  Quanzeng You Hailin Jin Zhaowen Wang Chen Fang and Jiebo Luo. 2016. Image captioning with semantic attention. In CVPR."},{"key":"e_1_3_2_1_44_1","volume-title":"ATTAIN: Attention-based Time-Aware LSTM Networks for Disease Progression Modeling. In IJCAI 2019. International Joint Conferences on Artificial Intelligence.","author":"Zhang Yuan","year":"2019","unstructured":"Yuan Zhang , Xi Yang , Julie Ivy , and Min Chi . 2019 . ATTAIN: Attention-based Time-Aware LSTM Networks for Disease Progression Modeling. In IJCAI 2019. International Joint Conferences on Artificial Intelligence. Yuan Zhang, Xi Yang, Julie Ivy, and Min Chi. 2019. ATTAIN: Attention-based Time-Aware LSTM Networks for Disease Progression Modeling. In IJCAI 2019. International Joint Conferences on Artificial Intelligence."},{"key":"e_1_3_2_1_45_1","volume-title":"Semantically Guided Visual Question Answering. In 2018 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE","author":"Zhao Handong","year":"2018","unstructured":"Handong Zhao , Quanfu Fan , Dan Gutfreund , and Yun Fu . 2018 . Semantically Guided Visual Question Answering. In 2018 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE , 1852--1860. Handong Zhao, Quanfu Fan, Dan Gutfreund, and Yun Fu. 2018. Semantically Guided Visual Question Answering. In 2018 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE, 1852--1860."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"}],"event":{"name":"KDD '19: The 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Anchorage AK USA","acronym":"KDD '19"},"container-title":["Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330957","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292500.3330957","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292500.3330957","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:04Z","timestamp":1750206364000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330957"}},"subtitle":["When and How to Perform Adversarial Training?"],"short-title":[],"issued":{"date-parts":[[2019,7,25]]},"references-count":46,"alternative-id":["10.1145\/3292500.3330957","10.1145\/3292500"],"URL":"https:\/\/doi.org\/10.1145\/3292500.3330957","relation":{},"subject":[],"published":{"date-parts":[[2019,7,25]]},"assertion":[{"value":"2019-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}