{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T15:09:13Z","timestamp":1759072153400,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,3]],"date-time":"2021-08-03T00:00:00Z","timestamp":1627948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100012774","name":"Innovationsfonden","doi-asserted-by":"publisher","award":["8053-00073B"],"award-info":[{"award-number":["8053-00073B"]}],"id":[{"id":"10.13039\/100012774","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1917855, IIS-1816470"],"award-info":[{"award-number":["IIS-1917855, IIS-1816470"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Danmarks Frie Forskningsfond","award":["9131-00042B"],"award-info":[{"award-number":["9131-00042B"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,3]]},"DOI":"10.1145\/3472538.3472540","type":"proceedings-article","created":{"date-parts":[[2021,10,21]],"date-time":"2021-10-21T22:48:54Z","timestamp":1634856534000},"page":"1-10","source":"Crossref","is-referenced-by-count":4,"title":["Dealing with Adversarial Player Strategies in the Neural Network Game iNNk through Ensemble Learning"],"prefix":"10.1145","author":[{"given":"Mathias","family":"L\u00f6we","sequence":"first","affiliation":[{"name":"IT University of Copenhagen, Denmark"}]},{"given":"Jennifer","family":"Villareale","sequence":"additional","affiliation":[{"name":"Drexel University, United States"}]},{"given":"Evan","family":"Freed","sequence":"additional","affiliation":[{"name":"Drexel University, United States"}]},{"given":"Aleksanteri","family":"Sladek","sequence":"additional","affiliation":[{"name":"Drexel University, United States"}]},{"given":"Jichen","family":"Zhu","sequence":"additional","affiliation":[{"name":"Drexel University, United States"}]},{"given":"Sebastian","family":"Risi","sequence":"additional","affiliation":[{"name":"IT University of Copenhagen, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2021,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mahdieh Abbasi and Christian Gagn\u00e9. 2017. Robustness to adversarial examples through an ensemble of specialists. arXiv preprint arXiv:1702.06856(2017).  Mahdieh Abbasi and Christian Gagn\u00e9. 2017. Robustness to adversarial examples through an ensemble of specialists. arXiv preprint arXiv:1702.06856(2017)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00498"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment 16","author":"Awiszus Maren","year":"2020","unstructured":"Maren Awiszus , Frederik Schubert , and Bodo Rosenhahn . 2020 . TOAD-GAN: Coherent Style Level Generation from a Single Example . Proceedings of the AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment 16 , 1 (Oct 2020), 10\u201316. https:\/\/ojs.aaai.org\/index.php\/AIIDE\/article\/view\/7401 Maren Awiszus, Frederik Schubert, and Bodo Rosenhahn. 2020. TOAD-GAN: Coherent Style Level Generation from a Single Example. Proceedings of the AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment 16, 1 (Oct 2020), 10\u201316. https:\/\/ojs.aaai.org\/index.php\/AIIDE\/article\/view\/7401"},{"key":"e_1_3_2_1_4_1","unstructured":"Philipp Benz Chaoning Zhang and In\u00a0So Kweon. 2020. Batch Normalization Increases Adversarial Vulnerability: Disentangling Usefulness and Robustness of Model Features. arxiv:2010.03316\u00a0[cs.LG]  Philipp Benz Chaoning Zhang and In\u00a0So Kweon. 2020. Batch Normalization Increases Adversarial Vulnerability: Disentangling Usefulness and Robustness of Model Features. arxiv:2010.03316\u00a0[cs.LG]"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 45th annual meeting of the association of computational linguistics. 440\u2013447","author":"Blitzer John","year":"2007","unstructured":"John Blitzer , Mark Dredze , and Fernando Pereira . 2007 . Biographies, bollywood, boom-boxes and blenders: Domain adaptation for sentiment classification . In Proceedings of the 45th annual meeting of the association of computational linguistics. 440\u2013447 . John Blitzer, Mark Dredze, and Fernando Pereira. 2007. Biographies, bollywood, boom-boxes and blenders: Domain adaptation for sentiment classification. In Proceedings of the 45th annual meeting of the association of computational linguistics. 440\u2013447."},{"key":"e_1_3_2_1_6_1","volume-title":"Bagging predictors. Machine learning 24, 2","author":"Breiman Leo","year":"1996","unstructured":"Leo Breiman . 1996. Bagging predictors. Machine learning 24, 2 ( 1996 ), 123\u2013140. Leo Breiman. 1996. Bagging predictors. Machine learning 24, 2 (1996), 123\u2013140."},{"key":"e_1_3_2_1_7_1","volume-title":"Large Scale GAN Training for High Fidelity Natural Image Synthesis. In 7th International Conference on Learning Representations, ICLR 2019","author":"Brock Andrew","year":"2019","unstructured":"Andrew Brock , Jeff Donahue , and Karen Simonyan . 2019 . Large Scale GAN Training for High Fidelity Natural Image Synthesis. In 7th International Conference on Learning Representations, ICLR 2019 , New Orleans, LA, USA , May 6-9, 2019. OpenReview.net. https:\/\/openreview.net\/forum?id=B1xsqj09Fm Andrew Brock, Jeff Donahue, and Karen Simonyan. 2019. Large Scale GAN Training for High Fidelity Natural Image Synthesis. In 7th International Conference on Learning Representations, ICLR 2019, New Orleans, LA, USA, May 6-9, 2019. OpenReview.net. https:\/\/openreview.net\/forum?id=B1xsqj09Fm"},{"key":"e_1_3_2_1_8_1","unstructured":"Tom\u00a0B. Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell Sandhini Agarwal Ariel Herbert-Voss Gretchen Krueger Tom Henighan Rewon Child Aditya Ramesh Daniel\u00a0M. Ziegler Jeffrey Wu Clemens Winter Christopher Hesse Mark Chen Eric Sigler Mateusz Litwin Scott Gray Benjamin Chess Jack Clark Christopher Berner Sam McCandlish Alec Radford Ilya Sutskever and Dario Amodei. 2020. Language Models are Few-Shot Learners. arxiv:2005.14165\u00a0[cs.CL]  Tom\u00a0B. Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell Sandhini Agarwal Ariel Herbert-Voss Gretchen Krueger Tom Henighan Rewon Child Aditya Ramesh Daniel\u00a0M. Ziegler Jeffrey Wu Clemens Winter Christopher Hesse Mark Chen Eric Sigler Mateusz Litwin Scott Gray Benjamin Chess Jack Clark Christopher Berner Sam McCandlish Alec Radford Ilya Sutskever and Dario Amodei. 2020. Language Models are Few-Shot Learners. arxiv:2005.14165\u00a0[cs.CL]"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341215.3358247"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/jsfa.9689"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/648054.743935"},{"key":"e_1_3_2_1_12_1","volume-title":"Robust Physical-World Attacks on Deep Learning Visual Classification. In 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 1625\u20131634","author":"Eykholt K.","year":"2018","unstructured":"K. Eykholt , I. Evtimov , E. Fernandes , B. Li , A. Rahmati , C. Xiao , A. Prakash , T. Kohno , and D. Song . 2018 . Robust Physical-World Attacks on Deep Learning Visual Classification. In 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 1625\u20131634 . https:\/\/doi.org\/10.1109\/CVPR. 2018 .00175 K. Eykholt, I. Evtimov, E. Fernandes, B. Li, A. Rahmati, C. Xiao, A. Prakash, T. Kohno, and D. Song. 2018. Robust Physical-World Attacks on Deep Learning Visual Classification. In 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 1625\u20131634. https:\/\/doi.org\/10.1109\/CVPR.2018.00175"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence 35","author":"Fontaine C.","year":"2021","unstructured":"Matthew\u00a0 C. Fontaine , Ruilin Liu , Ahmed Khalifa , Jignesh Modi , Julian Togelius , Amy\u00a0 K. Hoover , and Stefanos Nikolaidis . 2021 . Illuminating Mario Scenes in the Latent Space of a Generative Adversarial Network . Proceedings of the AAAI Conference on Artificial Intelligence 35 , 7 (May 2021), 5922\u20135930. https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/view\/16740 Matthew\u00a0C. Fontaine, Ruilin Liu, Ahmed Khalifa, Jignesh Modi, Julian Togelius, Amy\u00a0K. Hoover, and Stefanos Nikolaidis. 2021. Illuminating Mario Scenes in the Latent Space of a Generative Adversarial Network. Proceedings of the AAAI Conference on Artificial Intelligence 35, 7 (May 2021), 5922\u20135930. https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/view\/16740"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/3091696.3091715"},{"key":"e_1_3_2_1_15_1","unstructured":"Angus Galloway Anna Golubeva Thomas Tanay Medhat Moussa and Graham\u00a0W. Taylor. 2019. Batch Normalization is a Cause of Adversarial Vulnerability. arxiv:1905.02161\u00a0[cs.LG]  Angus Galloway Anna Golubeva Thomas Tanay Medhat Moussa and Graham\u00a0W. Taylor. 2019. Batch Normalization is a Cause of Adversarial Vulnerability. arxiv:1905.02161\u00a0[cs.LG]"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1111\/mice.12363"},{"key":"e_1_3_2_1_17_1","volume-title":"War Stories: How Forza learned to love neural nets to train AI drivers. https:\/\/arstechnica.com\/gaming\/2020\/09\/war-stories-how-forza-learned-to-love-neural-nets-to-train-ai-drivers\/","author":"Gitlin M","year":"2020","unstructured":"Jonathan\u00a0 M Gitlin . 2020 . War Stories: How Forza learned to love neural nets to train AI drivers. https:\/\/arstechnica.com\/gaming\/2020\/09\/war-stories-how-forza-learned-to-love-neural-nets-to-train-ai-drivers\/ Jonathan\u00a0M Gitlin. 2020. War Stories: How Forza learned to love neural nets to train AI drivers. https:\/\/arstechnica.com\/gaming\/2020\/09\/war-stories-how-forza-learned-to-love-neural-nets-to-train-ai-drivers\/"},{"key":"e_1_3_2_1_18_1","unstructured":"Xavier Glorot and Yoshua Bengio. 2010. Understanding the difficulty of training deep feedforward neural networks. In Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics(Proceedings of Machine Learning Research Vol.\u00a09) Yee\u00a0Whye Teh and Mike Titterington (Eds.). JMLR Workshop and Conference Proceedings Chia Laguna Resort Sardinia Italy 249\u2013256. http:\/\/proceedings.mlr.press\/v9\/glorot10a.html  Xavier Glorot and Yoshua Bengio. 2010. Understanding the difficulty of training deep feedforward neural networks. In Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics(Proceedings of Machine Learning Research Vol.\u00a09) Yee\u00a0Whye Teh and Mike Titterington (Eds.). JMLR Workshop and Conference Proceedings Chia Laguna Resort Sardinia Italy 249\u2013256. http:\/\/proceedings.mlr.press\/v9\/glorot10a.html"},{"volume-title":"Deep learning. Vol.\u00a01","author":"Goodfellow Ian","key":"e_1_3_2_1_19_1","unstructured":"Ian Goodfellow , Yoshua Bengio , Aaron Courville , and Yoshua Bengio . 2016. Deep learning. Vol.\u00a01 . MIT press Cambridge . Ian Goodfellow, Yoshua Bengio, Aaron Courville, and Yoshua Bengio. 2016. Deep learning. Vol.\u00a01. MIT press Cambridge."},{"key":"e_1_3_2_1_20_1","volume-title":"Advances in Neural Information Processing Systems, Z.\u00a0Ghahramani, M.\u00a0Welling, C.\u00a0Cortes, N.\u00a0Lawrence, and K.\u00a0Q. Weinberger(Eds.), Vol.\u00a027. Curran Associates","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow , Jean Pouget-Abadie , Mehdi Mirza , Bing Xu , David Warde-Farley , Sherjil Ozair , Aaron Courville , and Yoshua Bengio . 2014. Generative Adversarial Nets . In Advances in Neural Information Processing Systems, Z.\u00a0Ghahramani, M.\u00a0Welling, C.\u00a0Cortes, N.\u00a0Lawrence, and K.\u00a0Q. Weinberger(Eds.), Vol.\u00a027. Curran Associates , Inc ., 2672\u20132680. https:\/\/proceedings.neurips.cc\/paper\/ 2014 \/file\/5ca3e9b122f61f8f06494c97b1afccf3-Paper.pdf Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative Adversarial Nets. In Advances in Neural Information Processing Systems, Z.\u00a0Ghahramani, M.\u00a0Welling, C.\u00a0Cortes, N.\u00a0Lawrence, and K.\u00a0Q. Weinberger(Eds.), Vol.\u00a027. Curran Associates, Inc., 2672\u20132680. https:\/\/proceedings.neurips.cc\/paper\/2014\/file\/5ca3e9b122f61f8f06494c97b1afccf3-Paper.pdf"},{"key":"e_1_3_2_1_21_1","unstructured":"Ian\u00a0J. Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. CoRR abs\/1412.6572(2015).  Ian\u00a0J. Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. CoRR abs\/1412.6572(2015)."},{"key":"e_1_3_2_1_22_1","unstructured":"Google. 2016. Quick Draw!online. https:\/\/quickdraw.withgoogle.com  Google. 2016. Quick Draw!online. https:\/\/quickdraw.withgoogle.com"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/267658.267663"},{"key":"e_1_3_2_1_24_1","volume-title":"6th International Conference on Learning Representations, ICLR","author":"Guo Chuan","year":"2018","unstructured":"Chuan Guo , Mayank Rana , Moustapha Ciss\u00e9 , and Laurens van\u00a0der Maaten . 2018. Countering Adversarial Images using Input Transformations . In 6th International Conference on Learning Representations, ICLR 2018 , Vancouver, BC , Canada, April 30 - May 3, 2018, Conference Track Proceedings. OpenReview .net. https:\/\/openreview.net\/forum?id=SyJ7ClWCb Chuan Guo, Mayank Rana, Moustapha Ciss\u00e9, and Laurens van\u00a0der Maaten. 2018. Countering Adversarial Images using Input Transformations. In 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings. OpenReview.net. https:\/\/openreview.net\/forum?id=SyJ7ClWCb"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.58871"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2009.5286468"},{"key":"e_1_3_2_1_27_1","volume-title":"NIPS Deep Learning and Representation Learning Workshop. http:\/\/arxiv.org\/abs\/1503","author":"Hinton Geoffrey","year":"2015","unstructured":"Geoffrey Hinton , Oriol Vinyals , and Jeffrey Dean . 2015 . Distilling the Knowledge in a Neural Network . In NIPS Deep Learning and Representation Learning Workshop. http:\/\/arxiv.org\/abs\/1503 .02531 Geoffrey Hinton, Oriol Vinyals, and Jeffrey Dean. 2015. Distilling the Knowledge in a Neural Network. In NIPS Deep Learning and Representation Learning Workshop. http:\/\/arxiv.org\/abs\/1503.02531"},{"key":"e_1_3_2_1_28_1","volume-title":"Long Short-term Memory. Neural computation 9 (12","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber . 1997. Long Short-term Memory. Neural computation 9 (12 1997 ), 1735\u201380. https:\/\/doi.org\/10.1162\/neco.1997.9.8.1735 Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long Short-term Memory. Neural computation 9 (12 1997), 1735\u201380. https:\/\/doi.org\/10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639081"},{"key":"e_1_3_2_1_30_1","unstructured":"Andrew Ilyas Logan Engstrom Anish Athalye and Jessy Lin. 2018. Black-box Adversarial Attacks with Limited Queries and Information. arxiv:1804.08598\u00a0[cs.CV]  Andrew Ilyas Logan Engstrom Anish Athalye and Jessy Lin. 2018. Black-box Adversarial Attacks with Limited Queries and Information. arxiv:1804.08598\u00a0[cs.CV]"},{"key":"e_1_3_2_1_31_1","volume-title":"International conference on machine learning. PMLR, 448\u2013456","author":"Ioffe Sergey","year":"2015","unstructured":"Sergey Ioffe and Christian Szegedy . 2015 . Batch normalization: Accelerating deep network training by reducing internal covariate shift . In International conference on machine learning. PMLR, 448\u2013456 . Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In International conference on machine learning. PMLR, 448\u2013456."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 32nd International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol.\u00a037)","author":"Ioffe Sergey","year":"2015","unstructured":"Sergey Ioffe and Christian Szegedy . 2015 . Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift . In Proceedings of the 32nd International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol.\u00a037) , Francis Bach and David Blei (Eds.). PMLR, Lille, France, 448\u2013456. http:\/\/proceedings.mlr.press\/v37\/ioffe15.html Sergey Ioffe and Christian Szegedy. 2015. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. In Proceedings of the 32nd International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol.\u00a037), Francis Bach and David Blei (Eds.). PMLR, Lille, France, 448\u2013456. http:\/\/proceedings.mlr.press\/v37\/ioffe15.html"},{"key":"e_1_3_2_1_33_1","volume-title":"Adam: A Method for Stochastic Optimization. International Conference on Learning Representations (12","author":"Kingma Diederik","year":"2014","unstructured":"Diederik Kingma and Jimmy Ba . 2014 . Adam: A Method for Stochastic Optimization. International Conference on Learning Representations (12 2014). Diederik Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization. International Conference on Learning Representations (12 2014)."},{"key":"e_1_3_2_1_34_1","unstructured":"Alexey Kurakin Ian Goodfellow and Samy Bengio. 2017. Adversarial Machine Learning at Scale. arxiv:1611.01236\u00a0[cs.CV]  Alexey Kurakin Ian Goodfellow and Samy Bengio. 2017. Adversarial Machine Learning at Scale. arxiv:1611.01236\u00a0[cs.CV]"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.84"},{"volume-title":"Artificial intelligence for games","author":"Millington Ian","key":"e_1_3_2_1_36_1","unstructured":"Ian Millington and John Funge . 2009. Artificial intelligence for games . CRC Press . Ian Millington and John Funge. 2009. Artificial intelligence for games. CRC Press."},{"key":"e_1_3_2_1_37_1","unstructured":"Nir Morgulis Alexander Kreines Shachar Mendelowitz and Yuval Weisglass. 2019. Fooling a Real Car with Adversarial Traffic Signs. arxiv:1907.00374\u00a0[cs.CR]  Nir Morgulis Alexander Kreines Shachar Mendelowitz and Yuval Weisglass. 2019. Fooling a Real Car with Adversarial Traffic Signs. arxiv:1907.00374\u00a0[cs.CR]"},{"volume-title":"A BERT-Based Transfer Learning Approach for Hate Speech Detection in Online Social Media","author":"Mozafari Marzieh","key":"e_1_3_2_1_38_1","unstructured":"Marzieh Mozafari , Reza Farahbakhsh , and No\u00ebl Crespi . 2020. A BERT-Based Transfer Learning Approach for Hate Speech Detection in Online Social Media . In Complex Networks and Their Applications VIII, Hocine Cherifi, Sabrina Gaito, Jos\u00e9\u00a0Fernendo Mendes, Esteban Moro, and Luis\u00a0Mateus Rocha (Eds.). Springer International Publishing , Cham , 928\u2013940. Marzieh Mozafari, Reza Farahbakhsh, and No\u00ebl Crespi. 2020. A BERT-Based Transfer Learning Approach for Hate Speech Detection in Online Social Media. In Complex Networks and Their Applications VIII, Hocine Cherifi, Sabrina Gaito, Jos\u00e9\u00a0Fernendo Mendes, Esteban Moro, and Luis\u00a0Mateus Rocha (Eds.). Springer International Publishing, Cham, 928\u2013940."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.614"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"e_1_3_2_1_42_1","unstructured":"Bambang Parmanto Paul\u00a0W Munro and Howard\u00a0R Doyle. 1996. Improving committee diagnosis with resampling techniques. In Advances in neural information processing systems. 882\u2013888.  Bambang Parmanto Paul\u00a0W Munro and Howard\u00a0R Doyle. 1996. Improving committee diagnosis with resampling techniques. In Advances in neural information processing systems. 882\u2013888."},{"volume-title":"Early stopping-but when?In Neural Networks: Tricks of the trade","author":"Prechelt Lutz","key":"e_1_3_2_1_43_1","unstructured":"Lutz Prechelt . 1998. Early stopping-but when?In Neural Networks: Tricks of the trade . Springer , 55\u201369. Lutz Prechelt. 1998. Early stopping-but when?In Neural Networks: Tricks of the trade. Springer, 55\u201369."},{"key":"e_1_3_2_1_44_1","volume-title":"4th International Conference on Learning Representations, ICLR","author":"Radford Alec","year":"2016","unstructured":"Alec Radford , Luke Metz , and Soumith Chintala . 2016. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks . In 4th International Conference on Learning Representations, ICLR 2016 , San Juan, Puerto Rico , May 2-4, 2016, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds .). http:\/\/arxiv.org\/abs\/1511.06434 Alec Radford, Luke Metz, and Soumith Chintala. 2016. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks. In 4th International Conference on Learning Representations, ICLR 2016, San Juan, Puerto Rico, May 2-4, 2016, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.). http:\/\/arxiv.org\/abs\/1511.06434"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0146-664X(72)80017-0"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2015.2416206"},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence, Vol.\u00a032","author":"Ross Andrew","year":"2018","unstructured":"Andrew Ross and Finale Doshi-Velez . 2018 . Improving the adversarial robustness and interpretability of deep neural networks by regularizing their input gradients . In Proceedings of the AAAI Conference on Artificial Intelligence, Vol.\u00a032 . New Orleans, Louisiana, USA. Andrew Ross and Finale Doshi-Velez. 2018. Improving the adversarial robustness and interpretability of deep neural networks by regularizing their input gradients. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol.\u00a032. New Orleans, Louisiana, USA."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2016.2528162"},{"key":"e_1_3_2_1_49_1","volume-title":"Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research 15, 1","author":"Srivastava Nitish","year":"2014","unstructured":"Nitish Srivastava , Geoffrey Hinton , Alex Krizhevsky , Ilya Sutskever , and Ruslan Salakhutdinov . 2014. Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research 15, 1 ( 2014 ), 1929\u20131958. Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research 15, 1 (2014), 1929\u20131958."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01424-7_27"},{"key":"e_1_3_2_1_52_1","unstructured":"Latitude Team. [n.d.]. AI Dungeon: Dragon Model Upgrade. online. https:\/\/aidungeon.medium.com\/ai-dungeon-dragon-model-upgrade-7e8ea579abfe  Latitude Team. [n.d.]. AI Dungeon: Dragon Model Upgrade. online. https:\/\/aidungeon.medium.com\/ai-dungeon-dragon-model-upgrade-7e8ea579abfe"},{"key":"e_1_3_2_1_53_1","unstructured":"Tensorflow. 2019. Recurrent Neural Networks for Drawing Classification. online. https:\/\/github.com\/tensorflow\/docs\/blob\/master\/site\/en\/r1\/tutorials\/sequences\/recurrent_quickdraw.md  Tensorflow. 2019. Recurrent Neural Networks for Drawing Classification. online. https:\/\/github.com\/tensorflow\/docs\/blob\/master\/site\/en\/r1\/tutorials\/sequences\/recurrent_quickdraw.md"},{"key":"e_1_3_2_1_54_1","volume-title":"Autoencoder and Evolutionary Algorithm for Level Generation in Lode Runner. In 2019 IEEE Conference on Games (CoG). 1\u20134. https:\/\/doi.org\/10","author":"Thakkar Sarjak","year":"2019","unstructured":"Sarjak Thakkar , Changxing Cao , Lifan Wang , Tae\u00a0Jong Choi , and Julian Togelius . 2019 . Autoencoder and Evolutionary Algorithm for Level Generation in Lode Runner. In 2019 IEEE Conference on Games (CoG). 1\u20134. https:\/\/doi.org\/10 .1109\/CIG.2019.8848076 Sarjak Thakkar, Changxing Cao, Lifan Wang, Tae\u00a0Jong Choi, and Julian Togelius. 2019. Autoencoder and Evolutionary Algorithm for Level Generation in Lode Runner. In 2019 IEEE Conference on Games (CoG). 1\u20134. https:\/\/doi.org\/10.1109\/CIG.2019.8848076"},{"key":"e_1_3_2_1_55_1","unstructured":"Stanford University. 2016. CS231n Convolutional Neural Networks for Visual Recognition: Transfer Learning. online. http:\/\/cs231n.stanford.edu  Stanford University. 2016. CS231n Convolutional Neural Networks for Visual Recognition: Transfer Learning. online. http:\/\/cs231n.stanford.edu"},{"key":"e_1_3_2_1_56_1","volume-title":"INNk: A Multi-Player Game to Deceive a Neural Network","author":"Villareale Jennifer","year":"1985","unstructured":"Jennifer Villareale , Ana\u00a0 V. Acosta-Ruiz , Samuel\u00a0Adam Arcaro , Thomas Fox , Evan Freed , Robert\u00a0 C. Gray , Mathias L\u00f6we , Panote Nuchprayoon , Aleksanteri Sladek , Rush Weigelt , Yifu Li , Sebastian Risi , and Jichen Zhu . 2020. INNk: A Multi-Player Game to Deceive a Neural Network . Association for Computing Machinery , New York, NY, USA , 33\u201337. https:\/\/doi.org\/10.1145\/3383668.34 1985 8 Jennifer Villareale, Ana\u00a0V. Acosta-Ruiz, Samuel\u00a0Adam Arcaro, Thomas Fox, Evan Freed, Robert\u00a0C. Gray, Mathias L\u00f6we, Panote Nuchprayoon, Aleksanteri Sladek, Rush Weigelt, Yifu Li, Sebastian Risi, and Jichen Zhu. 2020. INNk: A Multi-Player Game to Deceive a Neural Network. Association for Computing Machinery, New York, NY, USA, 33\u201337. https:\/\/doi.org\/10.1145\/3383668.3419858"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3205455.3205517"},{"key":"e_1_3_2_1_58_1","unstructured":"Nick Walton. 2019. AI Dungeon. Website. https:\/\/aidungeon.io\/  Nick Walton. 2019. AI Dungeon. Website. https:\/\/aidungeon.io\/"},{"volume-title":"Strengthening Deep Neural Networks: Making AI Less Susceptible to Adversarial Trickery (1 ed.). O\u2019Reilly Media","author":"Warr Katy","key":"e_1_3_2_1_59_1","unstructured":"Katy Warr . 2019. Strengthening Deep Neural Networks: Making AI Less Susceptible to Adversarial Trickery (1 ed.). O\u2019Reilly Media , Inc . 246 pages. Katy Warr. 2019. Strengthening Deep Neural Networks: Making AI Less Susceptible to Adversarial Trickery (1 ed.). O\u2019Reilly Media, Inc. 246 pages."},{"key":"e_1_3_2_1_60_1","volume-title":"Stacked generalization. Neural networks 5, 2","author":"Wolpert H","year":"1992","unstructured":"David\u00a0 H Wolpert . 1992. Stacked generalization. Neural networks 5, 2 ( 1992 ), 241\u2013259. David\u00a0H Wolpert. 1992. Stacked generalization. Neural networks 5, 2 (1992), 241\u2013259."},{"key":"e_1_3_2_1_61_1","volume-title":"Advances in Neural Information Processing Systems, Z.\u00a0Ghahramani, M.\u00a0Welling, C.\u00a0Cortes, N.\u00a0Lawrence, and K.\u00a0Q. Weinberger(Eds.), Vol.\u00a027. Curran Associates","author":"Yosinski Jason","year":"2014","unstructured":"Jason Yosinski , Jeff Clune , Yoshua Bengio , and Hod Lipson . 2014. How transferable are features in deep neural networks? . In Advances in Neural Information Processing Systems, Z.\u00a0Ghahramani, M.\u00a0Welling, C.\u00a0Cortes, N.\u00a0Lawrence, and K.\u00a0Q. Weinberger(Eds.), Vol.\u00a027. Curran Associates , Inc ., 3320\u20133328. https:\/\/proceedings.neurips.cc\/paper\/ 2014 \/file\/375c71349b295fbe2dcdca9206f20a06-Paper.pdf Jason Yosinski, Jeff Clune, Yoshua Bengio, and Hod Lipson. 2014. How transferable are features in deep neural networks?. In Advances in Neural Information Processing Systems, Z.\u00a0Ghahramani, M.\u00a0Welling, C.\u00a0Cortes, N.\u00a0Lawrence, and K.\u00a0Q. Weinberger(Eds.), Vol.\u00a027. Curran Associates, Inc., 3320\u20133328. https:\/\/proceedings.neurips.cc\/paper\/2014\/file\/375c71349b295fbe2dcdca9206f20a06-Paper.pdf"},{"key":"e_1_3_2_1_62_1","volume-title":"Generative Image Inpainting with Contextual Attention. In 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 5505\u20135514","author":"Yu J.","year":"2018","unstructured":"J. Yu , Z. Lin , J. Yang , X. Shen , X. Lu , and T.\u00a0 S. Huang . 2018 . Generative Image Inpainting with Contextual Attention. In 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 5505\u20135514 . https:\/\/doi.org\/10.1109\/CVPR.2018.00577 J. Yu, Z. Lin, J. Yang, X. Shen, X. Lu, and T.\u00a0S. Huang. 2018. Generative Image Inpainting with Contextual Attention. In 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 5505\u20135514. https:\/\/doi.org\/10.1109\/CVPR.2018.00577"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.4992835"},{"volume-title":"Ensemble methods: foundations and algorithms","author":"Zhou Zhi-Hua","key":"e_1_3_2_1_64_1","unstructured":"Zhi-Hua Zhou . 2012. Ensemble methods: foundations and algorithms . CRC press . Zhi-Hua Zhou. 2012. Ensemble methods: foundations and algorithms. CRC press."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445307"}],"event":{"name":"FDG'21: The 16th International Conference on the Foundations of Digital Games 2021","acronym":"FDG'21","location":"Montreal QC Canada"},"container-title":["The 16th International Conference on the Foundations of Digital Games (FDG) 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472538.3472540","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3472538.3472540","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3472538.3472540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:23Z","timestamp":1750191443000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472538.3472540"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,3]]},"references-count":65,"alternative-id":["10.1145\/3472538.3472540","10.1145\/3472538"],"URL":"https:\/\/doi.org\/10.1145\/3472538.3472540","relation":{},"subject":[],"published":{"date-parts":[[2021,8,3]]}}}