{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:56Z","timestamp":1750220276635,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,11]],"date-time":"2022-02-11T00:00:00Z","timestamp":1644537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,11]]},"DOI":"10.1145\/3488560.3502215","type":"proceedings-article","created":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T21:42:57Z","timestamp":1644961377000},"page":"1559-1560","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Doctoral Consortium of WSDM'22"],"prefix":"10.1145","author":[{"given":"Han","family":"Xu","sequence":"first","affiliation":[{"name":"Michigan State University, East Lansing, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,2,15]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"77","volume-title":"Conference on fairness, accountability and transparency","author":"Buolamwini J.","year":"2018","unstructured":"Buolamwini, J., and Gebru, T. Gender shades: Intersectional accuracy disparities in commercial gender classification. In Conference on fairness, accountability and transparency (2018), pp. 77--91."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_3_1","volume-title":"Certified adversarial robustness via randomized smoothing. arXiv preprint arXiv:1902.02918","author":"Cohen J. M.","year":"2019","unstructured":"Cohen, J. M., Rosenfeld, E., and Kolter, J. Z. Certified adversarial robustness via randomized smoothing. arXiv preprint arXiv:1902.02918 (2019)."},{"key":"e_1_3_2_1_4_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow I. J.","year":"2014","unstructured":"Goodfellow, I. J., Shlens, J., and Szegedy, C. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_5_1","first-page":"9","article-title":"Learning from imbalanced data","volume":"21","author":"He H.","year":"2009","unstructured":"He, H., and Garcia, E. A. Learning from imbalanced data. IEEE Transactions on knowledge and data engineering 21, 9 (2009), 1263--1284.","journal-title":"IEEE Transactions on knowledge and data engineering"},{"key":"e_1_3_2_1_6_1","volume-title":"Adversarial attacks and defenses on graphs: A review and empirical study. arXiv preprint arXiv:2003.00653","author":"Jin W.","year":"2020","unstructured":"Jin, W., Li, Y., Xu, H., Wang, Y., and Tang, J. Adversarial attacks and defenses on graphs: A review and empirical study. arXiv preprint arXiv:2003.00653 (2020)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"e_1_3_2_1_8_1","volume-title":"Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083","author":"Madry A.","year":"2017","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., and Vladu, A. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)."},{"key":"e_1_3_2_1_9_1","volume-title":"Fairness through robustness: Investigating robustness disparity in deep learning. arXiv preprint arXiv:2006.12621","author":"Nanda V.","year":"2020","unstructured":"Nanda, V., Dooley, S., Singla, S., Feizi, S., and Dickerson, J. P. Fairness through robustness: Investigating robustness disparity in deep learning. arXiv preprint arXiv:2006.12621 (2020)."},{"key":"e_1_3_2_1_10_1","first-page":"3358","volume-title":"Adversarial training for free! In Advances in Neural Information Processing Systems","author":"Shafahi A.","year":"2019","unstructured":"Shafahi, A., Najibi, M., Ghiasi, M. A., Xu, Z., Dickerson, J., Studer, C., Davis, L. S., Taylor, G., and Goldstein, T. Adversarial training for free! In Advances in Neural Information Processing Systems (2019), pp. 3358--3369."},{"key":"e_1_3_2_1_11_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy C.","year":"2013","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., and Fergus, R. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)."},{"key":"e_1_3_2_1_12_1","first-page":"7029","volume-title":"Advances in Neural Information Processing Systems","author":"Wang Y.-X.","year":"2017","unstructured":"Wang, Y.-X., Ramanan, D., and Hebert, M. Learning to model the tail. In Advances in Neural Information Processing Systems (2017), pp. 7029--7039."},{"key":"e_1_3_2_1_13_1","first-page":"5286","volume-title":"International Conference on Machine Learning","author":"Wong E.","year":"2018","unstructured":"Wong, E., and Kolter, Z. Provable defenses against adversarial examples via the convex outer adversarial polytope. In International Conference on Machine Learning (2018), PMLR, pp. 5286--5295."},{"key":"e_1_3_2_1_14_1","volume-title":"Adversarial attacks and defenses in images, graphs and text: A review. arXiv preprint arXiv:1909.08072","author":"Xu H.","year":"2019","unstructured":"Xu, H., Ma, Y., Liu, H., Deb, D., Liu, H., Tang, J., and Jain, A. Adversarial attacks and defenses in images, graphs and text: A review. arXiv preprint arXiv:1909.08072 (2019)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052660"},{"key":"e_1_3_2_1_16_1","volume-title":"You only propagate once: Painless adversarial training using maximal principle. arXiv preprint arXiv:1905.00877 2, 3","author":"Zhang D.","year":"2019","unstructured":"Zhang, D., Zhang, T., Lu, Y., Zhu, Z., and Dong, B. You only propagate once: Painless adversarial training using maximal principle. arXiv preprint arXiv:1905.00877 2, 3 (2019)."},{"key":"e_1_3_2_1_17_1","volume-title":"Theoretically principled trade-off between robustness and accuracy. arXiv preprint arXiv:1901.08573","author":"Zhang H.","year":"2019","unstructured":"Zhang, H., Yu, Y., Jiao, J., Xing, E. P., Ghaoui, L. E., and Jordan, M. I. Theoretically principled trade-off between robustness and accuracy. arXiv preprint arXiv:1901.08573 (2019)."}],"event":{"name":"WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Virtual Event AZ USA","acronym":"WSDM '22"},"container-title":["Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488560.3502215","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488560.3502215","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:12Z","timestamp":1750188672000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488560.3502215"}},"subtitle":["Exploring the Bias of Adversarial Defenses"],"short-title":[],"issued":{"date-parts":[[2022,2,11]]},"references-count":17,"alternative-id":["10.1145\/3488560.3502215","10.1145\/3488560"],"URL":"https:\/\/doi.org\/10.1145\/3488560.3502215","relation":{},"subject":[],"published":{"date-parts":[[2022,2,11]]},"assertion":[{"value":"2022-02-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}