{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:38Z","timestamp":1750219778887,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,8]],"date-time":"2023-08-08T00:00:00Z","timestamp":1691452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,8]]},"DOI":"10.1145\/3600211.3604704","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T18:41:37Z","timestamp":1693334497000},"page":"432-442","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive Adversarial Training Does Not Increase Recourse Costs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7812-8958","authenticated-orcid":false,"given":"Ian","family":"Hardy","sequence":"first","affiliation":[{"name":"University of California, Santa Cruz, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9204-3889","authenticated-orcid":false,"given":"Jayanth","family":"Yetukuri","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8420-6011","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","unstructured":"Tao Bai Jinqi Luo Jun Zhao Bihan Wen and Qian Wang. 2021. Recent Advances in Adversarial Training for Adversarial Robustness. https:\/\/doi.org\/10.48550\/ARXIV.2102.01356","DOI":"10.48550\/ARXIV.2102.01356"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"Yogesh Balaji Tom Goldstein and Judy Hoffman. 2019. Instance adaptive adversarial training: Improved accuracy tradeoffs in neural nets. https:\/\/doi.org\/10.48550\/ARXIV.1910.08051","DOI":"10.48550\/ARXIV.1910.08051"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Vincent Ballet Xavier Renard Jonathan Aigrain Thibault Laugel Pascal Frossard and Marcin Detyniecki. 2019. Imperceptible Adversarial Attacks on Tabular Data. https:\/\/doi.org\/10.48550\/ARXIV.1911.03274","DOI":"10.48550\/ARXIV.1911.03274"},{"key":"e_1_3_2_1_4_1","volume-title":"Semantics and explanation: why counterfactual explanations produce adversarial examples in deep neural networks. arXiv preprint arXiv:2012.10076","author":"Browne Kieran","year":"2020","unstructured":"Kieran Browne and Ben Swift. 2020. Semantics and explanation: why counterfactual explanations produce adversarial examples in deep neural networks. arXiv preprint arXiv:2012.10076 (2020)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"Anirban Chakraborty Manaar Alam Vishal Dey Anupam Chattopadhyay and Debdeep Mukhopadhyay. 2018. Adversarial Attacks and Defences: A Survey. https:\/\/doi.org\/10.48550\/ARXIV.1810.00069","DOI":"10.48550\/ARXIV.1810.00069"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2002.06789"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11167274"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1812.02637"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11023-021-09580-9"},{"key":"e_1_3_2_1_10_1","volume-title":"Explaining and Harnessing Adversarial Examples. CoRR abs\/1412.6572","author":"Goodfellow J.","year":"2015","unstructured":"Ian\u00a0J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. CoRR abs\/1412.6572 (2015)."},{"key":"e_1_3_2_1_11_1","volume-title":"Algorithmic Recourse: from Counterfactual Explanations to Interventions. CoRR abs\/2002.06278","author":"Karimi Amir-Hossein","year":"2020","unstructured":"Amir-Hossein Karimi, Bernhard Sch\u00f6lkopf, and Isabel Valera. 2020. Algorithmic Recourse: from Counterfactual Explanations to Interventions. CoRR abs\/2002.06278 (2020). arXiv:2002.06278https:\/\/arxiv.org\/abs\/2002.06278"},{"key":"e_1_3_2_1_12_1","volume-title":"A survey of algorithmic recourse: definitions, formulations, solutions, and prospects. ArXiv abs\/2010.04050","author":"Karimi Amir-Hossein","year":"2020","unstructured":"Amir-Hossein Karimi, Gilles Barthe, Bernhard Sch\u00f6lkopf, and Isabel Valera. 2020. A survey of algorithmic recourse: definitions, formulations, solutions, and prospects. ArXiv abs\/2010.04050 (2020)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3527848"},{"key":"e_1_3_2_1_14_1","unstructured":"Satyapriya Krishna Chirag Agarwal and Himabindu Lakkaraju. 2023. On the Impact of Adversarially Robust Models on Algorithmic Recourse. https:\/\/openreview.net\/forum?id=BGId14emsBj"},{"key":"e_1_3_2_1_15_1","volume-title":"Inverse Classification for Comparison-based Interpretability in Machine Learning. ArXiv abs\/1712.08443","author":"Laugel Thibault","year":"2017","unstructured":"Thibault Laugel, Marie-Jeanne Lesot, Christophe Marsala, X. Renard, and Marcin Detyniecki. 2017. Inverse Classification for Comparison-based Interpretability in Machine Learning. ArXiv abs\/1712.08443 (2017)."},{"key":"e_1_3_2_1_16_1","volume-title":"Towards Deep Learning Models Resistant to Adversarial Attacks. ArXiv abs\/1706.06083","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. ArXiv abs\/1706.06083 (2018)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","unstructured":"Martin Pawelczyk Chirag Agarwal Shalmali Joshi Sohini Upadhyay and Himabindu Lakkaraju. 2021. Exploring Counterfactual Explanations Through the Lens of Adversarial Examples: A Theoretical and Empirical Analysis. https:\/\/doi.org\/10.48550\/ARXIV.2106.09992","DOI":"10.48550\/ARXIV.2106.09992"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2108.00783"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380087"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-021-04148-9"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3051315"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","unstructured":"Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian Goodfellow and Rob Fergus. 2013. Intriguing properties of neural networks. https:\/\/doi.org\/10.48550\/ARXIV.1312.6199","DOI":"10.48550\/ARXIV.1312.6199"},{"key":"e_1_3_2_1_23_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287566"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372876"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","unstructured":"Sahil Verma Varich Boonsanong Minh Hoang Keegan\u00a0E. Hines John\u00a0P. Dickerson and Chirag Shah. 2020. Counterfactual Explanations and Algorithmic Recourses for Machine Learning: A Review. https:\/\/doi.org\/10.48550\/ARXIV.2010.10596","DOI":"10.48550\/ARXIV.2010.10596"},{"key":"e_1_3_2_1_27_1","volume-title":"Counterfactual Explanations Without Opening the Black Box: Automated Decisions and the GDPR. Cybersecurity","author":"Wachter Sandra","year":"2017","unstructured":"Sandra Wachter, Brent\u00a0Daniel Mittelstadt, and Chris Russell. 2017. Counterfactual Explanations Without Opening the Black Box: Automated Decisions and the GDPR. Cybersecurity (2017)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","unstructured":"Hongyang Zhang Yaodong Yu Jiantao Jiao Eric\u00a0P. Xing Laurent\u00a0El Ghaoui and Michael\u00a0I. Jordan. 2019. Theoretically Principled Trade-off between Robustness and Accuracy. https:\/\/doi.org\/10.48550\/ARXIV.1901.08573","DOI":"10.48550\/ARXIV.1901.08573"},{"key":"e_1_3_2_1_29_1","volume-title":"Theoretically Principled Trade-off between Robustness and Accuracy. CoRR abs\/1901.08573","author":"Zhang Hongyang","year":"2019","unstructured":"Hongyang Zhang, Yaodong Yu, Jiantao Jiao, Eric\u00a0P. Xing, Laurent\u00a0El Ghaoui, and Michael\u00a0I. Jordan. 2019. Theoretically Principled Trade-off between Robustness and Accuracy. CoRR abs\/1901.08573 (2019). arXiv:1901.08573http:\/\/arxiv.org\/abs\/1901.08573"}],"event":{"name":"AIES '23: AAAI\/ACM Conference on AI, Ethics, and Society","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence"],"location":"Montr\u00e9al QC Canada","acronym":"AIES '23"},"container-title":["Proceedings of the 2023 AAAI\/ACM Conference on AI, Ethics, and Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600211.3604704","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600211.3604704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:39Z","timestamp":1750178259000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600211.3604704"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,8]]},"references-count":29,"alternative-id":["10.1145\/3600211.3604704","10.1145\/3600211"],"URL":"https:\/\/doi.org\/10.1145\/3600211.3604704","relation":{},"subject":[],"published":{"date-parts":[[2023,8,8]]},"assertion":[{"value":"2023-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}