{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T11:44:56Z","timestamp":1775043896510,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","funder":[{"name":"Natural Sciences and Engineering Research Council of Canada (NSERC) Discovery Grant","award":["#RGPIN-2020-03966"],"award-info":[{"award-number":["#RGPIN-2020-03966"]}]},{"name":"Canada Foundation for Innovation (CFI) John R. Evans Leaders Fund (JELF)","award":["#42371"],"award-info":[{"award-number":["#42371"]}]},{"name":"University of Waterloo Interdisciplinary Trailblazer Grant","award":["2022"],"award-info":[{"award-number":["2022"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,5,26]]},"DOI":"10.1145\/3769872.3769899","type":"proceedings-article","created":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T09:46:18Z","timestamp":1775036778000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploring Comparative Visual Approaches for Understanding Model Trade-offs in Adversarial Machine Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-7830-4239","authenticated-orcid":false,"given":"Yuzhe","family":"You","sequence":"first","affiliation":[{"name":"School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5008-4319","authenticated-orcid":false,"given":"Jian","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada"}]}],"member":"320","published-online":{"date-parts":[[2026,4]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","unstructured":"Danielle Albers Colin Dewey and Michael Gleicher. 2011. Sequence surveyor: Leveraging overview for scalable genomic alignment visualization. IEEE transactions on visualization and computer graphics 17 12 (2011) 2392\u20132401. 10.1109\/TVCG.2011.232","DOI":"10.1109\/TVCG.2011.232"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i6.20545"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470724"},{"key":"e_1_3_3_2_5_2","volume-title":"Workshop on Adversarial Machine Learning in Real-World Computer Vision Systems and Online Challenges","author":"Benz Philipp","year":"2021","unstructured":"Philipp Benz, Chaoning Zhang, Soomin Ham, Adil Karjauv, Gyusang Cho, and In\u00a0So Kweon. 2021. Trade-off between accuracy, robustness, and fairness of deep classifiers. In Workshop on Adversarial Machine Learning in Real-World Computer Vision Systems and Online Challenges."},{"key":"e_1_3_3_2_6_2","first-page":"325","volume-title":"NeurIPS 2020 Workshop on Pre-registration in Machine Learning","author":"Benz Philipp","year":"2021","unstructured":"Philipp Benz, Chaoning Zhang, Adil Karjauv, and In\u00a0So Kweon. 2021. Robustness may be at odds with fairness: An empirical study on class-wise accuracy. In NeurIPS 2020 Workshop on Pre-registration in Machine Learning. PMLR, 325\u2013342. https:\/\/proceedings.mlr.press\/v148\/benz21a.html"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24595-710"},{"key":"e_1_3_3_2_8_2","first-page":"831","volume-title":"International Conference on Machine Learning","author":"Bubeck S\u00e9bastien","year":"2019","unstructured":"S\u00e9bastien Bubeck, Yin\u00a0Tat Lee, Eric Price, and Ilya Razenshteyn. 2019. Adversarial examples from computational constraints. In International Conference on Machine Learning. PMLR, 831\u2013840. https:\/\/proceedings.mlr.press\/v97\/bubeck19a"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","unstructured":"Kelei Cao Mengchen Liu Hang Su Jing Wu Jun Zhu and Shixia Liu. 2020. Analyzing the noise robustness of deep neural networks. IEEE transactions on visualization and computer graphics 27 7 (2020) 3289\u20133304. 10.1109\/TVCG.2020.2969185","DOI":"10.1109\/TVCG.2020.2969185"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00031"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00045"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","unstructured":"Michael Correll Adam\u00a0L Bailey Alper Sarikaya David\u00a0H O\u2019Connor and Michael Gleicher. 2015. LayerCake: a tool for the visual comparison of viral deep sequencing data. Bioinformatics 31 21 (2015) 3522\u20133528. 10.1093\/bioinformatics\/btv407","DOI":"10.1093\/bioinformatics\/btv407"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","unstructured":"Pier\u00a0Francesco Cortese Giuseppe Di\u00a0Battista Antonello Moneta Maurizio Patrignani and Maurizio Pizzonia. 2006. Topographic visualization of prefix propagation in the internet. IEEE transactions on visualization and computer graphics 12 5 (2006) 725\u2013732. 10.1109\/TVCG.2006.185","DOI":"10.1109\/TVCG.2006.185"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","unstructured":"Francesco Croce Maksym Andriushchenko Vikash Sehwag Edoardo Debenedetti Nicolas Flammarion Mung Chiang Prateek Mittal and Matthias Hein. 2020. Robustbench: a standardized adversarial robustness benchmark. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2010.09670 (2020). 10.48550\/arXiv.2010.09670","DOI":"10.48550\/arXiv.2010.09670"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","unstructured":"Aaron\u00a0CE Darling Bob Mau Frederick\u00a0R Blattner and Nicole\u00a0T Perna. 2004. Mauve: multiple alignment of conserved genomic sequence with rearrangements. Genome research 14 7 (2004) 1394\u20131403. 10.1101\/gr.2289704","DOI":"10.1101\/gr.2289704"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/VIS47514.2020.00061"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","unstructured":"Mark\u00a0C Detweiler. 1991. Envisioning Information. Cartographic Perspectives10 (1991) 22\u201324. 10.14714\/CP10.1055","DOI":"10.14714\/CP10.1055"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","unstructured":"Andre Esteva Brett Kuprel Roberto\u00a0A Novoa Justin Ko Susan\u00a0M Swetter Helen\u00a0M Blau and Sebastian Thrun. 2017. Dermatologist-level classification of skin cancer with deep neural networks. nature 542 7639 (2017) 115\u2013118. 10.1038\/nature21056","DOI":"10.1038\/nature21056"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","unstructured":"Takanori Fujiwara Xinhai Wei Jian Zhao and Kwan-Liu Ma. 2021. Interactive dimensionality reduction for comparative analysis. IEEE Transactions on Visualization and Computer Graphics 28 1 (2021) 758\u2013768. 10.1109\/TVCG.2021.3114807","DOI":"10.1109\/TVCG.2021.3114807"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/VAST50239.2020.00010"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","unstructured":"Justin Gilmer Luke Metz Fartash Faghri Samuel\u00a0S Schoenholz Maithra Raghu Martin Wattenberg and Ian Goodfellow. 2018. Adversarial spheres. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1801.02774 (2018). 10.48550\/arXiv.1801.02774","DOI":"10.48550\/arXiv.1801.02774"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","unstructured":"Michael Gleicher. 2017. Considerations for visualizing comparison. IEEE transactions on visualization and computer graphics 24 1 (2017) 413\u2013423. 10.1109\/TVCG.2017.2744199","DOI":"10.1109\/TVCG.2017.2744199"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","unstructured":"Michael Gleicher Danielle Albers Rick Walker Ilir Jusufi Charles\u00a0D Hansen and Jonathan\u00a0C Roberts. 2011. Visual comparison for information visualization. Information Visualization 10 4 (2011) 289\u2013309. 10.1177\/1473871611416549","DOI":"10.1177\/1473871611416549"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","unstructured":"Ian\u00a0J Goodfellow Jonathon Shlens and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1412.6572 (2014). 10.48550\/arXiv.1412.6572","DOI":"10.48550\/arXiv.1412.6572"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","unstructured":"Liang Gou Lincan Zou Nanxiang Li Michael Hofmann Arvind\u00a0Kumar Shekar Axel Wendt and Liu Ren. 2020. VATLD: A visual analytics system to assess understand and improve traffic light detection. IEEE transactions on visualization and computer graphics 27 2 (2020) 261\u2013271. 10.1109\/TVCG.2020.3030350","DOI":"10.1109\/TVCG.2020.3030350"},{"key":"e_1_3_3_2_27_2","first-page":"2484","volume-title":"International Conference on Machine Learning","author":"Guo Chuan","year":"2019","unstructured":"Chuan Guo, Jacob Gardner, Yurong You, Andrew\u00a0Gordon Wilson, and Kilian Weinberger. 2019. Simple black-box adversarial attacks. In International Conference on Machine Learning. PMLR, 2484\u20132493."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","unstructured":"Guodong Guo and Na Zhang. 2019. A survey on deep learning based face recognition. Computer vision and image understanding 189 (2019) 102805. 10.1016\/j.cviu.2019.102805","DOI":"10.1016\/j.cviu.2019.102805"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_3_2_31_2","first-page":"13679","volume-title":"International Conference on Machine Learning","author":"Hu Yuzheng","year":"2023","unstructured":"Yuzheng Hu, Fan Wu, Hongyang Zhang, and Han Zhao. 2023. Understanding the Impact of Adversarial Robustness on Accuracy Disparity. In International Conference on Machine Learning. PMLR, 13679\u201313709. https:\/\/proceedings.mlr.press\/v202\/hu23j.html"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","unstructured":"Yansong Huang Zherui Zhang Ao Jiao Yuxin Ma and Ran Cheng. 2023. A Comparative Visual Analytics Framework for Evaluating Evolutionary Processes in Multi-objective Optimization. IEEE Transactions on Visualization and Computer Graphics (2023). 10.1109\/TVCG.2023.3326921","DOI":"10.1109\/TVCG.2023.3326921"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","unstructured":"Hyoeun Kang Howon Kim et\u00a0al. 2021. Robust adversarial attack against explainable deep classification models based on adversarial images with different patch sizes and perturbation ratios. IEEE Access 9 (2021) 133049\u2013133061. 10.1109\/ACCESS.2021.3115764","DOI":"10.1109\/ACCESS.2021.3115764"},{"key":"e_1_3_3_2_34_2","unstructured":"Alex Krizhevsky Geoffrey Hinton et\u00a0al. 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey\u00a0E Hinton. 2017. ImageNet classification with deep convolutional neural networks. Commun. ACM 60 6 (2017) 84\u201390. 10.1145\/3065386","DOI":"10.1145\/3065386"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","unstructured":"Sampo Kuutti Richard Bowden Yaochu Jin Phil Barber and Saber Fallah. 2020. A survey of deep learning applications to autonomous vehicle control. IEEE Transactions on Intelligent Transportation Systems 22 2 (2020) 712\u2013733. 10.1109\/TITS.2019.2962338","DOI":"10.1109\/TITS.2019.2962338"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"crossref","unstructured":"Yann LeCun Yoshua Bengio and Geoffrey Hinton. 2015. Deep learning. nature 521 7553 (2015) 436\u2013444.","DOI":"10.1038\/nature14539"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","unstructured":"Lauro Lins James\u00a0T Klosowski and Carlos Scheidegger. 2013. Nanocubes for real-time exploration of spatiotemporal datasets. IEEE Transactions on Visualization and Computer Graphics 19 12 (2013) 2456\u20132465. 10.1109\/TVCG.2013.179","DOI":"10.1109\/TVCG.2013.179"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","unstructured":"Yanpei Liu Xinyun Chen Chang Liu and Dawn Song. 2016. Delving into transferable adversarial examples and black-box attacks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1611.02770 (2016). 10.48550\/arXiv.1611.02770","DOI":"10.48550\/arXiv.1611.02770"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","unstructured":"Yuxin Ma Tiankai Xie Jundong Li and Ross Maciejewski. 2019. Explaining vulnerabilities to adversarial machine learning through visual analytics. IEEE transactions on visualization and computer graphics 26 1 (2019) 1075\u20131085. 10.1109\/TVCG.2019.2934631","DOI":"10.1109\/TVCG.2019.2934631"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","unstructured":"Aleksander Madry Aleksandar Makelov Ludwig Schmidt Dimitris Tsipras and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1706.06083 (2017). 10.48550\/arXiv.1706.06083","DOI":"10.48550\/arXiv.1706.06083"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","unstructured":"Jian-Xun Mi Xu-Dong Wang Li-Fang Zhou and Kun Cheng. 2023. Adversarial examples based on object detection tasks: A survey. Neurocomputing 519 (2023) 114\u2013126. 10.1016\/j.neucom.2022.10.046","DOI":"10.1016\/j.neucom.2022.10.046"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1201\/b17511"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2017.8062202"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","unstructured":"Karl Pearson. 1901. LIII. On lines and planes of closest fit to systems of points in space. The London Edinburgh and Dublin philosophical magazine and journal of science 2 11 (1901) 559\u2013572. 10.1080\/14786440109462720","DOI":"10.1080\/14786440109462720"},{"key":"e_1_3_3_2_48_2","unstructured":"Chongli Qin James Martens Sven Gowal Dilip Krishnan Krishnamurthy Dvijotham Alhussein Fawzi Soham De Robert Stanforth and Pushmeet Kohli. 2019. Adversarial robustness through local linearization. Advances in Neural Information Processing Systems 32 (2019). https:\/\/proceedings.neurips.cc\/paper\/2019\/hash\/0defd533d51ed0a10c5c9dbf93ee78a5-Abstract.html"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","unstructured":"Aditi Raghunathan Sang\u00a0Michael Xie Fanny Yang John Duchi and Percy Liang. 2020. Understanding and mitigating the tradeoff between robustness and accuracy. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2002.10716 (2020). 10.48550\/arXiv.2002.10716","DOI":"10.48550\/arXiv.2002.10716"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","unstructured":"Aditi Raghunathan Sang\u00a0Michael Xie Fanny Yang John\u00a0C Duchi and Percy Liang. 2019. Adversarial training can hurt generalization. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1906.06032 (2019). 10.48550\/arXiv.1906.06032","DOI":"10.48550\/arXiv.1906.06032"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","unstructured":"Natascha Sauber Holger Theisel and Hans-Peter Seidel. 2006. Multifield-graphs: An approach to visualizing correlations in multifield scalar data. IEEE Transactions on Visualization and Computer Graphics 12 5 (2006) 917\u2013924. 10.1109\/TVCG.2006.165","DOI":"10.1109\/TVCG.2006.165"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"e_1_3_3_2_53_2","unstructured":"Ali Shafahi Mahyar Najibi Mohammad\u00a0Amin Ghiasi Zheng Xu John Dickerson Christoph Studer Larry\u00a0S Davis Gavin Taylor and Tom Goldstein. 2019. Adversarial training for free! Advances in Neural Information Processing Systems 32 (2019). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2019\/hash\/7503cfacd12053d309b6bed5c89de212-Abstract.html"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.14418"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","unstructured":"J. Stallkamp M. Schlipsing J. Salmen and C. Igel. 2012. Man vs. computer: Benchmarking machine learning algorithms for traffic sign recognition. Neural Networks0 (2012) \u2013. 10.1016\/j.neunet.2012.02.016","DOI":"10.1016\/j.neunet.2012.02.016"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"publisher","unstructured":"Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian Goodfellow and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1312.6199 (2013). 10.48550\/arXiv.1312.6199","DOI":"10.48550\/arXiv.1312.6199"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"publisher","unstructured":"Christian Tominski Camilla Forsell and Jimmy Johansson. 2012. Interaction support for visual comparison inspired by natural behavior. IEEE Transactions on visualization and computer graphics 18 12 (2012) 2719\u20132728. 10.1109\/TVCG.2012.237","DOI":"10.1109\/TVCG.2012.237"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","unstructured":"Philipp Tschandl. 2018. The HAM10000 dataset a large collection of multi-source dermatoscopic images of common pigmented skin lesions. 10.7910\/DVN\/DBW86T","DOI":"10.7910\/DVN\/DBW86T"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","unstructured":"Dimitris Tsipras Shibani Santurkar Logan Engstrom Alexander Turner and Aleksander Madry. 2018. Robustness may be at odds with accuracy. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1805.12152 (2018). 10.48550\/arXiv.1805.12152","DOI":"10.48550\/arXiv.1805.12152"},{"key":"e_1_3_3_2_61_2","unstructured":"Laurens Van\u00a0der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research 9 11 (2008). https:\/\/jmlr.org\/papers\/v9\/vandermaaten08a.html"},{"key":"e_1_3_3_2_62_2","unstructured":"Dongxian Wu Shu-Tao Xia and Yisen Wang. 2020. Adversarial weight perturbation helps robust generalization. Advances in Neural Information Processing Systems 33 (2020) 2958\u20132969. https:\/\/proceedings.neurips.cc\/paper\/2020\/hash\/1ef91c212e30e14bf125e9374262401f-Abstract.html?ref=https:\/\/githubhelp.com"},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.153"},{"key":"e_1_3_3_2_64_2","first-page":"11492","volume-title":"International conference on machine learning","author":"Xu Han","year":"2021","unstructured":"Han Xu, Xiaorui Liu, Yaxin Li, Anil Jain, and Jiliang Tang. 2021. To be robust or to be fair: Towards fairness in adversarial training. In International conference on machine learning. PMLR, 11492\u201311501. https:\/\/proceedings.mlr.press\/v139\/xu21b.html"},{"key":"e_1_3_3_2_65_2","unstructured":"Yao-Yuan Yang Cyrus Rashtchian Hongyang Zhang Russ\u00a0R Salakhutdinov and Kamalika Chaudhuri. 2020. A closer look at accuracy vs. robustness. Advances in neural information processing systems 33 (2020) 8588\u20138601. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2020\/hash\/61d77652c97ef636343742fc3dcf3ba9-Abstract.html"},{"key":"e_1_3_3_2_66_2","first-page":"7472","volume-title":"International conference on machine learning","author":"Zhang Hongyang","year":"2019","unstructured":"Hongyang Zhang, Yaodong Yu, Jiantao Jiao, Eric Xing, Laurent El\u00a0Ghaoui, and Michael Jordan. 2019. Theoretically principled trade-off between robustness and accuracy. In International conference on machine learning. PMLR, 7472\u20137482. https:\/\/proceedings.mlr.press\/v97\/zhang19p.html"},{"key":"e_1_3_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86137-7_19"},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33012253"},{"key":"e_1_3_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01482"}],"event":{"name":"GI '25: Graphics Interface 2025","location":"Okanagan BC Canada","acronym":"GI '25"},"container-title":["Proceedings of the 51st Graphics Interface Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3769872.3769899","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T10:13:17Z","timestamp":1775038397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3769872.3769899"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,26]]},"references-count":68,"alternative-id":["10.1145\/3769872.3769899","10.1145\/3769872"],"URL":"https:\/\/doi.org\/10.1145\/3769872.3769899","relation":{},"subject":[],"published":{"date-parts":[[2025,5,26]]},"assertion":[{"value":"2026-04-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}