{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T18:37:10Z","timestamp":1768502230679,"version":"3.49.0"},"reference-count":32,"publisher":"China Science Publishing & Media Ltd.","issue":"4","content-domain":{"domain":["engine.scichina.com"],"crossmark-restriction":false},"short-container-title":["DI"],"published-print":{"date-parts":[[2025,12,1]]},"DOI":"10.3724\/2096-7004.di.2025.0190","type":"journal-article","created":{"date-parts":[[2026,1,4]],"date-time":"2026-01-04T03:35:54Z","timestamp":1767497754000},"page":"1169-1191","update-policy":"https:\/\/doi.org\/10.1360\/scp-crossmark-policy-page","source":"Crossref","is-referenced-by-count":0,"title":["Progressive Adversarial Contrastive Learning: Towards Efficient Data Augmentation in Adversarial Defense"],"prefix":"10.3724","volume":"7","author":[{"given":"Xiang","family":"Gao","sequence":"first","affiliation":[]},{"given":"Weiqing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Lican","family":"Dai","sequence":"additional","affiliation":[]}],"member":"2026","published-online":{"date-parts":[[2026,1,4]]},"reference":[{"key":"","unstructured":"Rabunal J. R. and Dorado J., Artificial neural networks in real-life applications. IGI Global, 2006."},{"key":"","unstructured":"Wang X. and Wang C., \u201cA resource allocation method using federated deep reinforcement learning in vehicular networks,\u201d Telecommunication Engineering, 2024."},{"key":"","unstructured":"Wang Y., Hu Z., Tu X., Jianhua L., Tao J., Jiangjun X., Zihao Y., and Jinhua D., \u201cFacial feature point stability detection based on improved sbr algorithm,\u201d Telecommunication Engineering, 2023."},{"key":"","unstructured":"Yu B., Wenkai C., Baorong X., Lei Z., Lianyu Z., and Wentao M., \u201cInfrared ship detection by combining target extraction and deep learning,\u201d Telecommunication Engineering, 2023."},{"key":"","unstructured":"Szegedy C., Zaremba W., Sutskever I., Bruna J., Erhan D., Goodfellow I., and Fergus R., \u201cIntriguing properties of neural networks,\u201d arXiv: 1312.6199, 2013."},{"key":"","unstructured":"Goodfellow I. J., Shlens J., and Szegedy C., \u201cExplaining and harnessing adversarial examples,\u201d arXiv: 1412.6572, 2014."},{"key":"","unstructured":"Wang J., Wang C., Lin Q., Luo C., Wu C., and Li J., \u201cAdversarial attacks and defenses in deep learning for image recognition: A survey,\u201d Neurocomputing, 2022."},{"key":"","unstructured":"Ren K., Zheng T., Qin Z., and Liu X., \u201cAdversarial attacks and defenses in deep learning,\u201d Engineering, vol. 6, no. 3, pp. 346-360, 2020."},{"key":"","unstructured":"Kim M., Tack J., and Hwang S. J., \u201cAdversarial self-supervised contrastive learning,\u201d Advances in Neural Information Processing Systems, vol. 33, pp. 2983-2994, 2020."},{"key":"","unstructured":"Madry A., Makelov A., Schmidt L., Tsipras D., and Vladu A., \u201cTowards deep learning models resistant to adversarial attacks,\u201d arXiv: 1706.06083, 2017."},{"key":"","unstructured":"Zhang H., Yu Y., Jiao J., Xing E., El Ghaoui L., and Jordan M., \u201cTheoretically principled trade-off between robustness and accuracy,\u201d in International conference on machine learning. PMLR, 2019, pp. 7472-7482."},{"key":"","unstructured":"Wu Z., Xiong Y., Yu S. X., and Lin D., \u201cUnsupervised feature learning via nonparametric instance discrimination,\u201d in Proceedings of the IEEE conference on computer vision and pattern recognition, 2018, pp. 3733-3742."},{"key":"","unstructured":"Ye M., Zhang X., Yuen P. C., and Chang S.-F., \u201cUnsupervised embedding learning via invariant and spreading instance feature,\u201d in Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 6210-6219."},{"key":"","unstructured":"Tian Y., Krishnan D., and Isola P., \u201cContrastive multiview coding,\u201d in Computer Vision-ECCV 2020: 16 th  European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part XI16. Springer, 2020, pp. 776-794."},{"key":"","unstructured":"He K., Fan H., Wu Y., Xie S., and Girshick R., \u201cMomentum contrast for unsupervised visual representation learning,\u201d in Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, 2020, pp. 9729-9738."},{"key":"","unstructured":"Chen T., Kornblith S., Norouzi M., and Hinton G., \u201cA simple framework for contrastive learning of visual representations,\u201d in International conference on machine learning. PMLR, 2020, pp. 1597-1607."},{"key":"","unstructured":"Shafahi A., Najibi M., Ghiasi M. A., Xu Z., Dickerson J., Studer C., Davis L. S., Taylor G., and Goldstein T., \u201cAdversarial training for free!\u201d Advances in Neural Information Processing Systems, vol. 32, 2019."},{"key":"","unstructured":"Zhang D., Zhang T., Lu Y., Zhu Z., and Dong B., \u201cYou only propagate once: Accelerating adversarial training via maximal principle,\u201d Advances in Neural Information Processing Systems, vol. 32, 2019."},{"key":"","unstructured":"Kumari N., Singh M., Sinha A., Machiraju H., Krishnamurthy B., and Balasubramanian V. N., \u201cHarnessing the vulnerability of latent layers in adversarially trained models,\u201d in Proceedings of the 28 th  International Joint Conference on Artificial Intelligence, 2019, pp. 2779-2785."},{"key":"","unstructured":"Wong E., Rice L., and Kolter J. Z., \u201cFast is better than free: Revisiting adversarial training,\u201d in International Conference on Learning Representations, 2019."},{"key":"","unstructured":"Chen J., Cheng Y., Gan Z., Gu Q., and Liu J., \u201cEfficient robust training via backward smoothing,\u201d in Proceedings of the AAAI Conference on Artificial Intelligence, vol. 36, 2022, pp. 6222-6230."},{"key":"","unstructured":"Huang Z., Fan Y., Liu C., Zhang W., Zhang Y., Salzmann M., S\u00fcsstrunk S., and Wang J., \u201cFast adversarial training with adaptive step size,\u201d arXiv: 2206.02417, 2022."},{"key":"","unstructured":"Balaji Y., Goldstein T., and Hoffman J., \u201cInstance adaptive adversarial training: Improved accuracy tradeoffs in neural nets,\u201d arXiv: 1910.08051, 2019."},{"key":"","unstructured":"Cai Q.-Z., Du M., Liu C., and Song D., \u201cCurriculum adversarial training,\u201d arXiv: 1805.04807, 2018."},{"key":"","unstructured":"Zhang J., Xu X., Han B., Niu G., Cui L., Sugiyama M., and Kankanhalli M., \u201cAttacks which do not kill training make adversarial learning stronger,\u201d in International conference on machine learning. PMLR, 2020, pp. 11278-11287."},{"key":"","unstructured":"Wang Y., Zou D., Yi J., Bailey J., Ma X., and Gu Q., \u201cImproving adversarial robustness requires revisiting misclassified examples,\u201d in International Conference on Learning Representations, 2020."},{"key":"","unstructured":"Kurakin A., Goodfellow I. J., and Bengio S., \u201cAdversarial examples in the physical world,\u201d in Artificial intelligence safety and security. Chapman and Hall\/CRC, 2018, pp. 99\u2013112."},{"key":"","unstructured":"Carlini N. and Wagner D., \u201cTowards evaluating the robustness of neural networks,\u201d in 2017 ieee symposium on security and privacy (sp), 2017, pp. 39-57."},{"key":"","unstructured":"Li L. and Spratling M., \u201cData augmentation alone can improve adversarial training,\u201d arXiv: 2301.09879, 2023."},{"key":"","unstructured":"He K., Zhang X., Ren S., and Sun J., \u201cDeep residual learning for image recognition,\u201d in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 770-778."},{"key":"","unstructured":"Krizhevsky A., Hinton G. et al., \u201cLearning multiple layers of features from tiny images,\u201d 2009."},{"key":"","unstructured":"Yu Q., Lou J., Zhan X., Li Q., Zuo W., Liu Y., and Liu J., \u201cAdversarial contrastive learning via asymmetric infonce,\u201d in Computer Vision-ECCV 2022: 17 th  European Conference, Tel Aviv, Israel, October 23\u201327, 2022, Proceedings, Part V. Springer, 2022, pp. 53-69."}],"container-title":["Data Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.sciengine.com\/doi\/pdf\/A0FCB1F2D69F43DBA4005446E49C8A69","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.sciengine.com\/doi\/10.3724\/2096-7004.di.2025.0190","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.sciengine.com\/doi\/pdf\/A0FCB1F2D69F43DBA4005446E49C8A69","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T03:17:08Z","timestamp":1768447028000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.sciengine.com\/doi\/10.3724\/2096-7004.di.2025.0190"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,1]]},"references-count":32,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,1,4]]},"published-print":{"date-parts":[[2025,12,1]]}},"URL":"https:\/\/doi.org\/10.3724\/2096-7004.di.2025.0190","relation":{},"ISSN":["2096-7004"],"issn-type":[{"value":"2096-7004","type":"print"}],"subject":[],"published":{"date-parts":[[2025,12,1]]}}}