{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T04:16:02Z","timestamp":1740111362270,"version":"3.37.3"},"reference-count":42,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61836011","U19B2044"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Pattern Recognition Letters"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1016\/j.patrec.2021.10.024","type":"journal-article","created":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T13:04:00Z","timestamp":1635167040000},"page":"275-282","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":8,"special_numbering":"C","title":["On the receptive field misalignment in CAM-based visual explanations"],"prefix":"10.1016","volume":"152","author":[{"given":"Pengfei","family":"Xia","sequence":"first","affiliation":[]},{"given":"Hongjing","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Ziqiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.patrec.2021.10.024_bib0001","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","volume":"25","author":"Krizhevsky","year":"2012","journal-title":"Adv Neural Inf Process Syst"},{"key":"10.1016\/j.patrec.2021.10.024_bib0002","series-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He","year":"2016"},{"key":"10.1016\/j.patrec.2021.10.024_bib0003","series-title":"Proceedings of the IEEE international conference on computer vision","first-page":"1440","article-title":"Fast r-cnn","author":"Girshick","year":"2015"},{"key":"10.1016\/j.patrec.2021.10.024_bib0004","series-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","first-page":"3431","article-title":"Fully convolutional networks for semantic segmentation","author":"Long","year":"2015"},{"year":"2013","series-title":"Intriguing properties of neural networks","author":"Szegedy","key":"10.1016\/j.patrec.2021.10.024_bib0005"},{"year":"2014","series-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","key":"10.1016\/j.patrec.2021.10.024_bib0006"},{"year":"2017","series-title":"Badnets: identifying vulnerabilities in the machine learning model supply chain","author":"Gu","key":"10.1016\/j.patrec.2021.10.024_bib0007"},{"year":"2013","series-title":"Deep inside convolutional networks: visualising image classification models and saliency maps","author":"Simonyan","key":"10.1016\/j.patrec.2021.10.024_bib0008"},{"key":"10.1016\/j.patrec.2021.10.024_bib0009","series-title":"European conference on computer vision","first-page":"818","article-title":"Visualizing and understanding convolutional networks","author":"Zeiler","year":"2014"},{"key":"10.1016\/j.patrec.2021.10.024_bib0010","series-title":"Proceedings of the IEEE International Conference on Computer Vision","first-page":"3429","article-title":"Interpretable explanations of black boxes by meaningful perturbation","author":"Fong","year":"2017"},{"key":"10.1016\/j.patrec.2021.10.024_bib0011","series-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","first-page":"2921","article-title":"Learning deep features for discriminative localization","author":"Zhou","year":"2016"},{"key":"10.1016\/j.patrec.2021.10.024_bib0012","series-title":"Proceedings of the IEEE international conference on computer vision","first-page":"618","article-title":"Grad-cam: Visual explanations from deep networks via gradient-based localization","author":"Selvaraju","year":"2017"},{"key":"10.1016\/j.patrec.2021.10.024_bib0013","series-title":"2018\u00a0IEEE Winter Conference on Applications of Computer Vision (WACV)","first-page":"839","article-title":"Grad-cam++: Generalized gradient-based visual explanations for deep convolutional networks","author":"Chattopadhay","year":"2018"},{"key":"10.1016\/j.patrec.2021.10.024_bib0014","doi-asserted-by":"crossref","first-page":"103792","DOI":"10.1016\/j.compbiomed.2020.103792","article-title":"Automated detection of COVID-19 cases using deep neural networks with x-ray images","volume":"121","author":"Ozturk","year":"2020","journal-title":"Comput. Biol. Med."},{"key":"10.1016\/j.patrec.2021.10.024_bib0015","series-title":"2020\u00a0IEEE Security and Privacy Workshops (SPW)","first-page":"48","article-title":"Sentinet: Detecting localized universal attacks against deep learning systems","author":"Chou","year":"2020"},{"key":"10.1016\/j.patrec.2021.10.024_bib0016","series-title":"Proceedings of the European conference on computer vision (ECCV)","first-page":"102","article-title":"Weakly-and semi-supervised panoptic segmentation","author":"Li","year":"2018"},{"year":"2013","series-title":"Network in network","author":"Lin","key":"10.1016\/j.patrec.2021.10.024_bib0017"},{"key":"10.1016\/j.patrec.2021.10.024_bib0018","series-title":"2020\u00a0IEEE Winter Conference on Applications of Computer Vision (WACV)","first-page":"972","article-title":"Ablation-CAM: Visual explanations for deep convolutional network via gradient-free localization","author":"Desai","year":"2020"},{"key":"10.1016\/j.patrec.2021.10.024_bib0019","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops","first-page":"24","article-title":"Score-CAM: Score-weighted visual explanations for convolutional neural networks","author":"Wang","year":"2020"},{"year":"2020","series-title":"Extending class activation mapping using gaussian receptive field","author":"Kim","key":"10.1016\/j.patrec.2021.10.024_bib0020"},{"year":"2017","series-title":"Understanding the effective receptive field in deep convolutional neural networks","author":"Luo","key":"10.1016\/j.patrec.2021.10.024_bib0021"},{"year":"2014","series-title":"Striving for simplicity: the all convolutional net","author":"Springenberg","key":"10.1016\/j.patrec.2021.10.024_bib0022"},{"year":"2014","series-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","key":"10.1016\/j.patrec.2021.10.024_bib0023"},{"year":"2017","series-title":"Smoothgrad: removing noise by adding noise","author":"Smilkov","key":"10.1016\/j.patrec.2021.10.024_bib0024"},{"key":"10.1016\/j.patrec.2021.10.024_bib0025","series-title":"Explainable AI: interpreting, explaining and visualizing deep learning","first-page":"5","article-title":"Towards Explainable Artificial Intelligence","author":"Samek","year":"2019"},{"key":"10.1016\/j.patrec.2021.10.024_bib0026","series-title":"International Conference on Machine Learning","first-page":"3319","article-title":"Axiomatic attribution for deep networks","author":"Sundararajan","year":"2017"},{"year":"2018","series-title":"Rise: randomized input sampling for explanation of black-box models","author":"Petsiuk","key":"10.1016\/j.patrec.2021.10.024_bib0027"},{"year":"2016","series-title":"A boundary tilting persepective on the phenomenon of adversarial examples","author":"Tanay","key":"10.1016\/j.patrec.2021.10.024_bib0028"},{"key":"10.1016\/j.patrec.2021.10.024_bib0029","series-title":"2017 ieee symposium on security and privacy (sp)","first-page":"39","article-title":"Towards evaluating the robustness of neural networks","author":"Carlini","year":"2017"},{"year":"2018","series-title":"Constructing unrestricted adversarial examples with generative models","author":"Song","key":"10.1016\/j.patrec.2021.10.024_bib0030"},{"year":"2017","series-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","key":"10.1016\/j.patrec.2021.10.024_bib0031"},{"year":"2017","series-title":"Ensemble adversarial training: attacks and defenses","author":"Tram\u00e8r","key":"10.1016\/j.patrec.2021.10.024_bib0032"},{"year":"2017","series-title":"Tactics of adversarial attack on deep reinforcement learning agents","author":"Lin","key":"10.1016\/j.patrec.2021.10.024_bib0033"},{"key":"10.1016\/j.patrec.2021.10.024_bib0034","series-title":"Proceedings of the IEEE International Conference on Computer Vision","first-page":"1369","article-title":"Adversarial examples for semantic segmentation and object detection","author":"Xie","year":"2017"},{"year":"2018","series-title":"Generating natural language adversarial examples","author":"Alzantot","key":"10.1016\/j.patrec.2021.10.024_bib0035"},{"key":"10.1016\/j.patrec.2021.10.024_bib0036","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"2020","article-title":"Fooling network interpretation in image classification","author":"Subramanya","year":"2019"},{"key":"10.1016\/j.patrec.2021.10.024_bib0037","series-title":"29th {USENIX} Security Symposium ({USENIX} Security 20)","article-title":"Interpretable deep learning under fire","author":"Zhang","year":"2020"},{"year":"2019","series-title":"Fooling neural network interpretations via adversarial model manipulation","author":"Heo","key":"10.1016\/j.patrec.2021.10.024_bib0038"},{"key":"10.1016\/j.patrec.2021.10.024_bib0039","series-title":"2009\u00a0IEEE conference on computer vision and pattern recognition","first-page":"248","article-title":"Imagenet: A large-scale hierarchical image database","author":"Deng","year":"2009"},{"issue":"11","key":"10.1016\/j.patrec.2021.10.024_bib0040","doi-asserted-by":"crossref","first-page":"2278","DOI":"10.1109\/5.726791","article-title":"Gradient-based learning applied to document recognition","volume":"86","author":"LeCun","year":"1998","journal-title":"Proc. IEEE"},{"year":"2016","series-title":"Wide residual networks","author":"Zagoruyko","key":"10.1016\/j.patrec.2021.10.024_bib0041"},{"key":"10.1016\/j.patrec.2021.10.024_bib0042","series-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","first-page":"1492","article-title":"Aggregated residual transformations for deep neural networks","author":"Xie","year":"2017"}],"container-title":["Pattern Recognition Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167865521003810?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167865521003810?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T06:54:24Z","timestamp":1724914464000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167865521003810"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":42,"alternative-id":["S0167865521003810"],"URL":"https:\/\/doi.org\/10.1016\/j.patrec.2021.10.024","relation":{},"ISSN":["0167-8655"],"issn-type":[{"type":"print","value":"0167-8655"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"On the receptive field misalignment in CAM-based visual explanations","name":"articletitle","label":"Article Title"},{"value":"Pattern Recognition Letters","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.patrec.2021.10.024","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}