Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/115243
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Department of Industrial and Systems Engineering | - |
| dc.creator | Lin, C | - |
| dc.creator | Ji, X | - |
| dc.creator | Yang, Y | - |
| dc.creator | Li, Q | - |
| dc.creator | Zhao, Z | - |
| dc.creator | Peng, Z | - |
| dc.creator | Wang, R | - |
| dc.creator | Fang, L | - |
| dc.creator | Shen, C | - |
| dc.date.accessioned | 2025-09-17T03:46:33Z | - |
| dc.date.available | 2025-09-17T03:46:33Z | - |
| dc.identifier.issn | 1556-6013 | - |
| dc.identifier.uri | http://hdl.handle.net/10397/115243 | - |
| dc.language.iso | en | en_US |
| dc.publisher | Institute of Electrical and Electronics Engineers | en_US |
| dc.rights | © 2024 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | en_US |
| dc.rights | The following publication C. Lin et al., "Hard Adversarial Example Mining for Improving Robust Fairness," in IEEE Transactions on Information Forensics and Security, vol. 20, pp. 350-363, 2025 is available at https://doi.org/10.1109/TIFS.2024.3516554. | en_US |
| dc.subject | Adversarial training | en_US |
| dc.subject | Convolutional neural network | en_US |
| dc.subject | Hard adversarial example mining | en_US |
| dc.subject | Robust fairness | en_US |
| dc.title | Hard adversarial example mining for improving robust fairness | en_US |
| dc.type | Journal/Magazine Article | en_US |
| dc.identifier.spage | 350 | - |
| dc.identifier.epage | 363 | - |
| dc.identifier.volume | 20 | - |
| dc.identifier.doi | 10.1109/TIFS.2024.3516554 | - |
| dcterms.abstract | Adversarial training (AT) is widely considered the state-of-the-art technique for improving the robustness of deep neural networks (DNNs) against adversarial examples (AEs). Nevertheless, recent studies have revealed that adversarially trained models are prone to unfairness problems. Recent works in this field usually apply class-wise regularization methods to enhance the fairness of AT. However, this paper discovers that these paradigms can be sub-optimal in improving robust fairness. Specifically, we empirically observe that the AEs that are already robust (referred to as “easy AEs” in this paper) are useless and even harmful in improving robust fairness. To this end, we propose the hard adversarial example mining (HAM) technique which concentrates on mining hard AEs while discarding the easy AEs in AT. Specifically, HAM identifies the easy AEs and hard AEs with a fast adversarial attack method. By discarding the easy AEs and reweighting the hard AEs, the robust fairness of the model can be efficiently and effectively improved. Extensive experimental results on four image classification datasets demonstrate the improvement of HAM in robust fairness and training efficiency compared to several state-of-the-art fair adversarial training methods. Our code is available at https://github.com/yyl-github-1896/HAM. | - |
| dcterms.accessRights | open access | en_US |
| dcterms.bibliographicCitation | IEEE transactions on information forensics and security, 2025, v. 20, p. 350-363 | - |
| dcterms.isPartOf | IEEE transactions on information forensics and security | - |
| dcterms.issued | 2025 | - |
| dc.identifier.scopus | 2-s2.0-85212574758 | - |
| dc.identifier.eissn | 1556-6021 | - |
| dc.description.validate | 202509 bcch | - |
| dc.description.oa | Accepted Manuscript | en_US |
| dc.identifier.FolderNumber | a4025 | en_US |
| dc.identifier.SubFormID | 51956 | en_US |
| dc.description.fundingSource | RGC | en_US |
| dc.description.fundingSource | Others | en_US |
| dc.description.fundingText | This work was supported in part by the National Key Research and Development Program of China under Grant 2023YFE0209800; in part by the National Natural Science Foundation of China under Grant T2341003, Grant 62376210, Grant 62161160337, Grant 62132011, Grant U21B2018, Grant U20A20177, and Grant 62206217; in part by Shaanxi Province Key Industry Innovation Program under Grant 2023-ZDLGY-38; in part by Hong Kong Research Grants Council (RGC) General Research Fund (GRF) Projects under Grant 12202922 and Grant 15238724; and in part by Shenzhen Science and Technology Program under Grant JCYJ20230807140412025. The associate editor coordinating the review of this article and approving it for publication was Prof. Guowen Xu. | en_US |
| dc.description.pubStatus | Published | en_US |
| dc.description.oaCategory | Green (AAM) | en_US |
| Appears in Collections: | Journal/Magazine Article | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Lin_Hard_Adversarial_Example.pdf | Pre-Published version | 3.86 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



