Do regularization methods for shortcut mitigation work as intended?

Do regularization methods for shortcut mitigation work as intended?

Papers citing "Do regularization methods for shortcut mitigation work as intended?"