{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:39:02Z","timestamp":1726043942053},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030301781"},{"type":"electronic","value":"9783030301798"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-30179-8_9","type":"book-chapter","created":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T19:03:18Z","timestamp":1567969398000},"page":"115-122","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Reducing Search Space of Genetic Algorithms for Fast Black Box Attacks on Image Classifiers"],"prefix":"10.1007","author":[{"given":"Julius","family":"Brandl","sequence":"first","affiliation":[]},{"given":"Nicolas","family":"Breinl","sequence":"additional","affiliation":[]},{"given":"Maximilian","family":"Demmler","sequence":"additional","affiliation":[]},{"given":"Lukas","family":"Hartmann","sequence":"additional","affiliation":[]},{"given":"J\u00f6rg","family":"H\u00e4hner","sequence":"additional","affiliation":[]},{"given":"Anthony","family":"Stein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,24]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Nguyen, A., Yosinski, J., Clune, J.: Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable Images. \n                    arXiv:1412.1897\n                    \n                   [cs], December 2014","key":"9_CR1","DOI":"10.1109\/CVPR.2015.7298640"},{"unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against machine learning. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS 2017, pp. 506\u2013519. ACM, New York (2017). ISBN 978-1-4503-4944-4","key":"9_CR2"},{"doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A.: The limitations of deep learning in adversarial settings. In: 2016 IEEE European Symposium on Security and Privacy (EuroS P), March 2016, pp. 372\u2013387 (2016)","key":"9_CR3","DOI":"10.1109\/EuroSP.2016.36"},{"unstructured":"Hu, W., Tan, Y.: Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. In: CoRR abs\/1702.05983 (2017). \n                    arXiv:1702.05983","key":"9_CR4"},{"key":"9_CR5","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1090.001.0001","volume-title":"Adaptation in Natural and Artificial Systems","author":"John H. Holland","year":"1992","unstructured":"Holland, J.H.: Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control and Artificial Intelligence. MIT Press, Cambridge (1992). ISBN 0262082136"},{"issue":"3","key":"9_CR6","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1080\/09528139008953723","volume":"2","author":"DARRELL WHITLEY","year":"1990","unstructured":"Whitley, D., Starkweather, T.: GENITOR II: a distributed genetic algorithm. J. Exp. Theoret. Artif. Intell. 2(3), 189\u2013214 (1990). ISSN 0952\u2013813X","journal-title":"Journal of Experimental & Theoretical Artificial Intelligence"},{"issue":"4","key":"9_CR7","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1109\/21.286385","volume":"24","author":"M. Srinivas","year":"1994","unstructured":"Srinivas, M., Patnaik, L.M.: Adaptive probabilities of crossover and mutation in genetic algorithms. IEEE Trans. Syst. Man Cybern. 24(4), 656\u2013667 (1994). ISSN 0018\u20139472","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"unstructured":"Michalewicz, Z.: Genetic Algorithms + Data Structures = Evolution Programs. Springer, Heidelberg (2013). Google-Books-ID: JmyrCAAAQBAJ. ISBN 978-3-662-03315-9","key":"9_CR8"},{"issue":"6-7","key":"9_CR9","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/S0167-8191(05)80052-3","volume":"17","author":"H. M\u00fchlenbein","year":"1991","unstructured":"Muhlenbein, H., Schomisch, M., Born, J.: The parallel genetic algorithm as function optimizer. Parallel Comput. 17(6), 619\u2013632 (1991). ISSN 0167\u20138191","journal-title":"Parallel Computing"},{"issue":"2","key":"9_CR10","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.renene.2004.05.007","volume":"30","author":"S.A. Grady","year":"2005","unstructured":"Grady, S.A., Hussaini, M.Y., Abdullah, M.M.: Placement of wind turbines using genetic algorithms. Renew. Energy 30(2), 259\u2013270 (2005). ISSN 0960\u20131481","journal-title":"Renewable Energy"},{"unstructured":"Lee, M.A., Takagi, H.: Integrating design stages of fuzzy systems using genetic algorithms, pp. 612\u2013617 (1993)","key":"9_CR11"},{"issue":"4","key":"9_CR12","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1061\/(ASCE)0733-947X(1998)124:4(368)","volume":"124","author":"SB Pattnaik","year":"1998","unstructured":"Pattnaik, S.B., Mohan, S., Tom, V.M.: Urban bus transit route network design using genetic algorithm. J. Transp. Eng. 124(4), 368\u2013375 (1998)","journal-title":"J. Transp. Eng."},{"unstructured":"Rahmat-Samii, Y., Michielssen, E.: Electromagnetic Optimization by Genetic Algorithms, November 1999. English","key":"9_CR13"},{"unstructured":"Su, J., Vargas, D.V., Kouichi, S.: One pixel attack for fooling deep neural networks. \n                    arXiv:1710.08864\n                    \n                   [cs, stat], October 2017","key":"9_CR14"},{"unstructured":"Mitchell, T.M.: Machine Learning, 1st edn. McGraw-Hill Inc., New York (1997). ISBN 0070428077, 9780070428072","key":"9_CR15"},{"issue":"1","key":"9_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1162\/evco.1993.1.1.1","volume":"1","author":"Thomas B\u00e4ck","year":"1993","unstructured":"B\u00e4ck, T., Schwefel, H.-P.: An overview of evolutionary algorithms for parameter optimization. Evol. Comput. 1(1), 1\u201323 (1993)","journal-title":"Evolutionary Computation"},{"unstructured":"German Traffic Signs Benchmark. \n                    http:\/\/benchmark.ini.rub.de\/?section=gtsdb&subsection=dataset\n                    \n                  . Accessed 26 Apr 2019","key":"9_CR17"}],"container-title":["Lecture Notes in Computer Science","KI 2019: Advances in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30179-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T19:37:56Z","timestamp":1567971476000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30179-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030301781","9783030301798"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30179-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint German\/Austrian Conference on Artificial Intelligence (K\u00fcnstliche Intelligenz)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kassel","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"42","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ki2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ki2019.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"82","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}