{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:49:27Z","timestamp":1743068967420,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031781827"},{"type":"electronic","value":"9783031781834"}],"license":[{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78183-4_26","type":"book-chapter","created":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T12:00:21Z","timestamp":1733227221000},"page":"407-422","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Few-Shot Copycat: Improving Performance of\u00a0Black-Box Attack with\u00a0Random Natural Images and\u00a0Few Examples of\u00a0Problem Domain"],"prefix":"10.1007","author":[{"given":"Jhonatan Machado","family":"Le\u00e3o","sequence":"first","affiliation":[]},{"given":"Jacson Rodrigues","family":"Correia-Silva","sequence":"additional","affiliation":[]},{"given":"Alberto Ferreira","family":"de Souza","sequence":"additional","affiliation":[]},{"given":"Claudine Santos","family":"Badue","sequence":"additional","affiliation":[]},{"given":"Thiago","family":"Oliveira-Santos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,4]]},"reference":[{"issue":"1","key":"26_CR1","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1049\/cit2.12028","volume":"6","author":"A Chakraborty","year":"2021","unstructured":"Chakraborty, A., Alam, M., Dey, V., Chattopadhyay, A., Mukhopadhyay, D.: A survey on adversarial attacks and defences. CAAI Trans. Intell. Technol. 6(1), 25\u201345 (2021)","journal-title":"CAAI Trans. Intell. Technol."},{"key":"26_CR2","unstructured":"Cheng, M., Le, T., Chen, P.Y., Yi, J., Zhang, H., Hsieh, C.J.: Query-efficient hard-label black-box attack: an optimization-based approach. arXiv preprint arXiv:1807.04457 (2018)"},{"key":"26_CR3","unstructured":"Coates, A., Ng, A., Lee, H.: An analysis of single-layer networks in unsupervised feature learning. In: Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics, pp. 215\u2013223. JMLR Workshop and Conference Proceedings (2011)"},{"key":"26_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107830","volume":"113","author":"JR Correia-Silva","year":"2021","unstructured":"Correia-Silva, J.R., Berriel, R.F., Badue, C., De Souza, A.F., Oliveira-Santos, T.: Copycat CNN: are random non-labeled data enough to steal knowledge from black-box models? Pattern Recogn. 113, 107830 (2021)","journal-title":"Pattern Recogn."},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Correia-Silva, J.R., Berriel, R.F., Badue, C., de\u00a0Souza, A.F., Oliveira-Santos, T.: Copycat CNN: stealing knowledge by persuading confession with random non-labeled data. In: 2018 International Joint Conference on Neural Networks (IJCNN), pp.\u00a01\u20138. IEEE (2018)","DOI":"10.1109\/IJCNN.2018.8489592"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Gong, X., Chen, Y., Yang, W., Mei, G., Wang, Q.: Inversenet: augmenting model extraction attacks with training data inversion. In: IJCAI, pp. 2439\u20132447 (2021)","DOI":"10.24963\/ijcai.2021\/336"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Han, G., Huang, S., Ma, J., He, Y., Chang, S.F.: Meta faster r-cnn: towards accurate few-shot object detection with attentive feature alignment. Proc. AAAI Conf. Artif. Intell. 36, 780\u2013789 (2022)","DOI":"10.1609\/aaai.v36i1.19959"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"26_CR9","unstructured":"Hinton, G., Vinyals, O., Dean, J.: Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 (2015)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Huang, L.L., Yin, F.: Traffic sign recognition using perturbation method. In: Pattern Recognition: 6th Chinese Conference, CCPR 2014, Changsha, 17\u201319 November 2014. Proceedings, Part II, 6, pp. 518\u2013527. Springer (2014)","DOI":"10.1007\/978-3-662-45643-9_55"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Kesarwani, M., Mukhoty, B., Arya, V., Mehta, S.: Model extraction warning in MLAAS paradigm. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 371\u2013380 (2018)","DOI":"10.1145\/3274694.3274740"},{"key":"26_CR12","unstructured":"Krizhevsky, A., Hinton, G., et\u00a0al.: Learning multiple layers of features from tiny images (2009)"},{"issue":"8","key":"26_CR13","doi-asserted-by":"publisher","first-page":"1377","DOI":"10.1080\/02699930903485076","volume":"24","author":"O Langner","year":"2010","unstructured":"Langner, O., Dotsch, R., Bijlstra, G., Wigboldus, D.H., Hawk, S.T., Van Knippenberg, A.: Presentation and validation of the radboud faces database. Cogn. Emot. 24(8), 1377\u20131388 (2010)","journal-title":"Cogn. Emot."},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Liu, T., Wang, K., Chang, B., Sui, Z.: A soft-label method for noise-tolerant distantly supervised relation extraction. In: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, pp. 1790\u20131795 (2017)","DOI":"10.18653\/v1\/D17-1189"},{"key":"26_CR15","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s41095-018-0116-x","volume":"4","author":"Y Lu","year":"2018","unstructured":"Lu, Y., Lu, J., Zhang, S., Hall, P.: Traffic signal detection and classification in street views using an attention model. Comput. Visual Media 4, 253\u2013266 (2018)","journal-title":"Comput. Visual Media"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Lucey, P., Cohn, J.F., Kanade, T., Saragih, J., Ambadar, Z., Matthews, I.: The extended Cohn-Kanade dataset (CK+): a complete dataset for action unit and emotion-specified expression. In: 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition-Workshops, pp. 94\u2013101. IEEE (2010)","DOI":"10.1109\/CVPRW.2010.5543262"},{"key":"26_CR17","first-page":"630","volume":"91","author":"D Lundqvist","year":"1998","unstructured":"Lundqvist, D., Flykt, A., \u00d6hman, A.: Karolinska directed emotional faces. PsycTESTS Dataset 91, 630 (1998)","journal-title":"PsycTESTS Dataset"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Lyons, M., Akamatsu, S., Kamachi, M., Gyoba, J.: Coding facial expressions with Gabor wavelets. In: Proceedings Third IEEE International Conference on Automatic Face and Gesture Recognition, pp. 200\u2013205. IEEE (1998)","DOI":"10.1109\/AFGR.1998.670949"},{"key":"26_CR19","unstructured":"Martinez, A., Benavente, R.: The AR face database: CVC technical report, 24 (1998)"},{"issue":"3","key":"26_CR20","doi-asserted-by":"publisher","first-page":"349","DOI":"10.3390\/e24030349","volume":"24","author":"I Mosafi","year":"2022","unstructured":"Mosafi, I., David, E., Altshuler, Y., Netanyahu, N.S.: DNN intellectual property extraction using composite data. Entropy 24(3), 349 (2022)","journal-title":"Entropy"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Mosafi, I., David, E.O., Netanyahu, N.S.: Stealing knowledge from protected deep neural networks using composite unlabeled data. In: 2019 International Joint Conference on Neural Networks (IJCNN), pp.\u00a01\u20138. IEEE (2019)","DOI":"10.1109\/IJCNN.2019.8851798"},{"key":"26_CR22","unstructured":"Netzer, Y., Wang, T., Coates, A., Bissacco, A., Wu, B., Ng, A.Y., et\u00a0al.: Reading digits in natural images with unsupervised feature learning. In: NIPS Workshop on Deep Learning and Unsupervised Feature Learning, vol.\u00a02011, p.\u00a04. Granada (2011)"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Orekondy, T., Schiele, B., Fritz, M.: Knockoff nets: stealing functionality of black-box models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4954\u20134963 (2019)","DOI":"10.1109\/CVPR.2019.00509"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Pal, S., Gupta, Y., Shukla, A., Kanade, A., Shevade, S., Ganapathy, V.: Activethief: model extraction using active learning and unannotated public data. Proc. AAAI Conf. Artif. Intell. 34, 865\u2013872 (2020)","DOI":"10.1609\/aaai.v34i01.5432"},{"key":"26_CR25","unstructured":"Pantic, M., Valstar, M., Rademaker, R., Maat, L.: Web-based database for facial expression analysis. In: 2005 IEEE International Conference on Multimedia and Expo, p. 5. IEEE (2005)"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"Russakovsky, O., et al.: Imagenet large scale visual recognition challenge. Int. J. Comput. Vision 115, 211\u2013252 (2015)","DOI":"10.1007\/s11263-015-0816-y"},{"key":"26_CR27","doi-asserted-by":"crossref","unstructured":"Shi, Y., Sagduyu, Y., Grushin, A.: How to steal a machine learning classifier with deep learning. In: 2017 IEEE International Symposium on Technologies for Homeland Security (HST), pp.\u00a01\u20135. IEEE (2017)","DOI":"10.1109\/THS.2017.7943475"},{"key":"26_CR28","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)"},{"key":"26_CR29","doi-asserted-by":"crossref","unstructured":"Tang, Z., Wang, D., Zhang, Z.: Recurrent neural network training with dark knowledge transfer. In: 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 5900\u20135904. IEEE (2016)","DOI":"10.1109\/ICASSP.2016.7472809"},{"key":"26_CR30","unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction $$\\{$$APIs$$\\}$$. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 601\u2013618 (2016)"},{"key":"26_CR31","unstructured":"Xiao, H., Rasul, K., Vollgraf, R.: Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747 (2017)"},{"issue":"1","key":"26_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0276-2","volume":"6","author":"SS Yadav","year":"2019","unstructured":"Yadav, S.S., Jadhav, S.M.: Deep convolutional neural network based medical image classification for disease diagnosis. J. Big Data 6(1), 1\u201318 (2019)","journal-title":"J. Big Data"},{"key":"26_CR33","unstructured":"Yin, L., Wei, X., Sun, Y., Wang, J., Rosato, M.J.: A 3D facial expression database for facial behavior research. In: 7th International Conference on Automatic Face and Gesture Recognition (FGR06), pp. 211\u2013216. IEEE (2006)"},{"key":"26_CR34","doi-asserted-by":"publisher","first-page":"48901","DOI":"10.1109\/ACCESS.2019.2909559","volume":"7","author":"J Zhao","year":"2019","unstructured":"Zhao, J., Chen, Y., Zhang, W.: Differential privacy preservation in deep learning: challenges, opportunities and solutions. IEEE Access 7, 48901\u201348911 (2019)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78183-4_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T12:13:52Z","timestamp":1733228032000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78183-4_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,4]]},"ISBN":["9783031781827","9783031781834"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78183-4_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,4]]},"assertion":[{"value":"4 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icpr2024.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}