{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T21:41:46Z","timestamp":1760305306234,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032080660"},{"type":"electronic","value":"9783032080677"}],"license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08067-7_4","type":"book-chapter","created":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T20:37:24Z","timestamp":1760301444000},"page":"61-80","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Theoretical Bounds on\u00a0the\u00a0Adversarial Robustness of\u00a0Reduced-Rank Regression"],"prefix":"10.1007","author":[{"given":"Soyon","family":"Choi","sequence":"first","affiliation":[]},{"given":"Scott","family":"Alfeld","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Alfeld, S., Zhu, X., Barford, P.: Data poisoning attacks against autoregressive models. In: Proceedings of the AAAI Conference on Artificial Intelligence (2016)","DOI":"10.1609\/aaai.v30i1.10237"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Alfeld, S., Zhu, X., Barford, P.: Explicit defense actions against test-set attacks. In: Proceedings of the AAAI Conference on Artificial Intelligence (2017)","DOI":"10.1609\/aaai.v31i1.10767"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Bernstein, D.S.: Scalar, Vector, and Matrix Mathematics. Princeton University Press (2018)","DOI":"10.1515\/9781400888252"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Biggio, B., Roli, F.: Wild patterns: ten years after the rise of adversarial machine learning. Patt. Recogn., 317\u2013331 (2018)","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Dalvi, N.N., Domingos, P.M., Mausam, Sanghai, S.K., Verma, D.: Adversarial classification. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2004)","DOI":"10.1145\/1014052.1014066"},{"key":"4_CR7","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: Proceedings of the International Conference on Learning Representations (2014)"},{"key":"4_CR8","unstructured":"Gro\u00dfhans, M., Sawade, C., Br\u00fcckner, M., Scheffer, T.: Bayesian games for adversarial regression problems. In: Dasgupta, S., McAllester, D. (eds.) Proceedings of the 30th International Conference on Machine Learning. Proceedings of Machine Learning Research (2013)"},{"key":"4_CR9","unstructured":"Horn, R.A., Johnson, C.R.: Matrix Analysis 2nd edn. Cambridge University Press (2013)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Hsu, W.L.: Approximation algorithms for the assembly line crew scheduling problem. Math. Oper. Res. 9(3) (1984)","DOI":"10.1287\/moor.9.3.376"},{"issue":"2","key":"4_CR11","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/0047-259X(75)90042-1","volume":"5","author":"AJ Izenman","year":"1975","unstructured":"Izenman, A.J.: Reduced-rank regression for the multivariate linear model. J. Multivariate Analy. 5(2), 248\u2013264 (1975)","journal-title":"J. Multivariate Analy."},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Lowd, D., Meek, C.: Adversarial learning. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining. Association for Computing Machinery (2005)","DOI":"10.1145\/1081870.1081950"},{"key":"4_CR13","unstructured":"Lowd, D., Meek, C.: Good word attacks on statistical spam filters. In: Proceedings of the International Conference on Email and Anti-Spam (2005)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Frossard, P.: Deepfool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition abs\/1511.04599 (2015)","DOI":"10.1109\/CVPR.2016.282"},{"key":"4_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2853-8","volume-title":"Multivariate Reduced-Rank Regression: Theory","author":"GC Reinsel","year":"1998","unstructured":"Reinsel, G.C., Velu, R.P., Chen, K.: Multivariate Reduced-Rank Regression: Theory. Springer, Methods and Applications (1998)"},{"key":"4_CR16","unstructured":"Savostianova, D., Zangrando, E., Ceruti, G., Tudisco, F.: Robust low-rank training via approximate orthonormal constraints. In: Thirty-seventh Conference on Neural Information Processing Systems (2023)"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"She, Y., Chen, K.: Robust reduced-rank regression. Biometrika (2017)","DOI":"10.32614\/CRAN.package.rrpack"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Simil\u00e4, T., Tikka, J.: Input selection and shrinkage in multiresponse linear regression. Comput. Stat. Data Analy. (2007)","DOI":"10.1016\/j.csda.2007.01.025"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Van Der Merwe, A., Zidek, J.V.: Multivariate regression analysis and canonical variates. Canadian J. Stat. (1980)","DOI":"10.2307\/3314667"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Vorobeychik, Y., Kantarcioglu, M.: Adversarial Machine Learning. Morgan Claypool Publishers (2018)","DOI":"10.1007\/978-3-031-01580-9"}],"container-title":["Lecture Notes in Computer Science","Game Theory and AI for Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08067-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T21:02:45Z","timestamp":1760302965000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08067-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"ISBN":["9783032080660","9783032080677"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08067-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"13 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Game Theory and AI for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.gamesec-conf.org\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}