{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T02:05:06Z","timestamp":1768529106919,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819771806","type":"print"},{"value":"9789819771813","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-7181-3_24","type":"book-chapter","created":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T08:37:21Z","timestamp":1724315841000},"page":"300-312","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Attacking Evolutionary Algorithms via\u00a0SparseEA"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0072-4047","authenticated-orcid":false,"given":"Limiao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Ran","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3487-5126","authenticated-orcid":false,"given":"Ye","family":"Tian","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5052-000X","authenticated-orcid":false,"given":"Xingyi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,21]]},"reference":[{"issue":"1","key":"24_CR1","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1214\/ss\/1177011077","volume":"8","author":"D Bertsimas","year":"1993","unstructured":"Bertsimas, D., Tsitsiklis, J.: Simulated annealing. Stat. Sci. 8(1), 10\u201315 (1993)","journal-title":"Stat. Sci."},{"key":"24_CR2","doi-asserted-by":"publisher","unstructured":"Branke, J.: Efficient evolutionary algorithms for searching robust solutions. In: Parmee, I.C. (eds.) Evolutionary Design and Manufacture: Selected Papers from ACDM 2000, pp. 275\u2013285. Springer, London (2000). https:\/\/doi.org\/10.1007\/978-1-4471-0519-0_22","DOI":"10.1007\/978-1-4471-0519-0_22"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Chen, P.Y., Zhang, H., Sharma, Y., Yi, J., Hsieh, C.J.: ZOO: zeroth order optimization based black-box attacks to deep neural networks without training substitute models. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp. 15\u201326 (2017)","DOI":"10.1145\/3128572.3140448"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Corne, D.W., Knowles, J.D.: Techniques for highly multiobjective optimisation: some nondominated points are better than others. In: Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, pp. 773\u2013780 (2007)","DOI":"10.1145\/1276958.1277115"},{"issue":"4","key":"24_CR5","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1162\/evco.2006.14.4.463","volume":"14","author":"K Deb","year":"2006","unstructured":"Deb, K., Gupta, H.: Introducing robustness in multi-objective optimization. Evol. Comput. 14(4), 463\u2013494 (2006)","journal-title":"Evol. Comput."},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Dorigo, M., Di\u00a0Caro, G.: Ant colony optimization: a new meta-heuristic. In: Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No. 99TH8406), vol.\u00a02, pp. 1470\u20131477. IEEE (1999)","DOI":"10.1109\/CEC.1999.782657"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Eberhart, R., Kennedy, J.: A new optimizer using particle swarm theory. In: MHS 1995. Proceedings of the Sixth International Symposium on Micro Machine and Human Science, pp. 39\u201343. IEEE (1995)","DOI":"10.1109\/MHS.1995.494215"},{"key":"24_CR8","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"issue":"3","key":"24_CR9","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1109\/TEVC.2019.2933444","volume":"24","author":"Z He","year":"2019","unstructured":"He, Z., Yen, G.G., Lv, J.: Evolutionary multiobjective optimization with robustness enhancement. IEEE Trans. Evol. Comput. 24(3), 494\u2013507 (2019)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Hochreiter, R.: Evolutionary stochastic portfolio optimization. In: Brabazon, A., O\u2019Neill, M. (eds.) Natural Computing in Computational Finance, pp. 67\u201387. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-77477-8_5"},{"key":"24_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2021.121362","volume":"235","author":"S Li","year":"2021","unstructured":"Li, S., Gong, W., Hu, C., Yan, X., Wang, L., Gu, Q.: Adaptive constraint differential evolution for optimal power flow. Energy 235, 121362 (2021)","journal-title":"Energy"},{"issue":"4","key":"24_CR12","doi-asserted-by":"publisher","first-page":"1630","DOI":"10.1109\/TSG.2015.2495133","volume":"8","author":"G Liang","year":"2016","unstructured":"Liang, G., Zhao, J., Luo, F., Weller, S.R., Dong, Z.Y.: A review of false data injection attacks against modern power systems. IEEE Trans. Smart Grid 8(4), 1630\u20131638 (2016)","journal-title":"IEEE Trans. Smart Grid"},{"key":"24_CR13","doi-asserted-by":"publisher","first-page":"2257","DOI":"10.1007\/s00500-017-2487-9","volume":"22","author":"Y Liu","year":"2018","unstructured":"Liu, Y., Ling, J., Liu, Z., Shen, J., Gao, C.: Finger vein secure biometric template generation based on deep learning. Soft. Comput. 22, 2257\u20132265 (2018)","journal-title":"Soft. Comput."},{"key":"24_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2023.104030","volume":"148","author":"W Ma","year":"2023","unstructured":"Ma, W., Zeng, L., An, K.: Dynamic vehicle routing problem for flexible buses considering stochastic requests. Transp. Res. Part C Emerg. Technol. 148, 104030 (2023)","journal-title":"Transp. Res. Part C Emerg. Technol."},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against machine learning. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 506\u2013519 (2017)","DOI":"10.1145\/3052973.3053009"},{"issue":"5","key":"24_CR16","doi-asserted-by":"publisher","first-page":"909","DOI":"10.3390\/app9050909","volume":"9","author":"S Qiu","year":"2019","unstructured":"Qiu, S., Liu, Q., Zhou, S., Wu, C.: Review of artificial intelligence adversarial attack and defense technologies. Appl. Sci. 9(5), 909 (2019)","journal-title":"Appl. Sci."},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Rahman, M., Li, Y., Yan, J.: Multi-objective evolutionary optimization for worst-case analysis of false data injection attacks in the smart grid. In: 2020 IEEE Congress on Evolutionary Computation (CEC), pp.\u00a01\u20138. IEEE (2020)","DOI":"10.1109\/CEC48606.2020.9185725"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Sampson, J.R.: Adaptation in Natural and Artificial Systems (John H. Holland) (1976)","DOI":"10.1137\/1018105"},{"issue":"6","key":"24_CR19","doi-asserted-by":"publisher","first-page":"1905","DOI":"10.1016\/j.cor.2006.09.019","volume":"35","author":"MP Scaparra","year":"2008","unstructured":"Scaparra, M.P., Church, R.L.: A bilevel mixed-integer program for critical infrastructure protection planning. Comput. Oper. Res. 35(6), 1905\u20131923 (2008)","journal-title":"Comput. Oper. Res."},{"key":"24_CR20","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)"},{"issue":"4","key":"24_CR21","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/MCI.2017.2742868","volume":"12","author":"Y Tian","year":"2017","unstructured":"Tian, Y., Cheng, R., Zhang, X., Jin, Y.: PlatEMO: a matlab platform for evolutionary multi-objective optimization [educational forum]. IEEE Comput. Intell. Mag. 12(4), 73\u201387 (2017)","journal-title":"IEEE Comput. Intell. Mag."},{"issue":"2","key":"24_CR22","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1109\/TAI.2022.3168038","volume":"4","author":"Y Tian","year":"2022","unstructured":"Tian, Y., Pan, J., Yang, S., Zhang, X., He, S., Jin, Y.: Imperceptible and sparse adversarial attacks via a dual-population based constrained evolutionary algorithm. IEEE Trans. Artif. Intell. 4(2), 268\u2013281 (2022)","journal-title":"IEEE Trans. Artif. Intell."},{"issue":"2","key":"24_CR23","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1109\/TEVC.2019.2918140","volume":"24","author":"Y Tian","year":"2019","unstructured":"Tian, Y., Zhang, X., Wang, C., Jin, Y.: An evolutionary algorithm for large-scale sparse multiobjective optimization problems. IEEE Trans. Evol. Comput. 24(2), 380\u2013393 (2019)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"24_CR24","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.ijepes.2017.03.011","volume":"91","author":"L Yang","year":"2017","unstructured":"Yang, L., Li, Y., Li, Z.: Improved-elm method for detecting false data attack in smart grid. Int. J. Electr. Power Energy Syst. 91, 183\u2013191 (2017)","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"4","key":"24_CR25","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/4235.797969","volume":"3","author":"E Zitzler","year":"1999","unstructured":"Zitzler, E., Thiele, L.: Multiobjective evolutionary algorithms: a comparative case study and the strength pareto approach. IEEE Trans. Evol. Comput. 3(4), 257\u2013271 (1999)","journal-title":"IEEE Trans. Evol. Comput."}],"container-title":["Lecture Notes in Computer Science","Advances in Swarm Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-7181-3_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T02:16:27Z","timestamp":1732673787000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-7181-3_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819771806","9789819771813"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-7181-3_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"21 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Swarm Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xining","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"swarm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iasei.org\/icsi2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}