{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:40:31Z","timestamp":1756273231002,"version":"3.44.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100018693","name":"Horizon Europe","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130067","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"950-956","source":"Crossref","is-referenced-by-count":0,"title":["Surrogate-Guided Adversarial Attacks: Enabling White-Box Methods in Black-Box Scenarios"],"prefix":"10.1109","author":[{"given":"Dimitrios Christos","family":"Asimopoulos","sequence":"first","affiliation":[{"name":"MetaMind Innovations,Kozani,Greece"}]},{"given":"Panagiotis","family":"Radoglou-Grammatikis","sequence":"additional","affiliation":[{"name":"K3Y Ltd,Sofia,Bulgaria"}]},{"given":"Panagiotis","family":"Fouliras","sequence":"additional","affiliation":[{"name":"University of Macedonia,Department of Applied Informatics,Thessaloniki,Greece"}]},{"given":"Konstandinos","family":"Panitsidis","sequence":"additional","affiliation":[{"name":"University of Western Macedonia,Department of Management Science &#x0026; Technology,Kozani,Greece"}]},{"given":"Georgios","family":"Efstathopoulos","sequence":"additional","affiliation":[{"name":"MetaMind Innovations,Kozani,Greece"}]},{"given":"Thomas","family":"Lagkas","sequence":"additional","affiliation":[{"name":"Democritus University of Thrace,Department of Computer Science,Kavala,Greece"}]},{"given":"Vasileios","family":"Argyriou","sequence":"additional","affiliation":[{"name":"Kingston University London,Department of Networks and Digital Media,Penrhyn Road,UK"}]},{"given":"Igor","family":"Kotsiuba","sequence":"additional","affiliation":[{"name":"Durham University Business School,Millhill Ln,UK"}]},{"given":"Panagiotis","family":"Sarigiannidis","sequence":"additional","affiliation":[{"name":"University of Western Macedonia,Department of Electrical and Computer Engineering,Kozani,Greece"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI59109.2023.00098"},{"key":"ref2","article-title":"Ask, attend, attack: A effective decision-based black-box targeted attack for image-to-text models","author":"Zeng","year":"2024","journal-title":"arXiv preprint arXiv:2408.08989"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i6.28430"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BigData62323.2024.10826110"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3605163"},{"issue":"04","key":"ref6","first-page":"4109","article-title":"Perturbing across the feature hierarchy to improve standard and strict blackbox attack transferability","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"34","author":"Inkawhich"},{"issue":"04","key":"ref7","first-page":"12324","article-title":"Skip connections matter: On the transferability of adversarial examples generated with skip connections","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"34","author":"Wu"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"article-title":"Nesterov accelerated gradient and scale invariance for improving transferability of adversarial examples","volume-title":"International Conference on Learning Representations (ICLR)","author":"Lin","key":"ref10"},{"article-title":"Explaining and harnessing adversarial examples","volume-title":"International Conference on Learning Representations (ICLR)","author":"Goodfellow","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"issue":"1","key":"ref14","first-page":"19291958","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"Srivastava","year":"2014","journal-title":"Journal of Machine Learning Research"},{"key":"ref15","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv preprint arXiv:1412.6980"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.20517\/ces.2025.04"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130067.pdf?arnumber=11130067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:14:42Z","timestamp":1756271682000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130067\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130067","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}