{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:17:39Z","timestamp":1759331859846},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004489","name":"MITACS","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004489","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"NSERC","doi-asserted-by":"publisher","award":["497981"],"award-info":[{"award-number":["497981"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1109\/globecom54140.2023.10436898","type":"proceedings-article","created":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T19:45:36Z","timestamp":1708976736000},"source":"Crossref","is-referenced-by-count":4,"title":["Policy Poisoning Attacks on Transfer Learning Enabled Resource Allocation for Network Slicing"],"prefix":"10.1109","author":[{"given":"Shavbo","family":"Salehi","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Computer Science, University of Ottawa,Ottawa,Canada"}]},{"given":"Hao","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, University of Ottawa,Ottawa,Canada"}]},{"given":"Medhat","family":"Elsayed","sequence":"additional","affiliation":[{"name":"Ericsson Inc.,Ottawa,Canada"}]},{"given":"Majid","family":"Bavand","sequence":"additional","affiliation":[{"name":"Ericsson Inc.,Ottawa,Canada"}]},{"given":"Raimundas","family":"Gaigalas","sequence":"additional","affiliation":[{"name":"Ericsson Inc.,Ottawa,Canada"}]},{"given":"Yigit","family":"Ozcan","sequence":"additional","affiliation":[{"name":"Ericsson Inc.,Ottawa,Canada"}]},{"given":"Melike","family":"Erol-Kantarci","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, University of Ottawa,Ottawa,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC50174.2021.9569358"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2022-Spring54318.2022.9860733"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3111139"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2867459"},{"key":"ref5","first-page":"11225","article-title":"Adaptive reward-poisoning attacks against reinforcement learning","volume-title":"International Conference on Machine Learning","author":"Zhang"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/9781119723950.ch14"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.004.2200025"},{"key":"ref8","first-page":"1281","article-title":"With great training comes great vulnerability: Practical attacks against transfer learning","volume-title":"27th {USENIX} Security Symposium({USENIX} Security 18)","author":"Wang"},{"key":"ref9","article-title":"6G white paper on machine learning in wireless communication networks","author":"Ali","year":"2020","journal-title":"arXiv preprint"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2022.3205184"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3124855"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops50388.2021.9473567"},{"key":"ref13","first-page":"2101","article-title":"How to attack and defend 5G radio access network slicing with reinforcement learning","author":"Shi","year":"2021","journal-title":"arXiv e-prints"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2022.3204572"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49033.2022.9700647"}],"event":{"name":"GLOBECOM 2023 - 2023 IEEE Global Communications Conference","location":"Kuala Lumpur, Malaysia","start":{"date-parts":[[2023,12,4]]},"end":{"date-parts":[[2023,12,8]]}},"container-title":["GLOBECOM 2023 - 2023 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10436708\/10436716\/10436898.pdf?arnumber=10436898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T21:29:49Z","timestamp":1710365389000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10436898\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/globecom54140.2023.10436898","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]}}}