{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T04:10:04Z","timestamp":1775880604606,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1109\/icc45855.2022.9839219","type":"proceedings-article","created":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T19:37:11Z","timestamp":1660246631000},"page":"2351-2356","source":"Crossref","is-referenced-by-count":8,"title":["From adversarial examples to data poisoning instances: utilizing an adversarial attack method to poison a transfer learning model"],"prefix":"10.1109","author":[{"given":"Jing","family":"Lin","sequence":"first","affiliation":[{"name":"University of South Florida,ICNS Lab and Cyber Florida,Tampa,Florida,USA"}]},{"given":"Ryan","family":"Luley","sequence":"additional","affiliation":[{"name":"U.S. Air Force Research Laboratory,High Performance Systems Branch,Rome,New York,USA"}]},{"given":"Kaiqi","family":"Xiong","sequence":"additional","affiliation":[{"name":"University of South Florida,ICNS Lab and Cyber Florida,Tampa,Florida,USA"}]}],"member":"263","reference":[{"key":"ref32","article-title":"Poisoning attacks against support vector machines","author":"biggio","year":"0"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SPW50608.2020.00028"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1145\/1978942.1978963","article-title":"The aligned rank transform for nonparametric factorial analyses using only anova procedures","author":"wobbrock","year":"2011","journal-title":"Proceedings of the SIGCHI conference on Human factors in computing systems"},{"key":"ref10","article-title":"Poisoning attacks against support vector machines","author":"biggio","year":"0"},{"key":"ref11","first-page":"1","article-title":"Exploiting machine learning to subvert your spam filter","volume":"8","author":"nelson","year":"2008","journal-title":"Large-Scale Exploits and Emergent Threats"},{"key":"ref12","article-title":"Ml attack models: adversarial attacks and data poisoning attacks","author":"lin","year":"2021","journal-title":"arXiv preprint arXiv 2112 06814"},{"key":"ref13","article-title":"Adversarial examples make strong poisons","volume":"abs 2106 10807","author":"fowl","year":"2021","journal-title":"CoRR"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685101"},{"key":"ref15","article-title":"A field guide to forwardbackward splitting with a fasta implementation","author":"goldstein","year":"2014","journal-title":"arXiv preprint arXiv 1411 3406"},{"key":"ref16","article-title":"The space of transferable adversarial examples","volume":"abs 1704 3453","author":"tramer","year":"2017","journal-title":"ArXiv"},{"key":"ref17","article-title":"A method for stochastic optimization","author":"da","year":"2014","journal-title":"arXiv preprint arXiv 1412 6980"},{"key":"ref18","article-title":"Adversarial manipulation of deep representations","author":"sabour","year":"2015","journal-title":"arXiv preprint arXiv 1511 05271"},{"key":"ref19","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"arXiv preprint arXiv 1312 6199"},{"key":"ref28","first-page":"279","article-title":"Robust tests for equality of variances","author":"levene","year":"1961","journal-title":"Contributions to Probability and Statistics Essays in Honor of Harold Hotelling"},{"key":"ref4","article-title":"Transferable clean-label poisoning attacks on deep neural nets","author":"zhu","year":"2019","journal-title":"arXiv preprint arXiv 1905 03817"},{"key":"ref27","first-page":"268","article-title":"Properties of sufficiency and statistical tests","volume":"160","author":"bartlett","year":"1937","journal-title":"Proceedings ofthe Royal Society ofLondon Series A-Mathematical and Physical Sciences"},{"key":"ref3","article-title":"Poison frogs! Targeted clean-label poisoning attacks on neural networks","author":"shafahi","year":"2018","journal-title":"ArXiv e-prints"},{"key":"ref6","author":"thrun","year":"2012","journal-title":"Learning to Learn"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1976.10481517"},{"key":"ref5","article-title":"Bulls-eye polytope: A scalable clean-label poisoning attack with improved transferability","author":"aghakhani","year":"2020","journal-title":"arXiv preprint arXiv 2005 06138"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref7","article-title":"Keras","author":"chollet","year":"2015"},{"key":"ref2","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2014","journal-title":"arXiv preprint arXiv 1409 1556"},{"key":"ref9","article-title":"Nuts and bolts of building AI applications using deep learning","author":"ng","year":"2016","journal-title":"Neural Information Processing Systems Keynote Talk"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref20","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"arXiv preprint arXiv 1412 6980"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref21","article-title":"Gradient descent with momentum - to accelerate or to super-accelerate?","volume":"abs 2001 6472","author":"nakerst","year":"2020","journal-title":"CoRR"},{"key":"ref24","article-title":"An analysis of single layer networks in unsupervised feature learning","author":"coates","year":"2011","journal-title":"AISTATS"},{"key":"ref23","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009","journal-title":"Citeseer Tech Rep"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4135\/9781412983327"},{"key":"ref25","article-title":"Adversarial robustness toolbox v1.7.0","volume":"1807 1069","author":"nicolae","year":"2018","journal-title":"CoRR"}],"event":{"name":"ICC 2022 - IEEE International Conference on Communications","location":"Seoul, Korea, Republic of","start":{"date-parts":[[2022,5,16]]},"end":{"date-parts":[[2022,5,20]]}},"container-title":["ICC 2022 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9837954\/9838246\/09839219.pdf?arnumber=9839219","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T20:03:55Z","timestamp":1663013035000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9839219\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icc45855.2022.9839219","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]}}}