{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T21:18:17Z","timestamp":1773263897524,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100008902","name":"Los Alamos National Laboratory (LANL)","doi-asserted-by":"publisher","award":["LLA-UR-24-26951"],"award-info":[{"award-number":["LLA-UR-24-26951"]}],"id":[{"id":"10.13039\/100008902","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007000","name":"Laboratory Directed Research and Development (LDRD) program","doi-asserted-by":"publisher","award":["20230287ER,20250850ECR,20240868PRD3"],"award-info":[{"award-number":["20230287ER,20250850ECR,20240868PRD3"]}],"id":[{"id":"10.13039\/100007000","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006168","name":"National Nuclear Security Administration","doi-asserted-by":"publisher","award":["89233218CNA000001"],"award-info":[{"award-number":["89233218CNA000001"]}],"id":[{"id":"10.13039\/100006168","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,12]]},"DOI":"10.1109\/icdmw69685.2025.00280","type":"proceedings-article","created":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T19:50:39Z","timestamp":1773172239000},"page":"2301-2309","source":"Crossref","is-referenced-by-count":0,"title":["LaFA: Latent Feature Attacks on Non-Negative Matrix Factorization"],"prefix":"10.1109","author":[{"given":"Minh","family":"Vu","sequence":"first","affiliation":[{"name":"LANL,Theoretical Division,Los Alamos,U.S"}]},{"given":"Ben","family":"Nebgen","sequence":"additional","affiliation":[{"name":"LANL,Theoretical Division,Los Alamos,U.S"}]},{"given":"Erik","family":"Skau","sequence":"additional","affiliation":[{"name":"LANL,Computational Sciences,Los Alamos,U.S"}]},{"given":"Geigh","family":"Zollicoffer","sequence":"additional","affiliation":[{"name":"LANL,Theoretical Division,Los Alamos,U.S"}]},{"given":"Juan","family":"Castorena","sequence":"additional","affiliation":[{"name":"LANL,Computational Sciences,Los Alamos,U.S"}]},{"given":"Kim","family":"Rasmussen","sequence":"additional","affiliation":[{"name":"LANL,Theoretical Division,Los Alamos,U.S"}]},{"given":"Boian S.","family":"Alexandrov","sequence":"additional","affiliation":[{"name":"LANL,Theoretical Division,Los Alamos,U.S"}]},{"given":"Manish","family":"Bhattarai","sequence":"additional","affiliation":[{"name":"LANL,Theoretical Division,Los Alamos,U.S"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Concrete problems in ai safety","author":"Amodei","year":"2016","journal-title":"arXiv preprint arXiv"},{"key":"ref2","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv preprint arXiv"},{"key":"ref3","article-title":"Generative adversarial nets","volume":"27","author":"Goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/44565"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0308531101"},{"key":"ref6","first-page":"1","article-title":"Stochastic topic models","volume-title":"Proceedings of the forty-fourth annual ACM symposium on Theory of computing","author":"Arora","year":"2012"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkx1133"},{"key":"ref8","article-title":"When does non-negative matrix factorization give a correct decomposition into parts?","volume":"16","author":"Donoho","year":"2003","journal-title":"Advances in neural information processing systems"},{"key":"ref9","volume-title":"MNIST handwritten digit database","author":"LeCun","year":"2010"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3264418"},{"key":"ref13","article-title":"Adversarial autoencoders","author":"Kos","year":"2018","journal-title":"NIPS 2017 Workshop on Bayesian Deep Learning"},{"key":"ref14","first-page":"993","article-title":"Spill-over adversarial attacks: A black-box, targeted, and computationally-efficient attack on clustering","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"33","author":"Acks","year":"2019"},{"key":"ref15","article-title":"Adversarial nonnegative matrix factorization","volume-title":"37th International Conference on Machine Learning","author":"Luo","year":"2020"},{"key":"ref16","article-title":"Algorithms for non-negative matrix factorization","author":"Lee","year":"2001","journal-title":"Advances in neural information processing systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.89.2.123"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/764206"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/nav.3800020109"},{"key":"ref20","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv preprint arXiv"},{"key":"ref21","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv preprint arXiv"},{"key":"ref22","article-title":"Adversarial robustness in unsupervised machine learning: A systematic review","author":"Mohus","year":"2023","journal-title":"arXiv preprint arXiv"},{"key":"ref23","article-title":"Pca as a defense against some adversaries","author":"Aparne","year":"2022","journal-title":"Center for Brains, Minds and Machines (CBMM)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371789"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.39"}],"event":{"name":"2025 IEEE International Conference on Data Mining Workshops (ICDMW)","location":"Washington, DC, USA","start":{"date-parts":[[2025,11,12]]},"end":{"date-parts":[[2025,11,15]]}},"container-title":["2025 IEEE International Conference on Data Mining Workshops (ICDMW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11415623\/11415713\/11415845.pdf?arnumber=11415845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T05:18:21Z","timestamp":1773206301000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11415845\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icdmw69685.2025.00280","relation":{},"subject":[],"published":{"date-parts":[[2025,11,12]]}}}