{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T07:09:06Z","timestamp":1725779346945},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T00:00:00Z","timestamp":1708300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T00:00:00Z","timestamp":1708300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,2,19]]},"DOI":"10.1109\/icnc59896.2024.10555954","type":"proceedings-article","created":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T17:20:54Z","timestamp":1718990454000},"page":"783-788","source":"Crossref","is-referenced-by-count":0,"title":["QE-DBA: Query-Efficient Decision-Based Adversarial Attacks via Bayesian Optimization"],"prefix":"10.1109","author":[{"given":"Zhuosheng","family":"Zhang","sequence":"first","affiliation":[{"name":"Stevens Institute of Technology"}]},{"given":"Noor","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Air Force Research Laboratory"}]},{"given":"Shucheng","family":"Yu","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology"}]}],"member":"263","reference":[{"author":"Szegedy","journal-title":"Intriguing properties of neural networks","key":"ref1"},{"author":"Goodfellow","journal-title":"Explaining and harnessing adversarial examples","key":"ref2"},{"author":"Madry","journal-title":"Towards deep learning models resistant to adversarial attacks","key":"ref3"},{"author":"Cheng","journal-title":"Sign-opt: A query-efficient hard-label adversarial attack","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/SP40000.2020.00045"},{"year":"2021","author":"Li","journal-title":"Nonlinear projection based gradient estimation for query efficient blackbox attacks","key":"ref6"},{"author":"Zhang","journal-title":"Progressive-scale boundary blackbox attack via projective gradient estimation","key":"ref7"},{"author":"Brendel","journal-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models","key":"ref8"},{"author":"Cheng","journal-title":"Query-efficient hard-label black-box attack: An optimization-based approach","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/bfb0006170"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-540-28650-9_4"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/JPROC.2015.2494218"},{"key":"ref13","first-page":"2951","article-title":"Practical bayesian optimization of machine learning algorithms","author":"Snoek","year":"2012","journal-title":"Advances in neural information processing systems"},{"author":"Brochu","journal-title":"A tutorial on bayesian optimization of expensive cost functions, with application to active user modeling and hierarchical reinforcement learning","key":"ref14"},{"author":"Shukla","journal-title":"Blackbox adversarial attacks with bayesian optimization","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/3319535.3345660"},{"key":"ref17","article-title":"Bayesopt adversarial attack","volume-title":"International Conference on Learning Representations","author":"Ru","year":"2019"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/3447548.3467386"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/3394486.3403225"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/CVPR.2009.5206848"},{"year":"2009","author":"Krizhevsky","journal-title":"Learning multiple layers of features from tiny images","key":"ref21"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/CVPR.2016.90"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/CVPR.2016.308"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.14722\/ndss.2018.23198"}],"event":{"name":"2024 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2024,2,19]]},"location":"Big Island, HI, USA","end":{"date-parts":[[2024,2,22]]}},"container-title":["2024 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10555566\/10555889\/10555954.pdf?arnumber=10555954","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T19:15:39Z","timestamp":1719342939000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10555954\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,19]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icnc59896.2024.10555954","relation":{},"subject":[],"published":{"date-parts":[[2024,2,19]]}}}