{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T05:41:26Z","timestamp":1760420486856,"version":"build-2065373602"},"reference-count":51,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T00:00:00Z","timestamp":1758499200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T00:00:00Z","timestamp":1758499200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,22]]},"DOI":"10.1109\/icnp65844.2025.11192405","type":"proceedings-article","created":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T17:38:54Z","timestamp":1760377134000},"page":"1-12","source":"Crossref","is-referenced-by-count":0,"title":["ARTEMIS: Adaptive Reweighing for Transferable Evasion via Meta-learning in Zero-Query Network Intrusion Detection Systems"],"prefix":"10.1109","author":[{"given":"Lei","family":"Wang","sequence":"first","affiliation":[{"name":"Tsinghua Shenzhen International Graduate School,Shenzhen,China"}]},{"given":"Qingsong","family":"Zou","sequence":"additional","affiliation":[{"name":"Tsinghua Shenzhen International Graduate School,Shenzhen,China"}]},{"given":"Qing","family":"Li","sequence":"additional","affiliation":[{"name":"Peng Cheng Laboratory,Shenzhen,China"}]},{"given":"Jianping","family":"Zhang","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong,Hong Kong,China"}]},{"given":"Yong","family":"Jiang","sequence":"additional","affiliation":[{"name":"Tsinghua Shenzhen International Graduate School,Shenzhen,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484585"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854599"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.12.091"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2025.3560486"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3247585"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI50451.2021.9660011"},{"key":"ref11","first-page":"2991","article-title":"Transferability of white-box perturbations: query-efficient adversarial attacks against commercial dnn services","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Shen"},{"article-title":"Query-efficient hard-label black-box attack: An optimization-based approach","year":"2018","author":"Cheng","key":"ref12"},{"article-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models","year":"2017","author":"Brendel","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.3301742"},{"article-title":"Prior convictions: Black-box adversarial attacks with bandits and priors","year":"2018","author":"Ilyas","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01575"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00790"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00284"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3385003.3410925"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3681032"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3050605"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s20051452"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2016.7456805"},{"article-title":"Toward realistic adversarial attacks in ids: A novel feasibility metric for transferability","year":"2025","author":"Ennaji","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179406"},{"key":"ref28","first-page":"70 141","article-title":"Boosting adversarial transferability by achieving flat local maxima","volume":"36","author":"Ge","year":"2023","journal-title":"Advances in Neural Information Processing Systems"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"Goodfellow","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3469659"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3357316"},{"article-title":"Making substitute models more bayesian can enhance transferability of adversarial examples","year":"2023","author":"Li","key":"ref33"},{"key":"ref34","first-page":"16 165","article-title":"An efficient adversarial attack for tree ensembles","volume":"33","author":"Zhang","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104160"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-025-09917-0"},{"article-title":"Generating practical adversarial network traffic flows using nidsgan","year":"2022","author":"Zolbayar","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107247"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/s24010127"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624124"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"article-title":"Adversarial deep learning against intrusion detection classifiers","year":"2017","author":"Rigaki","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05981-0_7"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670309"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3087242"},{"key":"ref46","first-page":"2705","article-title":"Defeating {DNN-Based} traffic analysis systems in {Real-Time} with blind adversarial perturbations","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Nasr"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"article-title":"Adversarial robustness toolbox v1.0.0","year":"2019","author":"Nicolae","key":"ref49"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00045"}],"event":{"name":"2025 IEEE 33rd International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2025,9,22]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2025,9,25]]}},"container-title":["2025 IEEE 33rd International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11192357\/11192322\/11192405.pdf?arnumber=11192405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T05:08:30Z","timestamp":1760418510000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11192405\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,22]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/icnp65844.2025.11192405","relation":{},"subject":[],"published":{"date-parts":[[2025,9,22]]}}}