{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:10:09Z","timestamp":1740100209964,"version":"3.37.3"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000015","name":"DOE","doi-asserted-by":"publisher","award":["DE-EE0009152"],"award-info":[{"award-number":["DE-EE0009152"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,18]]},"DOI":"10.1109\/ijcnn52387.2021.9534154","type":"proceedings-article","created":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T20:32:37Z","timestamp":1632342757000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Targeted Attacks in Hierarchical Settings via Convex Programming"],"prefix":"10.1109","author":[{"given":"Ismail R.","family":"Alkhouri","sequence":"first","affiliation":[]},{"given":"George K.","family":"Atia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.29007\/6xr5"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1137\/110836936"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1590\/0101-7438.2014.034.03.0395"},{"key":"ref30","volume":"40","author":"folland","year":"1999","journal-title":"Real Analysis Modern Techniques and Their Applications"},{"journal-title":"TensorFlow Large-Scale Machine Learning on Heterogeneous Systems","year":"2015","author":"abadi","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.29007\/6bnf"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.2943232"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382977"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"5883","DOI":"10.1609\/aaai.v34i04.6047","article-title":"Stealthy and efficient adversarial attacks against deep reinforcement learning","volume":"34","author":"sun","year":"0","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-019-1211-x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2018.8645290"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS45731.2020.9180821"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1561\/2200000016"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2540719"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-155-8_7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2020.2995965"},{"key":"ref6","article-title":"Towards the science of security and privacy in machine learning","author":"papernot","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref29","article-title":"Distributed convex optimization with many convex constraints","author":"giesen","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP49062.2020.9231583"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1259"},{"key":"ref7","first-page":"4322","article-title":"Decoupling direction and norm for efficient gradient-based 12 adversarial attacks and defenses","author":"rony","year":"0","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2869747"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2019.12.012"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2754294"},{"key":"ref20","first-page":"9155","article-title":"Confidence-calibrated adversarial training: Generalizing to unseen attacks","volume":"119","author":"stutz","year":"2020","journal-title":"Proceedings of the 37th International Conference on Machine Learning"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-010-0175-9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.17648\/jisc.v7i1.76"},{"key":"ref24","article-title":"Adversarial attacks on coarse-to-fine classifiers","author":"alkhouri","year":"2021","journal-title":"IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489663"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1993.298559"},{"key":"ref25","first-page":"1","article-title":"CVXPY: A Python-embedded modeling language for convex optimization","volume":"17","author":"diamond","year":"2016","journal-title":"Journal of Machine Learning Research"}],"event":{"name":"2021 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2021,7,18]]},"location":"Shenzhen, China","end":{"date-parts":[[2021,7,22]]}},"container-title":["2021 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9533266\/9533267\/09534154.pdf?arnumber=9534154","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:45:51Z","timestamp":1652197551000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9534154\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,18]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/ijcnn52387.2021.9534154","relation":{},"subject":[],"published":{"date-parts":[[2021,7,18]]}}}