{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:17:27Z","timestamp":1766067447270,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T00:00:00Z","timestamp":1632009600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T00:00:00Z","timestamp":1632009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T00:00:00Z","timestamp":1632009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,19]]},"DOI":"10.1109\/itsc48978.2021.9564671","type":"proceedings-article","created":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T19:52:26Z","timestamp":1635191546000},"page":"3652-3658","source":"Crossref","is-referenced-by-count":2,"title":["Black-box Adversarial Attacks on Network-wide Multi-step Traffic State Prediction Models"],"prefix":"10.1109","author":[{"given":"Bibek","family":"Poudel","sequence":"first","affiliation":[]},{"given":"Weizi","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s42421-019-00009-5"},{"key":"ref38","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2015","journal-title":"International Conference on Learning Representations"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)0733-947X(1997)123:4(261)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/asmb.1937"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3141\/2387-06"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS48704.2020.9184472"},{"journal-title":"AdverTorch v0 1 An adversarial robustness toolbox based on pytorch","year":"2019","author":"ding","key":"ref37"},{"journal-title":"Automatic differentiation in pytorch","year":"2017","author":"paszke","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966039"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2015.03.014"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3130800.3130847"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2018.05.012"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2015.11.002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2017.2709804"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2018.0007"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18293\/SEKE2019-051"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s42421-020-00020-1"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1061\/9780784483565.066","article-title":"Spatial-temporal analysis of COVID-19's impact on human mobility: the case of the united states","author":"wang","year":"2021","journal-title":"The 20th and 21 st Joint COTA International Conference of Transportation Professionals"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"13147","DOI":"10.1038\/s41598-021-91392-z","article-title":"Assessing inequality, irregularity, and severity regarding road traffic safety during covid-19","volume":"11","author":"lin","year":"2021","journal-title":"Scientific Reports"},{"journal-title":"Intriguing properties of neural networks","year":"2013","author":"szegedy","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/s17040818"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9876.2012.01059.x"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2935152"},{"journal-title":"Analysis of Freeway Traffic Time-Series Data by Using Box-Jenkins Techniques","year":"1979","author":"ahmed","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2345663"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2950416"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2013.08.076"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1109\/MITS.2021.3049404","article-title":"Vehicle trajectory prediction using LSTMs with spatial-temporal attention mechanisms","author":"lin","year":"2021","journal-title":"IEEE Intelligent Transportation Systems Magazine"},{"key":"ref7","article-title":"Predicting station-level bike-sharing demands using graph convolutional neural network","author":"lin","year":"2019","journal-title":"Transportation Research Board (TRB) 96th Annual Meeting"},{"key":"ref2","article-title":"Diffusion convolutional recurrent neural network: Data-driven traffic forecasting","author":"li","year":"2018","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/15472450902858368"},{"key":"ref1","article-title":"Network-wide multi-step traffic volume prediction using graph convolutional gated recurrent neural network","author":"lin","year":"2021","journal-title":"Technical Report"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714619"},{"journal-title":"Fooling ocr systems with adversarial text images","year":"2018","author":"song","key":"ref21"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2019.8794239"},{"journal-title":"Adversarial machine learning at scale","year":"2016","author":"kurakin","key":"ref24"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2018.8460567"},{"journal-title":"Explaining and Harnessing Adversarial Examples","year":"2014","author":"goodfellow","key":"ref23"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.13803"},{"journal-title":"Caltrans Performance Measurement System (Pems)","year":"0","key":"ref26"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3389\/frobt.2015.00011"},{"journal-title":"Transferability in machine learning from phenomena to black-box attacks using adversarial samples","year":"2016","author":"papernot","key":"ref25"}],"event":{"name":"2021 IEEE International Intelligent Transportation Systems Conference (ITSC)","start":{"date-parts":[[2021,9,19]]},"location":"Indianapolis, IN, USA","end":{"date-parts":[[2021,9,22]]}},"container-title":["2021 IEEE International Intelligent Transportation Systems Conference (ITSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9564393\/9564395\/09564671.pdf?arnumber=9564671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:47:36Z","timestamp":1652197656000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9564671\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,19]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/itsc48978.2021.9564671","relation":{},"subject":[],"published":{"date-parts":[[2021,9,19]]}}}