{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T01:54:38Z","timestamp":1771034078933,"version":"3.50.1"},"reference-count":16,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2155002"],"award-info":[{"award-number":["2155002"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2155029"],"award-info":[{"award-number":["2155029"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Micro"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1109\/mm.2023.3267481","type":"journal-article","created":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T18:00:45Z","timestamp":1687197645000},"page":"35-44","source":"Crossref","is-referenced-by-count":6,"title":["Adversarial Attacks Against Machine Learning-Based Resource Provisioning Systems"],"prefix":"10.1109","volume":"43","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3094-9439","authenticated-orcid":false,"given":"Najmeh","family":"Nazari","sequence":"first","affiliation":[{"name":"University of California Davis, Davis, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5088-8728","authenticated-orcid":false,"given":"Hosein Mohammadi","family":"Makrani","sequence":"additional","affiliation":[{"name":"Apple, Inc., Cupertino, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7208-1985","authenticated-orcid":false,"given":"Chongzhou","family":"Fang","sequence":"additional","affiliation":[{"name":"University of California Davis, Davis, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6724-2093","authenticated-orcid":false,"given":"Behnam","family":"Omidi","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2035-8512","authenticated-orcid":false,"given":"Setareh","family":"Rafatirad","sequence":"additional","affiliation":[{"name":"University of California Davis, Davis, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6423-0145","authenticated-orcid":false,"given":"Hossein","family":"Sayadi","sequence":"additional","affiliation":[{"name":"California State University Long Beach, Long Beach, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2116-2223","authenticated-orcid":false,"given":"Khaled N.","family":"Khasawneh","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8904-4699","authenticated-orcid":false,"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[{"name":"University of California Davis, Davis, CA, USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00357"},{"key":"ref12","article-title":"DeepCloak: Masking deep neural network models for robustness against adversarial samples","author":"gao","year":"2017"},{"key":"ref15","article-title":"Feature squeezing: Detecting adversarial examples in deep neural networks","author":"xu","year":"2017"},{"key":"ref14","article-title":"Generative adversarial trainer: Defense to adversarial perturbations with gan","author":"lee","year":"2017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01554-1_26"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3442696"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SEED51797.2021.00011"},{"key":"ref16","article-title":"Adversarial perturbations against deep neural networks for malware classification","author":"grosse","year":"2016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140449"},{"key":"ref7","article-title":"A study of the effect of jpg compression on adversarial images","author":"dziugaite","year":"2016"},{"key":"ref9","article-title":"Towards deep neural network architectures robust to adversarial examples","author":"gu","year":"2014"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24996"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23149"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11688"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3123972"}],"container-title":["IEEE Micro"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/40\/10248411\/10155235-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/40\/10248411\/10155235.pdf?arnumber=10155235","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T17:54:29Z","timestamp":1696269269000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10155235\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":16,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/mm.2023.3267481","relation":{},"ISSN":["0272-1732","1937-4143"],"issn-type":[{"value":"0272-1732","type":"print"},{"value":"1937-4143","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9]]}}}