{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:30:07Z","timestamp":1730298607902,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/ssci.2018.8628720","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T18:15:32Z","timestamp":1551377732000},"page":"381-388","source":"Crossref","is-referenced-by-count":5,"title":["Adversarial Poisoning of Importance Weighting in Domain Adaptation"],"prefix":"10.1109","author":[{"given":"Muhammad","family":"Umer","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Frederickson","sequence":"additional","affiliation":[]},{"given":"Robi","family":"Polikar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1433","article-title":"Direct importance estimation with model selection and its application to covariate shift adaptation","author":"sugiyama","year":"2008","journal-title":"Advances in neural information processing systems"},{"key":"ref11","first-page":"1391","article-title":"A least-squares approach to direct importance estimation","volume":"10","author":"kanamori","year":"2009","journal-title":"Journal of Machine Learning Research"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"ref13","article-title":"Poisoning attacks against support vector machines","author":"biggio","year":"2012","journal-title":"arXiv preprint arXiv 1206 6389"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2517312.2517321"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644895"},{"key":"ref16","first-page":"1689","article-title":"Is feature selection secure against training data poisoning?","author":"xiao","year":"2015","journal-title":"International Conference on Machine Learning"},{"key":"ref17","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"arXiv preprint arXiv 1412 6572"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref19","article-title":"One pixel attack for fooling deep neural networks","author":"su","year":"2017","journal-title":"arXiv preprint arXiv 1710 08864"},{"key":"ref4","first-page":"161","article-title":"Dirichlet-enhanced spam filtering based on biased samples","author":"bickel","year":"2007","journal-title":"Advances in neural information processing systems"},{"key":"ref3","first-page":"1351","article-title":"Adaptive importance sampling with automatic model selection in value function approximation","author":"hachiya","year":"2008","journal-title":"AAAI"},{"key":"ref6","first-page":"129","article-title":"Sample selection bias as a specification error","volume":"31","author":"heckman","year":"2013","journal-title":"Applied Econometrics"},{"key":"ref5","first-page":"985","article-title":"Covariate shift adap-? tation by importance weighted cross validation","volume":"8","author":"sugiyama","year":"2007","journal-title":"Journal of Machine Learning Research"},{"key":"ref8","first-page":"601","article-title":"Correcting sample selection bias by unlabeled data","author":"huang","year":"2006","journal-title":"Advances in neural information processing systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-3758(00)00115-4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btl242"},{"journal-title":"Dataset Shift in Machine Learning","year":"2009","author":"quionero-candela","key":"ref1"},{"key":"ref9","first-page":"2137","article-title":"Discriminative learning under covariate shift","volume":"10","author":"bickel","year":"2009","journal-title":"Journal of Machine Learning Research"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489495"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"}],"event":{"name":"2018 IEEE Symposium Series on Computational Intelligence (SSCI)","start":{"date-parts":[[2018,11,18]]},"location":"Bangalore, India","end":{"date-parts":[[2018,11,21]]}},"container-title":["2018 IEEE Symposium Series on Computational Intelligence (SSCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8610062\/8628618\/08628720.pdf?arnumber=8628720","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T21:17:52Z","timestamp":1598217472000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8628720\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ssci.2018.8628720","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}