{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T20:00:48Z","timestamp":1768680048424,"version":"3.49.0"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021YFB3100400"],"award-info":[{"award-number":["2021YFB3100400"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202276"],"award-info":[{"award-number":["62202276"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62232010"],"award-info":[{"award-number":["62232010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072278"],"award-info":[{"award-number":["62072278"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shandong Science Fund for Excellent Young Scholars","award":["2022HWYQ-038"],"award-info":[{"award-number":["2022HWYQ-038"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1109\/tc.2023.3280133","type":"journal-article","created":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T17:48:47Z","timestamp":1685036927000},"page":"2978-2989","source":"Crossref","is-referenced-by-count":7,"title":["Model Poisoning Attack on Neural Network Without Reference Data"],"prefix":"10.1109","volume":"72","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7939-6279","authenticated-orcid":false,"given":"Xianglong","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3928-7753","authenticated-orcid":false,"given":"Huanle","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8003-0669","authenticated-orcid":false,"given":"Guoming","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1353-7838","authenticated-orcid":false,"given":"Hong","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6835-5981","authenticated-orcid":false,"given":"Dongxiao","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5912-4647","authenticated-orcid":false,"given":"Xiuzhen","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7935-886X","authenticated-orcid":false,"given":"Pengfei","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Jinan, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3065172"},{"key":"ref35","first-page":"1523","article-title":"Graph backdoor","author":"xi","year":"2021","journal-title":"Proc 30th USENIX Secur Symp"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228656"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3028448"},{"key":"ref14","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3468218.3469046"},{"key":"ref31","article-title":"Deep inside convolutional networks: Visualising image classification models and saliency maps","author":"simonyan","year":"2014","journal-title":"Proc 2nd Int Conf Learn Representations"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243757"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.18662\/eljpa\/11"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3068873"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403064"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref1","first-page":"2938","article-title":"How to backdoor federated learning","author":"bagdasaryan","year":"2020","journal-title":"Proc Int Conf Artif Intell Statist"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC.2017.8284852"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3184520"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354209"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2874243"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2773081"},{"key":"ref24","article-title":"Explainability matters: Backdoor attacks on medical imaging","author":"nwadike","year":"2020"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025068"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417253"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423362"},{"key":"ref42","article-title":"Interpretable deep learning under fire","author":"zhang","year":"2020","journal-title":"Proc 29th USENIX Secur Symp"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467405"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363216"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.319"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2536605"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6871"},{"key":"ref29","first-page":"1487","article-title":"Explanation-guided backdoor poisoning attacks against malware classifiers","author":"severi","year":"2021","journal-title":"Proc Usenix Secur Symp"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"ref7","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"Proc 3rd Int Conf Learn Representations"},{"key":"ref9","first-page":"52","article-title":"Representation learning on graphs: Methods and applications","volume":"40","author":"hamilton","year":"2017","journal-title":"IEEE Data Eng Bull"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2700270"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.312"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/nature21056"},{"key":"ref40","first-page":"3320","article-title":"How transferable are features in deep neural networks?","author":"yosinski","year":"2014","journal-title":"Proc Int Conf Neural Inf Process"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/10243393\/10135160.pdf?arnumber=10135160","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T17:50:55Z","timestamp":1696269055000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10135160\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10]]},"references-count":43,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tc.2023.3280133","relation":{},"ISSN":["0018-9340","1557-9956","2326-3814"],"issn-type":[{"value":"0018-9340","type":"print"},{"value":"1557-9956","type":"electronic"},{"value":"2326-3814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10]]}}}