{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:55:00Z","timestamp":1773510900776,"version":"3.50.1"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Major Scientific Project of Zhejiang Lab","award":["No.2018FD0ZX01"],"award-info":[{"award-number":["No.2018FD0ZX01"]}]},{"name":"Provincial Key Research and Development Program of Zhejiang China","award":["2017C01064"],"award-info":[{"award-number":["2017C01064"]}]},{"name":"Provincial Key Research and Development Program of Zhejiang China","award":["2017C01055"],"award-info":[{"award-number":["2017C01055"]}]},{"name":"Provincial Key Research and Development Program of Zhejiang China","award":["2018C03052"],"award-info":[{"award-number":["2018C03052"]}]},{"name":"Provincial Key Research and Development Program of Zhejiang China","award":["2019C01064"],"award-info":[{"award-number":["2019C01064"]}]},{"name":"Alibaba-ZJU Joint Research Institute of Frontier Technologies"},{"name":"Zhejiang Provincial Natural Science Foundation for Distinguished Young Scholars","award":["LR19F020003"],"award-info":[{"award-number":["LR19F020003"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772466"],"award-info":[{"award-number":["61772466"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U1836202"],"award-info":[{"award-number":["U1836202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2018YFB1800601"],"award-info":[{"award-number":["2018YFB1800601"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2018YFB2100404"],"award-info":[{"award-number":["2018YFB2100404"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/tdsc.2019.2943467","type":"journal-article","created":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T19:57:53Z","timestamp":1569355073000},"page":"1-1","source":"Crossref","is-referenced-by-count":19,"title":["Adversarial Examples Versus Cloud-based Detectors: A Black-box Empirical Study"],"prefix":"10.1109","author":[{"given":"Xurong","family":"Li","sequence":"first","affiliation":[]},{"given":"Shouling","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Han","sequence":"additional","affiliation":[]},{"given":"Juntao","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Yushan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chunming","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref33","first-page":"485","article-title":"Optimal randomized classification in adversarial settings","author":"vorobeychik","year":"2014","journal-title":"Proc Int Conf Auton Agents Multi-Agent Syst"},{"key":"ref32","article-title":"Mitigating adversarial effects through randomization","author":"xie","year":"2018","journal-title":"6th Int Conf Learn Representations"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140444"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23198"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.0-172"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2012.02.016"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref11","first-page":"490","article-title":"generic black-box end-to-end attack against state of the art api call based malware classifiers","author":"rosenberg","year":"2017","journal-title":"Proc Int Symp Res Attacks Intrusions Defenses"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2644615"},{"key":"ref14","article-title":"Semantic image segmentation with deep convolutional nets and fully connected crfs","author":"chen","year":"2015","journal-title":"Proc 3rd Int Conf Learn Representations"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.549"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.189"},{"key":"ref17","first-page":"6","article-title":"Simple black-box adversarial attacks on deep neural networks","author":"shiva kasiviswanathan","year":"2017","journal-title":"Proc IEEE Conf Comp Vis Pattern Recognit"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2002.1038156"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref28","article-title":"Ensemble adversarial training: Attacks and defenses","author":"tram\u00e8r","year":"2018","journal-title":"Proc 6th Int Conf Learn Representations"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref27","first-page":"307:195","article-title":"Understanding adversarial training: Increasing local stability of neural nets through robust optimization","author":"shaham","year":"2015","journal-title":"Neurocomputing"},{"key":"ref3","article-title":"Machine learning as an adversarial service: Learning black-box adversarial examples","volume":"abs 1708 5207","author":"hayes","year":"2017","journal-title":"CoRR"},{"key":"ref6","article-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models","author":"brendel","year":"2018","journal-title":"Proc 6th Int Conf Learn Representations"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134606"},{"key":"ref5","article-title":"Delving into transferable adversarial examples and black-box attacks","author":"liu","year":"2017","journal-title":"Proc 5th Int Conf Learn Representations"},{"key":"ref8","first-page":"601","article-title":"Stealing machine learning models via prediction apis","author":"tram\u00e8r","year":"2016","journal-title":"Proc Usenix Secur Symp"},{"key":"ref7","article-title":"Adversarial examples that fool detectors","volume":"abs 1712 2494","author":"lu","year":"2017","journal-title":"CoRR"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref9","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"Proc 2nd Int Conf Learn Representations"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"ref20","first-page":"75","article-title":"An adaptive algorithm for spatial grey scale","volume":"17","author":"floyd","year":"1975","journal-title":"SID Digest"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5244\/C.28.6"},{"key":"ref21","article-title":"Adversarial examples in the physical world","author":"kurakin","year":"2016","journal-title":"Proc 5th Int Conf Learn Representations"},{"key":"ref42","article-title":"Exploring the space of black-box attacks on deep neural networks","volume":"abs 1712 9491","author":"bhagoji","year":"2017","journal-title":"CoRR"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref41","first-page":"2142","article-title":"Black-box adversarial attacks with limited queries and information","author":"ilyas","year":"2018","journal-title":"Proc 35th Int Conf Mach Learn"},{"key":"ref23","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"Proc 3rd Int Conf Learn Representations"},{"key":"ref44","article-title":"Whitening black-box neural networks","volume":"abs 1711 1768","author":"oh","year":"2017","journal-title":"CoRR"},{"key":"ref26","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"Proc 3rd Int Conf Learn Representations"},{"key":"ref43","first-page":"284","article-title":"Synthesizing robust adversarial examples","author":"athalye","year":"2017","journal-title":"Proc 35th Int Conf Mach Learn"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/4358699\/08847461.pdf?arnumber=8847461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T20:49:52Z","timestamp":1643316592000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8847461\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/tdsc.2019.2943467","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}