{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T06:08:12Z","timestamp":1769926092821,"version":"3.49.0"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2020B010165003"],"award-info":[{"award-number":["2020B010165003"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62006252"],"award-info":[{"award-number":["62006252"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2021A1515011840"],"award-info":[{"award-number":["2021A1515011840"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]},{"name":"A*STAR CyberPhysical Production System"},{"name":"Towards Contextual and Intelligent Response Research Program through the RIE2020 IAF-PP","award":["A19C1a0018"],"award-info":[{"award-number":["A19C1a0018"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Top. Comput. Intell."],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1109\/tetci.2022.3146330","type":"journal-article","created":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T21:53:43Z","timestamp":1645480423000},"page":"1271-1285","source":"Crossref","is-referenced-by-count":7,"title":["Adaptive Evolution Strategies for Stochastic Zeroth-Order Optimization"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4460-2460","authenticated-orcid":false,"given":"Xiaoyu","family":"He","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7872-7718","authenticated-orcid":false,"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3743-5254","authenticated-orcid":false,"given":"Zefeng","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0497-0835","authenticated-orcid":false,"given":"Yuren","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729586"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1137\/16M1080173"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2015.2496908"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2976000"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2182178"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-012-9951-y"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1017\/S0962492919000060"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.2550005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2018.8646618"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref11","first-page":"2137","article-title":"Black-box adversarial attacks with limited queries and information","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Ilyas","year":"2018"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-018-0006-z"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2895748"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106622"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2743240"},{"key":"ref17","article-title":"Evolution strategies as a scalable alternative to reinforcement learning","author":"Salimans","year":"2017"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10208-015-9296-2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1137\/120880811"},{"key":"ref20","first-page":"288","article-title":"Zeroth-order online alternating direction method of multipliers: Convergence analysis and applications","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Liu","year":"2018"},{"key":"ref21","article-title":"signSGD via zeroth-order oracle","volume-title":"Proc. 7th Int. Conf. Learn. Representations","author":"Liu","year":"2019"},{"key":"ref22","first-page":"7202","article-title":"ZO-AdaMM: Zeroth-order adaptive momentum method for black-box optimization","volume":"32","author":"Chen","year":"2019","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.3003837"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2409256"},{"issue":"1","key":"ref25","first-page":"3117","article-title":"A survey of algorithms and analysis for adaptive online learning","volume":"18","author":"McMahan","year":"2017","journal-title":"J. Mach. Learn. Res."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2020.100694"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1162\/106365603321828970"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2017.2668068"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2018.05.016"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.04.003"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11047-006-9025-5"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-010-9403-3"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2008.924423"},{"key":"ref34","first-page":"5032","article-title":"Improving exploration in evolution strategies for deep reinforcement learning via a population of novelty-seeking agents","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Conti","year":"2018"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/295"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1137\/100812276"},{"key":"ref37","article-title":"Zeroth-order asynchronous doubly stochastic algorithm with variance reduction","author":"Gu","year":"2016"},{"key":"ref38","first-page":"1681","article-title":"An accelerated DFO algorithm for finite-sum convex functions","volume-title":"Proc. Int. Conf. Mach. Learn.","volume":"1","author":"Chen","year":"2020"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00111-7_23"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2908812.2908916"},{"key":"ref41","article-title":"Adam: A method for stochastic optimization","volume-title":"3rd Int. Conf. Learn. Representation","author":"Kingma","year":"2015"},{"key":"ref42","article-title":"On the convergence of adam and beyond","volume-title":"Proc. 6th Int. Conf. Learn. Representations","author":"Reddi","year":"2018"},{"key":"ref43","first-page":"404","article-title":"Dissecting adam: The sign, magnitude and variance of stochastic gradients","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Balles","year":"2018"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1162\/EVCO_a_00132"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.09.002"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2917709"},{"key":"ref47","first-page":"2121","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","volume":"12","author":"Duchi","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref48","first-page":"6677","article-title":"AdaGrad stepsizes: Sharp convergence over nonconvex landscapes","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ward","year":"2019"},{"issue":"18","key":"ref49","first-page":"1","article-title":"Information-geometric optimization algorithms: A unifying picture via invariance principles","volume":"18","author":"Ollivier","year":"2017","journal-title":"J. Mach. Learn. Res."},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2018.2855049"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1162\/106365601750190398"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58112-1_41"},{"key":"ref53","article-title":"Numerical optimization","volume-title":"Ser. Springer Series in Operations Research","author":"Nocedal","year":"2006"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2928563"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35289-8_25"},{"key":"ref56","article-title":"Boosting algorithms as gradient descent","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Mason","year":"1999"},{"issue":"2","key":"ref57","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1023\/A:1009715923555","article-title":"A tutorial on support vector machines for pattern recognition","volume":"2","author":"Burges","year":"1998","journal-title":"Data Mining Knowl. Discov."},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1137\/15M1049695"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1137\/140984038"}],"container-title":["IEEE Transactions on Emerging Topics in Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7433297\/9900106\/09718120.pdf?arnumber=9718120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T23:01:53Z","timestamp":1705532513000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9718120\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10]]},"references-count":59,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tetci.2022.3146330","relation":{},"ISSN":["2471-285X"],"issn-type":[{"value":"2471-285X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10]]}}}