{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T02:45:34Z","timestamp":1771296334926,"version":"3.50.1"},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002383","name":"King Saud University","doi-asserted-by":"publisher","award":["RSP-2022\/18"],"award-info":[{"award-number":["RSP-2022\/18"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1109\/tii.2022.3177442","type":"journal-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T19:43:50Z","timestamp":1653421430000},"page":"503-510","source":"Crossref","is-referenced-by-count":15,"title":["An Interpretive Perspective: Adversarial Trojaning Attack on Neural-Architecture-Search Enabled Edge AI Systems"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5756-3494","authenticated-orcid":false,"given":"Ship Peng","family":"Xu","sequence":"first","affiliation":[{"name":"Department of Computer Science, Harbin Institute of Technology, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2460-7758","authenticated-orcid":false,"given":"Ke","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Jinan University, Guangzhou, China"}]},{"given":"Md. Rafiul","family":"Hassan","sequence":"additional","affiliation":[{"name":"College of Arts and Sciences, University of Maine, Presque Isle, ME, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3479-3606","authenticated-orcid":false,"given":"Mohammad Mehedi","family":"Hassan","sequence":"additional","affiliation":[{"name":"Information Systems Department, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6502-472X","authenticated-orcid":false,"given":"Chien-Ming","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Shandong University of Science and Technology, Shandong, China"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Department of computer science technical reports","author":"liu","year":"0","journal-title":"Proc NDSS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01304"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3000900"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref14","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"J Mach Learn Res"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3121783"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2713481"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6871"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-020-05181-3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMECH.2021.3064816"},{"key":"ref4","article-title":"Simple and efficient architecture search for convolutional neural networks","author":"elsken","year":"2017"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11709"},{"key":"ref6","article-title":"Understanding and simplifying one-shot architecture search","author":"bender","year":"0","journal-title":"Proc 35th Int Conf Mach Learn"},{"key":"ref5","article-title":"SMASH: One-shot model architecture search through HyperNetworks","author":"brock","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref8","article-title":"ProxylessNAS: Direct neural architecture search on target task and hardware","author":"cai","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref7","article-title":"DARTS: Differentiable architecture search","author":"liu","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2946140"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01493"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3104866"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2021.3066285"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/9944026\/09780600.pdf?arnumber=9780600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:40:24Z","timestamp":1670874024000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9780600\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":20,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tii.2022.3177442","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1]]}}}