{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:06:23Z","timestamp":1773511583508,"version":"3.50.1"},"reference-count":79,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62122013"],"award-info":[{"award-number":["62122013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U2001211"],"award-info":[{"award-number":["U2001211"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovative Development Joint Fund Key Projects of Shandong NSF","award":["ZR2022LZH007"],"award-info":[{"award-number":["ZR2022LZH007"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tkde.2024.3460806","type":"journal-article","created":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T17:29:05Z","timestamp":1726766945000},"page":"8009-8022","source":"Crossref","is-referenced-by-count":1,"title":["DREAM: Domain-Agnostic Reverse Engineering Attributes of Black-Box Model"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-9134-6837","authenticated-orcid":false,"given":"Rongqing","family":"Li","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiaqi","family":"Yu","sequence":"additional","affiliation":[{"name":"Kuaishou Technology, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9789-7632","authenticated-orcid":false,"given":"Changsheng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5697-4168","authenticated-orcid":false,"given":"Wenhan","family":"Luo","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0247-9866","authenticated-orcid":false,"given":"Ye","family":"Yuan","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0181-8379","authenticated-orcid":false,"given":"Guoren","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01849"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00527"},{"key":"ref3","article-title":"Implicit counterfactual data augmentation for deep neural networks","author":"Zhou","year":"2023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3124317"},{"key":"ref5","first-page":"1876","article-title":"Linear classifier: An often-forgotten baseline for text classification","volume-title":"Proc. 61st Annu. Meeting Assoc. Comput. Linguistics","author":"Lin"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-long.346"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07733-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3360454"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10447952"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10448048"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3156809"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3078755"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3153060"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3325315"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3230825"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-023-01150-6"},{"key":"ref17","first-page":"1","article-title":"Dual student networks for data-free model stealing","volume-title":"Proc. 11th Int. Conf. Learn. Representations","author":"Beetham"},{"key":"ref18","first-page":"5680","article-title":"Stealing part of a production language model","volume-title":"Proc. 41st Int. Conf. Mach. Learn.","author":"Carlini"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02295"},{"key":"ref20","first-page":"1","article-title":"Delving into transferable adversarial examples and black-box attacks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Liu"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01571"},{"key":"ref22","first-page":"1","article-title":"Towards reverse-engineering black-box neural networks","volume-title":"Proc. 6th Int. Conf. Learn. Representations","author":"Oh"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.591"},{"key":"ref25","article-title":"Towards out-of-distribution generalization: A survey","author":"Shen","year":"2021"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3195549"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3178128"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00566"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00948"},{"key":"ref30","first-page":"379","article-title":"Domain generalization with mixstyle","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Zhou"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00116"},{"key":"ref32","first-page":"2003","article-title":"Cache telepathy: Leveraging shared resource attacks to learn DNN architectures","volume-title":"Proc. USENIX Secur. Symp.","author":"Yan"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465773"},{"key":"ref34","first-page":"1973","article-title":"Hermes attack: Steal DNN models with lossless inference accuracy","volume-title":"Proc. USENIX Secur. Symp.","author":"Zhu"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00038"},{"key":"ref36","first-page":"8178","article-title":"Reverse-engineering deep relu networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Rolnick"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2023.3301451"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.107124"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00509"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01360"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01396"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00473"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_31"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00780"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833649"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560675"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560684"},{"key":"ref49","first-page":"314","article-title":"Scalable membership inference attacks via quantile regression","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Bertran"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00479"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SPW59333.2023.00013"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00050"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i3.25370"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00167"},{"key":"ref55","article-title":"Unsupervised video domain adaptation for action recognition: A disentanglement perspective","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Wei"},{"key":"ref56","article-title":"MADG: Margin-based adversarial learning for domain generalization","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Dayal"},{"key":"ref57","first-page":"56012","article-title":"Diversifying spatial-temporal perception for video domain generalization","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Lin"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00200"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00367"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-023-01913-8"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.09.091"},{"key":"ref62","first-page":"292","article-title":"Domain generalization via multidomain discriminant analysis","volume-title":"Proc. Uncertainty Artif. Intell. Conf.","author":"Hu"},{"key":"ref63","article-title":"Invariant risk minimization","author":"Arjovsky","year":"2019"},{"key":"ref64","first-page":"2189","article-title":"Environment inference for invariant learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Creager"},{"key":"ref65","first-page":"5815","article-title":"Out-of-distribution generalization via risk extrapolation (REx)","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Krueger"},{"key":"ref66","first-page":"7313","article-title":"Domain generalization using causal matching","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Mahajan"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6024"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5876"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00533"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220082"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/34.291440"},{"key":"ref73","article-title":"DIDA: The largest historical handwritten digit dataset with 250 k digits","author":"Kusetogullari","year":"2021"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966217"},{"key":"ref75","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.5555\/3454287.3455008"},{"key":"ref77","first-page":"1256","article-title":"Gradient starvation: A learning proclivity in neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Pezeshki"},{"issue":"11","key":"ref78","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref79","article-title":"An image is worth 16x16 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2020"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/69\/10750897\/10684294.pdf?arnumber=10684294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T23:54:37Z","timestamp":1732665277000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10684294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":79,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2024.3460806","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}