{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:43:17Z","timestamp":1765438997930,"version":"3.44.0"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021YFB3100400"],"award-info":[{"award-number":["2021YFB3100400"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62422208","62202276","62232010","62072278","62302265","U23A20332","U23A20273"],"award-info":[{"award-number":["62422208","62202276","62232010","62072278","62302265","U23A20332","U23A20273"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shandong Science Fund for Excellent Young Scholars","award":["2022HWYQ-038"],"award-info":[{"award-number":["2022HWYQ-038"]}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2023QF172","ZR2022LZH010"],"award-info":[{"award-number":["ZR2023QF172","ZR2022LZH010"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shandong Science Fund","award":["2023TSGC0105"],"award-info":[{"award-number":["2023TSGC0105"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1109\/tmc.2024.3486218","type":"journal-article","created":{"date-parts":[[2024,10,24]],"date-time":"2024-10-24T13:31:57Z","timestamp":1729776717000},"page":"1715-1730","source":"Crossref","is-referenced-by-count":3,"title":["Model Poisoning Attack Against Neural Network Interpreters in IoT Devices"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7939-6279","authenticated-orcid":false,"given":"Xianglong","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3746-2132","authenticated-orcid":false,"given":"Feng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3928-7753","authenticated-orcid":false,"given":"Huanle","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Jinan, China"}]},{"given":"Haoxin","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0403-3116","authenticated-orcid":false,"given":"Zhijian","family":"Huang","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9783-1366","authenticated-orcid":false,"given":"Lisheng","family":"Fan","sequence":"additional","affiliation":[{"name":"School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5912-4647","authenticated-orcid":false,"given":"Xiuzhen","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7935-886X","authenticated-orcid":false,"given":"Pengfei","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Jinan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3334589"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3266643"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3222821"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3216927"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560531"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"ref7","first-page":"1487","article-title":"Explanation-guided backdoor poisoning attacks against malware classifiers","volume-title":"Proc. USENIX Secur. Symp.","author":"Severi"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2018.00015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3173642"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3122865"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3027314"},{"key":"ref12","first-page":"24","article-title":"Extracting tree-structured representations of trained networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Craven"},{"key":"ref13","first-page":"77","article-title":"Making tree ensembles interpretable: A Bayesian model selection approach","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Hara"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(98)00181-2"},{"article-title":"Deep inside convolutional networks: Visualising image classification models and saliency maps","year":"2013","author":"Simonyan","key":"ref15"},{"key":"ref16","first-page":"3319","article-title":"Axiomatic attribution for deep networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Sundararajan"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2018.00097"},{"article-title":"Smooth Grad-CAM++: An enhanced inference level visualization technique for deep convolutional neural network models","year":"2019","author":"Omeiza","key":"ref19"},{"key":"ref20","first-page":"972","article-title":"Ablation-CAM: Visual explanations for deep convolutional network via gradient-free localization","volume-title":"Proc. IEEE\/CVF Winter Conf. Appl. Comput. Vis.","author":"Ramaswamy"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009852"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013681"},{"key":"ref23","first-page":"13589","article-title":"Explanations can be manipulated and geometry is to blame","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Dombrowski"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220099"},{"key":"ref25","first-page":"1659","article-title":"Interpretable deep learning under fire","volume-title":"Proc. 29th {USENIX} Secur. Symp.","author":"Zhang"},{"key":"ref26","first-page":"2925","article-title":"Fooling neural network interpretations via adversarial model manipulation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Heo"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467405"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179308"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6871"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3468218.3469046"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423362"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3175616"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3021407"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484576"},{"key":"ref35","first-page":"1523","article-title":"Graph backdoor","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Xi"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3636534.3649345"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243757"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3280133"},{"key":"ref40","first-page":"2671","article-title":"A data-free backdoor injection approach in neural networks","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Lv"},{"key":"ref41","first-page":"2707","article-title":"Aliasing backdoor attacks on pre-trained models","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Wei"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403064"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00211"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2004.383"},{"article-title":"Rigid-motion scattering for image classification","year":"2014","author":"Sifre","key":"ref47"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1038\/nature21056"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00034"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359790"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7755\/10874847\/10734226.pdf?arnumber=10734226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T19:48:55Z","timestamp":1755546535000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10734226\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":53,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2024.3486218","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"type":"print","value":"1536-1233"},{"type":"electronic","value":"1558-0660"},{"type":"electronic","value":"2161-9875"}],"subject":[],"published":{"date-parts":[[2025,3]]}}}