{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:42:53Z","timestamp":1767339773907},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T00:00:00Z","timestamp":1693958400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T00:00:00Z","timestamp":1693958400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,6]]},"DOI":"10.1109\/wisee58383.2023.10289604","type":"proceedings-article","created":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T17:49:31Z","timestamp":1698256171000},"page":"148-153","source":"Crossref","is-referenced-by-count":2,"title":["Adversarial Attacks on Resource Management in P2P Wireless Communications"],"prefix":"10.1109","author":[{"given":"Ahmad","family":"Ghasemi","sequence":"first","affiliation":[{"name":"Worcester Polytechnic Institute (WPI),Department of Data Science,Worcester,MA,USA"}]},{"given":"Ehsan","family":"Zeraatkar","sequence":"additional","affiliation":[{"name":"Shiraz Urban Railway Organization,Shiraz,Iran"}]},{"given":"Majid","family":"Moradikia","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute (WPI),Department of Data Science,Worcester,MA,USA"}]},{"given":"Seyed Reza","family":"Zekavat","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute (WPI),Department of Data Science,Worcester,MA,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3056077"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WOCC48579.2020.9114913"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10776-021-00504-z"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2939314"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.330"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3036965"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3091551"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2901469"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps52748.2021.9682097"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6807948"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15763-9_17"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2022.3205184"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1215"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"Goodfellow","key":"ref14"},{"key":"ref15","first-page":"1115","article-title":"Adversarial attack on graph structured data","volume-title":"International conference on machine learning","author":"Dai"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35476-2_13"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2022.3201243"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2332432.2332470"},{"article-title":"Multi-agent adversarial attacks for multi-channel communications","year":"2022","author":"Dong","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23236"},{"article-title":"Adam: A method for stochastic optimization","year":"2014","author":"Kingma","key":"ref21"}],"event":{"name":"2023 IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE)","start":{"date-parts":[[2023,9,6]]},"location":"Aveiro, Portugal","end":{"date-parts":[[2023,9,8]]}},"container-title":["2023 IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10288582\/10289128\/10289604.pdf?arnumber=10289604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T10:13:38Z","timestamp":1709374418000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10289604\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/wisee58383.2023.10289604","relation":{},"subject":[],"published":{"date-parts":[[2023,9,6]]}}}