{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:20:36Z","timestamp":1740100836899,"version":"3.37.3"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T00:00:00Z","timestamp":1655078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T00:00:00Z","timestamp":1655078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006285","name":"FHWA","doi-asserted-by":"publisher","award":["693JJ31950016"],"award-info":[{"award-number":["693JJ31950016"]}],"id":[{"id":"10.13039\/100006285","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,13]]},"DOI":"10.23919\/ifipnetworking55013.2022.9829803","type":"proceedings-article","created":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T16:42:14Z","timestamp":1658508134000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Query-Efficient and Imperceptible Attacks on Multivariate Time Series DNN Models"],"prefix":"10.23919","author":[{"given":"Haiying","family":"Shen","sequence":"first","affiliation":[{"name":"University of Virginia,Charlottesville,VA,22904"}]},{"given":"Fan","family":"Yao","sequence":"additional","affiliation":[{"name":"University of Virginia,Charlottesville,VA,22904"}]},{"given":"Tanmoy","family":"Sen","sequence":"additional","affiliation":[{"name":"University of Virginia,Charlottesville,VA,22904"}]},{"given":"Gustavo","family":"Moreira","sequence":"additional","affiliation":[{"name":"University of Virginia,Charlottesville,VA,22904"}]},{"given":"Ankur","family":"Sarker","sequence":"additional","affiliation":[{"name":"University of Virginia,Charlottesville,VA,22904"}]}],"member":"263","reference":[{"key":"ref31","article-title":"Maximal jacobian-based saliency map attack","author":"wiyatno","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref30","article-title":"Bayesopt adversarial attack","author":"ru","year":"0","journal-title":"Proc of ICLR"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref11","article-title":"Deepx-plore: Automated whitebox testing of deep learning systems","author":"pei","year":"0","journal-title":"Proc of SOSP"},{"key":"ref12","article-title":"Deep k-nearest neighbors: Towards confident, interpretable and robust deep learning","author":"papernot","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref13","article-title":"Black-box adversarial attacks with bayesian optimization","author":"shukla","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00506"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.3301742"},{"key":"ref17","article-title":"Know your master: Driver profiling-based anti-theft method","author":"il kwak","year":"0","journal-title":"Proc of PST"},{"key":"ref18","article-title":"One sparse perturbation to fool them all, almost always","author":"ghosh","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4086\/toc.2012.v008a006"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.09.031"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966039"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326074"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2019.04.014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219909"},{"key":"ref7","article-title":"Darts: Deceiving autonomous cars with toxic signs","author":"sitawarin","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241548"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/366"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00004"},{"key":"ref21","article-title":"Query-efficient hard-label black-box attack: An optimization-based approach","author":"cheng","year":"0","journal-title":"Proc of ICLR"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1137\/120880811"},{"key":"ref23","article-title":"Zeroth-order (non)-convex stochastic optimization via conditional gradient and gradient updates","author":"balasubramanian","year":"0","journal-title":"Proc of NISP"},{"journal-title":"UCI Machine Learning Repository","year":"2007","author":"asuncion","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2010.5563892"}],"event":{"name":"2022 IFIP Networking Conference (IFIP Networking)","start":{"date-parts":[[2022,6,13]]},"location":"Catania, Italy","end":{"date-parts":[[2022,6,16]]}},"container-title":["2022 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9829715\/9829755\/09829803.pdf?arnumber=9829803","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T20:23:48Z","timestamp":1662409428000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9829803\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,13]]},"references-count":31,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking55013.2022.9829803","relation":{},"subject":[],"published":{"date-parts":[[2022,6,13]]}}}