{"id":"https://openalex.org/W3002142755","doi":"https://doi.org/10.1109/access.2020.2969276","title":"Model Capacity Vulnerability in Hyper-Parameters Estimation","display_name":"Model Capacity Vulnerability in Hyper-Parameters Estimation","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3002142755","doi":"https://doi.org/10.1109/access.2020.2969276","mag":"3002142755"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.2969276","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2969276","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08968431.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08968431.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103149594","display_name":"Wentao Zhao","orcid":"https://orcid.org/0000-0002-2906-3238"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wentao Zhao","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100441059","display_name":"Xiao Liu","orcid":"https://orcid.org/0000-0002-1883-2230"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao Liu","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100409530","display_name":"Qiang Liu","orcid":"https://orcid.org/0000-0003-2922-3518"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiang Liu","raw_affiliation_strings":["College of Computer Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047281176","display_name":"Jiuren Chen","orcid":"https://orcid.org/0000-0002-8318-6757"},"institutions":[{"id":"https://openalex.org/I4210119692","display_name":"Numerical Method (China)","ror":"https://ror.org/02ns8zp42","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210119692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiuren Chen","raw_affiliation_strings":["Science and Technology on Test Physics and Numerical Mathematic Laboratory, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Test Physics and Numerical Mathematic Laboratory, Beijing, China","institution_ids":["https://openalex.org/I4210119692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100455174","display_name":"Pan Li","orcid":"https://orcid.org/0000-0001-7025-6878"},"institutions":[{"id":"https://openalex.org/I166337079","display_name":"Queen Mary University of London","ror":"https://ror.org/026zzn846","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I166337079"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Pan Li","raw_affiliation_strings":["School of Electronic Engineering and Computer Science, Queen Mary University of London, London, U.K"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering and Computer Science, Queen Mary University of London, London, U.K","institution_ids":["https://openalex.org/I166337079"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5103149594"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.2743,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.62044004,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"8","issue":null,"first_page":"21602","last_page":"21612"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9017999768257141,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7834095358848572},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7227233052253723},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5840874910354614},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5540602803230286},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.49942564964294434},{"id":"https://openalex.org/keywords/estimation","display_name":"Estimation","score":0.46907633543014526},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46857118606567383},{"id":"https://openalex.org/keywords/polynomial","display_name":"Polynomial","score":0.4132331907749176},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.41077151894569397},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3240346312522888},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23712864518165588},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1575573980808258},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09775480628013611}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7834095358848572},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7227233052253723},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5840874910354614},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5540602803230286},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.49942564964294434},{"id":"https://openalex.org/C96250715","wikidata":"https://www.wikidata.org/wiki/Q965330","display_name":"Estimation","level":2,"score":0.46907633543014526},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46857118606567383},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.4132331907749176},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.41077151894569397},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3240346312522888},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23712864518165588},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1575573980808258},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09775480628013611},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.2969276","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2969276","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08968431.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b66dfdfe0f15463c82799ad76bceecb3","is_oa":true,"landing_page_url":"https://doaj.org/article/b66dfdfe0f15463c82799ad76bceecb3","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 21602-21612 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.2969276","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2969276","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08968431.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2647419301","display_name":null,"funder_award_id":"2018JJ3611","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2702356746","display_name":null,"funder_award_id":"61702","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3863937708","display_name":null,"funder_award_id":"18-03","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4020255992","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4135978206","display_name":null,"funder_award_id":"U1811462","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4584358729","display_name":null,"funder_award_id":"2018JJ3611","funder_id":"https://openalex.org/F4320322843","funder_display_name":"Natural Science Foundation of\u00a0Hunan Province"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7063847093","display_name":null,"funder_award_id":"61702539","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7164151747","display_name":null,"funder_award_id":"U181146","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322843","display_name":"Natural Science Foundation of\u00a0Hunan Province","ror":null},{"id":"https://openalex.org/F4320324150","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3002142755.pdf","grobid_xml":"https://content.openalex.org/works/W3002142755.grobid-xml"},"referenced_works_count":49,"referenced_works":["https://openalex.org/W9657784","https://openalex.org/W1968411139","https://openalex.org/W2061933243","https://openalex.org/W2085261163","https://openalex.org/W2088454850","https://openalex.org/W2095195675","https://openalex.org/W2114296159","https://openalex.org/W2136504847","https://openalex.org/W2142992973","https://openalex.org/W2167489506","https://openalex.org/W2167529272","https://openalex.org/W2293844262","https://openalex.org/W2410216425","https://openalex.org/W2460937040","https://openalex.org/W2509109313","https://openalex.org/W2535873859","https://openalex.org/W2557044351","https://openalex.org/W2591788621","https://openalex.org/W2791319131","https://openalex.org/W2793638182","https://openalex.org/W2793918791","https://openalex.org/W2808027476","https://openalex.org/W2808129757","https://openalex.org/W2808300662","https://openalex.org/W2853623529","https://openalex.org/W2884222111","https://openalex.org/W2885832006","https://openalex.org/W2887269903","https://openalex.org/W2888630264","https://openalex.org/W2921723678","https://openalex.org/W2942997395","https://openalex.org/W2946457369","https://openalex.org/W2962763344","https://openalex.org/W2963888996","https://openalex.org/W2963903822","https://openalex.org/W2986040515","https://openalex.org/W3120740533","https://openalex.org/W4241653265","https://openalex.org/W4300511536","https://openalex.org/W6600428322","https://openalex.org/W6680140577","https://openalex.org/W6680744341","https://openalex.org/W6696889897","https://openalex.org/W6714085031","https://openalex.org/W6719080892","https://openalex.org/W6725794477","https://openalex.org/W6730054736","https://openalex.org/W6734028196","https://openalex.org/W6739088070"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W1756374135","https://openalex.org/W2062873522","https://openalex.org/W2947584067","https://openalex.org/W2280562859","https://openalex.org/W230721595","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2789975780"],"abstract_inverted_index":{"Machine":[0],"learning":[1],"models":[2],"are":[3],"vulnerable":[4],"to":[5,27,92],"a":[6,127],"variety":[7],"of":[8,18,34,41,59,69,87,96,120,130],"data":[9,108],"perturbation.":[10],"Recent":[11],"research":[12,37],"mainly":[13],"focuses":[14],"on":[15,66,83,102],"the":[16,35,39,64,67,79,85,94,97,112,117,121],"vulnerability":[17,40,58,76,113],"model":[19,42,49,60,70,124],"training":[20],"and":[21,105],"proposes":[22],"various":[23],"model-oriented":[24,88,138],"defense":[25,139],"methods":[26],"achieve":[28],"robust":[29],"machine":[30],"learning.":[31],"However,":[32],"most":[33],"existing":[36],"overlooks":[38],"capacity,":[43],"which":[44,84],"is":[45,90],"more":[46],"fundamental":[47],"for":[48,78],"performance.":[50],"In":[51],"this":[52,75],"paper,":[53],"we":[54],"study":[55],"an":[56],"adversarial":[57,98],"capacity":[61],"caused":[62],"by":[63,125,137],"poisoning":[65,126],"estimation":[68,119],"hyper-parameters.":[71],"We":[72],"further":[73],"implement":[74],"catering":[77],"polynomial":[80,122],"regression":[81,123],"model,":[82],"evading":[86],"detection":[89],"challenging,":[91],"illustrate":[93],"effectiveness":[95],"vulnerability.":[99],"Extensive":[100],"experiments":[101],"one":[103],"synthetic":[104],"three":[106],"real-world":[107],"sets":[109],"demonstrate":[110],"that":[111,133],"can":[114],"effectively":[115],"mislead":[116],"hyper-parameter":[118],"few":[128],"numbers":[129],"camouflage":[131],"samples":[132],"cannot":[134],"be":[135],"detected":[136],"methods.":[140]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
