{"id":"https://openalex.org/W4413639921","doi":"https://doi.org/10.1109/csr64739.2025.11130067","title":"Surrogate-Guided Adversarial Attacks: Enabling White-Box Methods in Black-Box Scenarios","display_name":"Surrogate-Guided Adversarial Attacks: Enabling White-Box Methods in Black-Box Scenarios","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413639921","doi":"https://doi.org/10.1109/csr64739.2025.11130067"},"language":"en","primary_location":{"id":"doi:10.1109/csr64739.2025.11130067","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130067","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.1109/CSR64739.2025.11130067","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092311801","display_name":"Dimitrios Christos Asimopoulos","orcid":"https://orcid.org/0009-0009-6439-0857"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Dimitrios Christos Asimopoulos","raw_affiliation_strings":["MetaMind Innovations,Kozani,Greece"],"affiliations":[{"raw_affiliation_string":"MetaMind Innovations,Kozani,Greece","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025891312","display_name":"Panagiotis Radoglou\u2010Grammatikis","orcid":"https://orcid.org/0000-0003-1605-9413"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Panagiotis Radoglou-Grammatikis","raw_affiliation_strings":["K3Y Ltd,Sofia,Bulgaria"],"affiliations":[{"raw_affiliation_string":"K3Y Ltd,Sofia,Bulgaria","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025262737","display_name":"Panagiotis Fouliras","orcid":"https://orcid.org/0000-0002-0879-7005"},"institutions":[{"id":"https://openalex.org/I192756129","display_name":"University of Macedonia","ror":"https://ror.org/05fg6gr82","country_code":"GR","type":"education","lineage":["https://openalex.org/I192756129"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Panagiotis Fouliras","raw_affiliation_strings":["University of Macedonia,Department of Applied Informatics,Thessaloniki,Greece"],"affiliations":[{"raw_affiliation_string":"University of Macedonia,Department of Applied Informatics,Thessaloniki,Greece","institution_ids":["https://openalex.org/I192756129"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088043053","display_name":"Konstandinos Panitsidis","orcid":"https://orcid.org/0000-0001-8299-1511"},"institutions":[{"id":"https://openalex.org/I89506807","display_name":"University of Western Macedonia","ror":"https://ror.org/00a5pe906","country_code":"GR","type":"education","lineage":["https://openalex.org/I89506807"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Konstandinos Panitsidis","raw_affiliation_strings":["University of Western Macedonia,Department of Management Science &#x0026; Technology,Kozani,Greece"],"affiliations":[{"raw_affiliation_string":"University of Western Macedonia,Department of Management Science &#x0026; Technology,Kozani,Greece","institution_ids":["https://openalex.org/I89506807"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079846617","display_name":"Georgios Efstathopoulos","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Georgios Efstathopoulos","raw_affiliation_strings":["MetaMind Innovations,Kozani,Greece"],"affiliations":[{"raw_affiliation_string":"MetaMind Innovations,Kozani,Greece","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066475089","display_name":"\u0398\u03c9\u03bc\u03ac\u03c2 \u039b\u03ac\u03b3\u03ba\u03b1\u03c2","orcid":"https://orcid.org/0000-0002-0749-9794"},"institutions":[{"id":"https://openalex.org/I147962203","display_name":"Democritus University of Thrace","ror":"https://ror.org/03bfqnx40","country_code":"GR","type":"education","lineage":["https://openalex.org/I147962203"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Thomas Lagkas","raw_affiliation_strings":["Democritus University of Thrace,Department of Computer Science,Kavala,Greece"],"affiliations":[{"raw_affiliation_string":"Democritus University of Thrace,Department of Computer Science,Kavala,Greece","institution_ids":["https://openalex.org/I147962203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013565466","display_name":"Vasileios Argyriou","orcid":"https://orcid.org/0000-0003-4679-8049"},"institutions":[{"id":"https://openalex.org/I205051169","display_name":"Kingston University","ror":"https://ror.org/05bbqza97","country_code":"GB","type":"education","lineage":["https://openalex.org/I205051169"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Vasileios Argyriou","raw_affiliation_strings":["Kingston University London,Department of Networks and Digital Media,Penrhyn Road,UK"],"affiliations":[{"raw_affiliation_string":"Kingston University London,Department of Networks and Digital Media,Penrhyn Road,UK","institution_ids":["https://openalex.org/I205051169"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013706552","display_name":"Igor Kotsiuba","orcid":"https://orcid.org/0000-0003-2878-6060"},"institutions":[{"id":"https://openalex.org/I190082696","display_name":"Durham University","ror":"https://ror.org/01v29qb04","country_code":"GB","type":"education","lineage":["https://openalex.org/I190082696"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Igor Kotsiuba","raw_affiliation_strings":["Durham University Business School,Millhill Ln,UK"],"affiliations":[{"raw_affiliation_string":"Durham University Business School,Millhill Ln,UK","institution_ids":["https://openalex.org/I190082696"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050756789","display_name":"Panagiotis Sarigiannidis","orcid":"https://orcid.org/0000-0001-6042-0355"},"institutions":[{"id":"https://openalex.org/I89506807","display_name":"University of Western Macedonia","ror":"https://ror.org/00a5pe906","country_code":"GR","type":"education","lineage":["https://openalex.org/I89506807"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Panagiotis Sarigiannidis","raw_affiliation_strings":["University of Western Macedonia,Department of Electrical and Computer Engineering,Kozani,Greece"],"affiliations":[{"raw_affiliation_string":"University of Western Macedonia,Department of Electrical and Computer Engineering,Kozani,Greece","institution_ids":["https://openalex.org/I89506807"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5092311801"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12869586,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"950","last_page":"956"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9782000184059143,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.7943737506866455},{"id":"https://openalex.org/keywords/white-box","display_name":"White box","score":0.7798932194709778},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7065800428390503},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6492311954498291},{"id":"https://openalex.org/keywords/s-box","display_name":"S-box","score":0.4423426687717438},{"id":"https://openalex.org/keywords/white","display_name":"White (mutation)","score":0.4391053318977356},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3073665499687195},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22005394101142883},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.16214019060134888},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.1507604420185089},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.08817553520202637}],"concepts":[{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.7943737506866455},{"id":"https://openalex.org/C180932941","wikidata":"https://www.wikidata.org/wiki/Q997233","display_name":"White box","level":2,"score":0.7798932194709778},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7065800428390503},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6492311954498291},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.4423426687717438},{"id":"https://openalex.org/C56273599","wikidata":"https://www.wikidata.org/wiki/Q3122841","display_name":"White (mutation)","level":3,"score":0.4391053318977356},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3073665499687195},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22005394101142883},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.16214019060134888},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.1507604420185089},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.08817553520202637},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/csr64739.2025.11130067","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130067","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},{"id":"pmh:oai:zenodo.org:17169719","is_oa":true,"landing_page_url":"https://doi.org/10.1109/CSR64739.2025.11130067","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferencePaper"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:17169719","is_oa":true,"landing_page_url":"https://doi.org/10.1109/CSR64739.2025.11130067","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferencePaper"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334322","display_name":"HORIZON EUROPE Framework Programme","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2047881532","https://openalex.org/W2727407240","https://openalex.org/W2968276623","https://openalex.org/W154189287","https://openalex.org/W3033197410","https://openalex.org/W4206598047","https://openalex.org/W1984273188","https://openalex.org/W3105637246","https://openalex.org/W4287626382","https://openalex.org/W4412807808"],"abstract_inverted_index":{"Adversarial":[0],"attacks":[1,11,70,73,112,150],"pose":[2],"significant":[3],"threats":[4],"to":[5,43,67,93],"machine":[6,188],"learning":[7,189],"models,":[8,78],"with":[9],"white-box":[10,69,111,163],"such":[12,126],"as":[13,127,152,154],"Fast":[14],"Gradient":[15,20],"Sign":[16],"Method":[17,26],"(FGSM),":[18],"Projected":[19],"Descent":[21],"(PGD),":[22],"and":[23,83,142,164,180],"Basic":[24],"Iterative":[25],"(BIM)":[27],"achieving":[28],"high":[29],"success":[30,139],"rates":[31],"when":[32],"model":[33,44,92,102],"gradients":[34],"are":[35],"accessible.":[36],"However,":[37],"in":[38,113,135,176],"real-world":[39],"scenarios,":[40],"direct":[41],"access":[42],"internals":[45],"is":[46],"often":[47],"restricted,":[48],"necessitating":[49],"black-box":[50,72,115,124,156,165],"attack":[51,138],"strategies":[52],"that":[53,148],"typically":[54],"suffer":[55],"from":[56],"lower":[57],"effectiveness.":[58],"In":[59],"this":[60],"work,":[61],"we":[62],"propose":[63],"a":[64,90,114],"novel":[65],"approach":[66,121],"transform":[68],"into":[71,183],"by":[74],"leveraging":[75],"state-of-the-art":[76],"surrogate":[77,91,174],"including":[79],"MultiLayer":[80],"Perceptrons":[81],"(MLP)":[82],"XGBoost":[84],"(XGB).":[85],"Our":[86],"method":[87],"involves":[88],"training":[89],"mimic":[94],"the":[95,107,159,171,184],"decision":[96],"boundaries":[97],"of":[98,109,137,173,186],"an":[99],"inaccessible":[100],"target":[101],"using":[103],"pseudo-labeling,":[104],"thereby":[105],"enabling":[106],"application":[108],"gradient-based":[110],"setting.":[116],"We":[117],"systematically":[118],"compare":[119],"our":[120],"against":[122,191],"conventional":[123],"attacks,":[125],"Zero":[128],"Order":[129],"Optimization":[130],"(ZOO),":[131],"evaluating":[132],"their":[133],"effectiveness":[134],"terms":[136],"rates,":[140],"transferability,":[141],"computational":[143],"efficiency.":[144],"The":[145],"results":[146],"demonstrate":[147],"surrogate-assisted":[149],"perform":[151],"good":[153],"standard":[155],"methods,":[157],"bridging":[158],"performance":[160],"gap":[161],"between":[162],"adversarial":[166,178,192],"attacks.":[167],"This":[168],"study":[169],"highlights":[170],"power":[172],"models":[175],"enhancing":[177],"transferability":[179],"provides":[181],"insights":[182],"robustness":[185],"different":[187],"architectures":[190],"threats.":[193]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
