{"id":"https://openalex.org/W4290996582","doi":"https://doi.org/10.1109/icc45855.2022.9839219","title":"From adversarial examples to data poisoning instances: utilizing an adversarial attack method to poison a transfer learning model","display_name":"From adversarial examples to data poisoning instances: utilizing an adversarial attack method to poison a transfer learning model","publication_year":2022,"publication_date":"2022-05-16","ids":{"openalex":"https://openalex.org/W4290996582","doi":"https://doi.org/10.1109/icc45855.2022.9839219"},"language":"en","primary_location":{"id":"doi:10.1109/icc45855.2022.9839219","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45855.2022.9839219","pdf_url":null,"source":{"id":"https://openalex.org/S4363607711","display_name":"ICC 2022 - IEEE International Conference on Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2022 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100754189","display_name":"Jing Lin","orcid":"https://orcid.org/0000-0002-4606-470X"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jing Lin","raw_affiliation_strings":["University of South Florida,ICNS Lab and Cyber Florida,Tampa,Florida,USA","ICNS Lab and Cyber Florida, University of South Florida, Tampa, Florida, USA"],"affiliations":[{"raw_affiliation_string":"University of South Florida,ICNS Lab and Cyber Florida,Tampa,Florida,USA","institution_ids":["https://openalex.org/I2613432"]},{"raw_affiliation_string":"ICNS Lab and Cyber Florida, University of South Florida, Tampa, Florida, USA","institution_ids":["https://openalex.org/I2613432"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013281117","display_name":"Ryan Luley","orcid":"https://orcid.org/0000-0001-7751-6062"},"institutions":[{"id":"https://openalex.org/I1280414376","display_name":"United States Air Force Research Laboratory","ror":"https://ror.org/02e2egq70","country_code":"US","type":"facility","lineage":["https://openalex.org/I1280414376","https://openalex.org/I1330347796","https://openalex.org/I4210102105","https://openalex.org/I4389425425"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ryan Luley","raw_affiliation_strings":["U.S. Air Force Research Laboratory,High Performance Systems Branch,Rome,New York,USA","High Performance Systems Branch, U.S. Air Force Research Laboratory, Rome, New York, USA"],"affiliations":[{"raw_affiliation_string":"U.S. Air Force Research Laboratory,High Performance Systems Branch,Rome,New York,USA","institution_ids":["https://openalex.org/I1280414376"]},{"raw_affiliation_string":"High Performance Systems Branch, U.S. Air Force Research Laboratory, Rome, New York, USA","institution_ids":["https://openalex.org/I1280414376"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101689516","display_name":"Kaiqi Xiong","orcid":"https://orcid.org/0000-0003-2933-8083"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kaiqi Xiong","raw_affiliation_strings":["University of South Florida,ICNS Lab and Cyber Florida,Tampa,Florida,USA","ICNS Lab and Cyber Florida, University of South Florida, Tampa, Florida, USA"],"affiliations":[{"raw_affiliation_string":"University of South Florida,ICNS Lab and Cyber Florida,Tampa,Florida,USA","institution_ids":["https://openalex.org/I2613432"]},{"raw_affiliation_string":"ICNS Lab and Cyber Florida, University of South Florida, Tampa, Florida, USA","institution_ids":["https://openalex.org/I2613432"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100754189"],"corresponding_institution_ids":["https://openalex.org/I2613432"],"apc_list":null,"apc_paid":null,"fwci":0.733,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.7121959,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"2351","last_page":"2356"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11307","display_name":"Domain Adaptation and Few-Shot Learning","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7747335433959961},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.703691840171814},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6518517136573792},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5197698473930359},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.514765739440918},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.5115309953689575},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.43939071893692017},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43927186727523804},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.43027687072753906},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4172722101211548}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7747335433959961},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.703691840171814},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6518517136573792},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5197698473930359},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.514765739440918},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.5115309953689575},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43939071893692017},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43927186727523804},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.43027687072753906},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4172722101211548},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc45855.2022.9839219","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45855.2022.9839219","pdf_url":null,"source":{"id":"https://openalex.org/S4363607711","display_name":"ICC 2022 - IEEE International Conference on Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2022 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1576726980","https://openalex.org/W1673923490","https://openalex.org/W1686810756","https://openalex.org/W1871489475","https://openalex.org/W2056526977","https://openalex.org/W2108598243","https://openalex.org/W2112507308","https://openalex.org/W2118858186","https://openalex.org/W2128213565","https://openalex.org/W2162552722","https://openalex.org/W2165698076","https://openalex.org/W2194775991","https://openalex.org/W2612637113","https://openalex.org/W2946227741","https://openalex.org/W2983044655","https://openalex.org/W3116515605","https://openalex.org/W3118608800","https://openalex.org/W3173423020","https://openalex.org/W3213515577","https://openalex.org/W4200629388","https://openalex.org/W4226438687","https://openalex.org/W4235730433","https://openalex.org/W4255655703","https://openalex.org/W4287903513","https://openalex.org/W4293529028","https://openalex.org/W4298140072","https://openalex.org/W6631190155","https://openalex.org/W6634627538","https://openalex.org/W6637162671","https://openalex.org/W6637373629","https://openalex.org/W6639321117","https://openalex.org/W6641784307","https://openalex.org/W6676935882","https://openalex.org/W6677919164","https://openalex.org/W6681673350","https://openalex.org/W6684011098","https://openalex.org/W6685943642","https://openalex.org/W6738157205","https://openalex.org/W6750462152","https://openalex.org/W6752654261","https://openalex.org/W6772869672","https://openalex.org/W6776035094","https://openalex.org/W6787972765","https://openalex.org/W6797172672","https://openalex.org/W6805492805"],"related_works":["https://openalex.org/W3116352955","https://openalex.org/W3153780661","https://openalex.org/W4306180880","https://openalex.org/W2585881251","https://openalex.org/W2408141691","https://openalex.org/W2095577883","https://openalex.org/W4283220304","https://openalex.org/W3120979750","https://openalex.org/W3217564040","https://openalex.org/W3197643498"],"abstract_inverted_index":{"Despite":[0],"the":[1,28,45,104,115,119,131,180],"wide-ranging":[2],"applicability":[3],"of":[4,85,98,121,182],"machine":[5],"learning":[6,71,191],"methods,":[7],"they":[8],"are":[9],"vulnerable":[10],"to":[11,51,69,113,117,153,187,193,215,223],"security":[12],"attacks,":[13,88],"such":[14,228],"as":[15,47,218,229],"evasion":[16,24],"attacks":[17,99],"and":[18,208],"triggerless":[19,58,90,161],"data":[20,59,86,93,164],"poisoning":[21,60,87,94,165],"attacks.":[22,95],"An":[23,66],"attack":[25,61,130,157,166,171,207],"occurs":[26,62],"at":[27,63],"inference":[29],"time":[30],"when":[31],"an":[32,36,111,155,195],"attacker":[33,67,112],"feeds":[34],"in":[35,103],"adversarial":[37,156],"example,":[38],"a":[39,52,57,82,135,143,148,160,169,183,189,204,226,230],"malicious":[40],"perturbed":[41],"input":[42],"that":[43,106,138,210],"appears":[44],"same":[46],"its":[48],"untampered":[49,196],"copy":[50],"human":[53,144],"oracle.":[54,145],"In":[55,76],"contrast,":[56],"training":[64,123,132],"time.":[65],"tries":[68],"subvert":[70],"with":[72,134,168,203],"injected":[73],"poisoned":[74],"instances.":[75],"this":[77],"research,":[78],"we":[79,219],"focus":[80],"on":[81],"special":[83],"sub-category":[84],"namely":[89],"clean-label":[91,162],"targeted":[92,163,197],"This":[96],"type":[97],"is":[100,139,213],"more":[101],"realistic":[102],"sense":[105],"it":[107],"does":[108],"not":[109,221],"require":[110],"have":[114],"ability":[116],"change":[118],"label":[120],"any":[122],"instance.":[124,198],"That":[125],"is,":[126],"attackers":[127],"can":[128],"successfully":[129],"process":[133],"poison":[136,185],"instance":[137,186],"correctly":[140],"labeled":[141],"by":[142],"We":[146,199],"propose":[147],"simple":[149],"but":[150],"effective":[151],"way":[152],"alter":[154],"method":[158,167,177,202,212],"into":[159],"remarkable":[170],"success":[172],"rate.":[173],"Furthermore,":[174],"our":[175,201,211],"proposed":[176],"only":[178],"requires":[179],"injection":[181],"single":[184],"manipulate":[188],"transfer":[190],"model":[192],"misclassify":[194],"compare":[200],"popular":[205],"one-shot":[206],"show":[209],"easier":[214],"be":[216],"used":[217],"do":[220],"need":[222],"tune":[224],"for":[225],"hyperparameter":[227],"similarity":[231],"coefficient.":[232]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
