{"id":"https://openalex.org/W7124145781","doi":"https://doi.org/10.1109/mci.2025.3631574","title":"Adversarial Attacks on Evolutionary Algorithms Solving Data-Driven Optimization Problems [Research Frontier]","display_name":"Adversarial Attacks on Evolutionary Algorithms Solving Data-Driven Optimization Problems [Research Frontier]","publication_year":2026,"publication_date":"2026-01-14","ids":{"openalex":"https://openalex.org/W7124145781","doi":"https://doi.org/10.1109/mci.2025.3631574"},"language":null,"primary_location":{"id":"doi:10.1109/mci.2025.3631574","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mci.2025.3631574","pdf_url":null,"source":{"id":"https://openalex.org/S104797584","display_name":"IEEE Computational Intelligence Magazine","issn_l":"1556-603X","issn":["1556-603X","1556-6048"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Computational Intelligence Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030608884","display_name":"Limiao Zhang","orcid":"https://orcid.org/0000-0002-0072-4047"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Limiao Zhang","raw_affiliation_strings":["Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123009867","display_name":"Jiacheng Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiacheng Liu","raw_affiliation_strings":["Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123021730","display_name":"Ran Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ran Wang","raw_affiliation_strings":["Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123030707","display_name":"Ye Tian","orcid":null},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ye Tian","raw_affiliation_strings":["Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123045827","display_name":"Yaochu Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I3133055985","display_name":"Westlake University","ror":"https://ror.org/05hfa4n20","country_code":"CN","type":"education","lineage":["https://openalex.org/I3133055985"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaochu Jin","raw_affiliation_strings":["Westlake University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Westlake University, Hangzhou, China","institution_ids":["https://openalex.org/I3133055985"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123053031","display_name":"Xingyi Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingyi Zhang","raw_affiliation_strings":["Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5030608884"],"corresponding_institution_ids":["https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10313615,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":"1","first_page":"69","last_page":"86"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.5034999847412109,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.5034999847412109,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.04280000180006027,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13918","display_name":"Advanced Data and IoT Technologies","score":0.039400000125169754,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/evolutionary-algorithm","display_name":"Evolutionary algorithm","score":0.7784000039100647},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7702999711036682},{"id":"https://openalex.org/keywords/evolutionary-computation","display_name":"Evolutionary computation","score":0.5252000093460083},{"id":"https://openalex.org/keywords/optimization-problem","display_name":"Optimization problem","score":0.4442000091075897},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4253999888896942},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4163999855518341},{"id":"https://openalex.org/keywords/evolutionary-programming","display_name":"Evolutionary programming","score":0.37770000100135803}],"concepts":[{"id":"https://openalex.org/C159149176","wikidata":"https://www.wikidata.org/wiki/Q14489129","display_name":"Evolutionary algorithm","level":2,"score":0.7784000039100647},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7702999711036682},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7005000114440918},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5392000079154968},{"id":"https://openalex.org/C105902424","wikidata":"https://www.wikidata.org/wiki/Q1197129","display_name":"Evolutionary computation","level":2,"score":0.5252000093460083},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.4442000091075897},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4253999888896942},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4163999855518341},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.399399995803833},{"id":"https://openalex.org/C121835503","wikidata":"https://www.wikidata.org/wiki/Q2596288","display_name":"Evolutionary programming","level":3,"score":0.37770000100135803},{"id":"https://openalex.org/C41445625","wikidata":"https://www.wikidata.org/wiki/Q5418685","display_name":"Evolutionary acquisition of neural topologies","level":4,"score":0.3625999987125397},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3416999876499176},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.30970001220703125},{"id":"https://openalex.org/C2987595161","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Optimization algorithm","level":2,"score":0.2978000044822693},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.2964000105857849},{"id":"https://openalex.org/C177918212","wikidata":"https://www.wikidata.org/wiki/Q803623","display_name":"Perturbation (astronomy)","level":2,"score":0.2752000093460083},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2750999927520752},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.27160000801086426},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.26829999685287476},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.2542000114917755}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mci.2025.3631574","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mci.2025.3631574","pdf_url":null,"source":{"id":"https://openalex.org/S104797584","display_name":"IEEE Computational Intelligence Magazine","issn_l":"1556-603X","issn":["1556-603X","1556-6048"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Computational Intelligence Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3241072966","display_name":null,"funder_award_id":"62522301","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G716094924","display_name":null,"funder_award_id":"62276001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7887348775","display_name":null,"funder_award_id":"62302009","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8224461771","display_name":null,"funder_award_id":"2308085J03","funder_id":"https://openalex.org/F4320334897","funder_display_name":"Natural Science Foundation of Anhui Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334897","display_name":"Natural Science Foundation of Anhui Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W81454122","https://openalex.org/W1544436025","https://openalex.org/W1555106872","https://openalex.org/W1595159159","https://openalex.org/W1608348795","https://openalex.org/W1776713878","https://openalex.org/W1803713235","https://openalex.org/W1974246280","https://openalex.org/W2030295525","https://openalex.org/W2036950253","https://openalex.org/W2050845158","https://openalex.org/W2065148320","https://openalex.org/W2100505193","https://openalex.org/W2104017154","https://openalex.org/W2107812025","https://openalex.org/W2112036188","https://openalex.org/W2123808725","https://openalex.org/W2126105956","https://openalex.org/W2139196352","https://openalex.org/W2142577776","https://openalex.org/W2150046657","https://openalex.org/W2152195021","https://openalex.org/W2166364496","https://openalex.org/W2180612164","https://openalex.org/W2243397390","https://openalex.org/W2550453031","https://openalex.org/W2604425977","https://openalex.org/W2764251381","https://openalex.org/W2773170687","https://openalex.org/W2946739419","https://openalex.org/W2963448658","https://openalex.org/W2963857521","https://openalex.org/W2965198951","https://openalex.org/W2966238001","https://openalex.org/W2980006675","https://openalex.org/W3012911890","https://openalex.org/W3083018510","https://openalex.org/W3105604018","https://openalex.org/W3206292455","https://openalex.org/W4205328705","https://openalex.org/W4220803909","https://openalex.org/W4230167402","https://openalex.org/W4293846201","https://openalex.org/W4319927896","https://openalex.org/W4390769586","https://openalex.org/W4396877741","https://openalex.org/W4401070698","https://openalex.org/W4401767096","https://openalex.org/W4410237514"],"related_works":[],"abstract_inverted_index":{"Over":[0],"the":[1,77,90,143,183,205,214,223,237],"past":[2],"decades,":[3],"extensive":[4],"research":[5,48],"has":[6],"been":[7,60],"conducted":[8],"on":[9,70,161],"adversarial":[10,45,52,105],"attacks":[11,53,64,199],"and":[12,130,146,154,166,232],"defense":[13],"mechanisms":[14],"in":[15,19,54,85,229],"deep":[16,71],"learning,":[17],"particularly":[18],"real-world":[20,117,230],"applications":[21,231],"such":[22,63],"as":[23],"autonomous":[24],"vehicles,":[25],"medical":[26],"diagnosis,":[27],"etc.":[28],"Recent":[29],"studies":[30],"have":[31,57],"revealed":[32],"that":[33,36,126],"evolutionary":[34,86,109,187,194,210,218,226,242],"algorithms":[35,110,195],"solve":[37],"data-driven":[38,112],"optimization":[39,113,168],"problems":[40],"are":[41,176,192],"also":[42,135,212],"vulnerable":[43],"to":[44,50,76,141,198],"attacks.":[46],"However,":[47],"endeavors":[49],"address":[51,97],"this":[55,98,100,120],"context":[56],"not":[58],"yet":[59],"initiated.":[61],"Conducting":[62],"is":[65,156],"more":[66,196],"challenging":[67],"than":[68,200],"those":[69],"neural":[72],"networks,":[73],"primarily":[74],"due":[75],"absence":[78],"of":[79,92,150,182,216,225,240],"defined":[80],"gradients":[81],"or":[82],"loss":[83],"functions":[84],"algorithms,":[87],"which":[88],"complicates":[89],"application":[91],"existing":[93],"attack":[94,106,124],"methods.":[95],"To":[96,115],"issue,":[99],"paper":[101,121],"introduces":[102],"a":[103,137,179],"novel":[104],"model":[107,116,153],"targeting":[108],"solving":[111],"problems.":[114,169],"malicious":[118],"behaviors,":[119],"proposes":[122],"an":[123],"algorithm":[125,155,188,211,227],"develops":[127],"perturbation":[128,181,206],"cutoff":[129],"subpopulation":[131],"filtering":[132],"strategies,":[133],"while":[134],"supporting":[136],"new":[138],"sparse":[139],"operator":[140],"ensure":[142],"attack\u2019s":[144],"destructiveness":[145],"imperceptibility.":[147],"The":[148],"effectiveness":[149],"our":[151],"proposed":[152],"demonstrated":[157],"through":[158],"experimental":[159],"evaluation":[160],"datasets":[162],"for":[163],"both":[164],"single-":[165],"multi-objective":[167],"Through":[170],"these":[171],"experiments,":[172],"three":[173],"key":[174],"questions":[175],"addressed:":[177],"Can":[178],"small":[180],"dataset":[184],"significantly":[185],"degrade":[186,213],"performance?":[189],"If":[190],"so,":[191],"robust":[193],"resistant":[197],"conventional":[201],"ones?":[202],"Furthermore,":[203],"can":[204],"generated":[207],"by":[208],"one":[209],"performance":[215],"other":[217],"algorithms?":[219],"This":[220],"study":[221],"emphasizes":[222],"importance":[224],"safety":[228],"provides":[233],"valuable":[234],"insights":[235],"into":[236],"future":[238],"development":[239],"trustworthy":[241],"algorithms.":[243]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-15T00:00:00"}
