{"id":"https://openalex.org/W7140088307","doi":"https://doi.org/10.1109/tccn.2026.3676434","title":"Black-Box Attacks on DOA Estimation","display_name":"Black-Box Attacks on DOA Estimation","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7140088307","doi":"https://doi.org/10.1109/tccn.2026.3676434"},"language":null,"primary_location":{"id":"doi:10.1109/tccn.2026.3676434","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tccn.2026.3676434","pdf_url":null,"source":{"id":"https://openalex.org/S2484188435","display_name":"IEEE Transactions on Cognitive Communications and Networking","issn_l":"2332-7731","issn":["2332-7731","2372-2045"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cognitive Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121113445","display_name":"Shilian Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shilian Zheng","raw_affiliation_strings":["College of Communication Engineering, Hangzhou Dianzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Communication Engineering, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044151277","display_name":"Xiaoxiang Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoxiang Wu","raw_affiliation_strings":["College of Communication Engineering, Hangzhou Dianzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Communication Engineering, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101929963","display_name":"Luxin Zhang","orcid":"https://orcid.org/0000-0002-3121-0364"},"institutions":[{"id":"https://openalex.org/I4210124847","display_name":"National Engineering Research Center of Electromagnetic Radiation Control Materials","ror":"https://ror.org/02k4dcs46","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210124847"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Luxin Zhang","raw_affiliation_strings":["National Key Laboratory of Electromagnetic Space Security, Jiaxing, China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Electromagnetic Space Security, Jiaxing, China","institution_ids":["https://openalex.org/I4210124847"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058177640","display_name":"Peihan Qi","orcid":"https://orcid.org/0000-0001-8686-3090"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peihan Qi","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008064017","display_name":"Weiguo Shen","orcid":"https://orcid.org/0000-0002-3624-7748"},"institutions":[{"id":"https://openalex.org/I4210124847","display_name":"National Engineering Research Center of Electromagnetic Radiation Control Materials","ror":"https://ror.org/02k4dcs46","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210124847"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiguo Shen","raw_affiliation_strings":["National Key Laboratory of Electromagnetic Space Security, Jiaxing, China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Electromagnetic Space Security, Jiaxing, China","institution_ids":["https://openalex.org/I4210124847"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130357588","display_name":"Keqiang Yue","orcid":null},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Keqiang Yue","raw_affiliation_strings":["Key Laboratory of RF Circuits and Systems, Ministry of Education, Hangzhou Dianzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of RF Circuits and Systems, Ministry of Education, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053409340","display_name":"Zhe Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhijin Zhao","raw_affiliation_strings":["College of Communication Engineering, Hangzhou Dianzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Communication Engineering, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5125032269","display_name":"Xiaoniu Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210124847","display_name":"National Engineering Research Center of Electromagnetic Radiation Control Materials","ror":"https://ror.org/02k4dcs46","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210124847"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoniu Yang","raw_affiliation_strings":["National Key Laboratory of Electromagnetic Space Security, Jiaxing, China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Electromagnetic Space Security, Jiaxing, China","institution_ids":["https://openalex.org/I4210124847"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5121113445"],"corresponding_institution_ids":["https://openalex.org/I50760025"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.85967391,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":null,"first_page":"6856","last_page":"6869"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.7458000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.7458000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.0203000009059906,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.017500000074505806,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8978999853134155},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5444999933242798},{"id":"https://openalex.org/keywords/estimation","display_name":"Estimation","score":0.4982999861240387},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.4551999866962433},{"id":"https://openalex.org/keywords/maximum-likelihood","display_name":"Maximum likelihood","score":0.3626999855041504},{"id":"https://openalex.org/keywords/estimation-theory","display_name":"Estimation theory","score":0.35089999437332153},{"id":"https://openalex.org/keywords/surrogate-model","display_name":"Surrogate model","score":0.31690001487731934}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8978999853134155},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8226000070571899},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5444999933242798},{"id":"https://openalex.org/C96250715","wikidata":"https://www.wikidata.org/wiki/Q965330","display_name":"Estimation","level":2,"score":0.4982999861240387},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.4551999866962433},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4481000006198883},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.42730000615119934},{"id":"https://openalex.org/C49781872","wikidata":"https://www.wikidata.org/wiki/Q1045555","display_name":"Maximum likelihood","level":2,"score":0.3626999855041504},{"id":"https://openalex.org/C167928553","wikidata":"https://www.wikidata.org/wiki/Q1376021","display_name":"Estimation theory","level":2,"score":0.35089999437332153},{"id":"https://openalex.org/C131675550","wikidata":"https://www.wikidata.org/wiki/Q7646884","display_name":"Surrogate model","level":2,"score":0.31690001487731934},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.3093999922275543},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.30889999866485596},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.29499998688697815},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.2944999933242798},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.289000004529953},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.28769999742507935},{"id":"https://openalex.org/C139945424","wikidata":"https://www.wikidata.org/wiki/Q1940696","display_name":"Mean squared error","level":2,"score":0.2827000021934509},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.2759999930858612},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.25}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tccn.2026.3676434","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tccn.2026.3676434","pdf_url":null,"source":{"id":"https://openalex.org/S2484188435","display_name":"IEEE Transactions on Cognitive Communications and Networking","issn_l":"2332-7731","issn":["2332-7731","2372-2045"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cognitive Communications and Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Despite":[0],"significant":[1],"advancements":[2],"in":[3,35,129],"deep":[4,50,118,141],"learning-based":[5,51,119],"DOA":[6,21,52,120,148],"estimation,":[7],"such":[8],"models":[9,23,77,121,143],"exhibit":[10],"critical":[11],"vulnerabilities":[12],"to":[13,157],"adversarial":[14,46,62,137],"attacks.":[15,57],"Previous":[16],"studies":[17],"of":[18,28,92,117],"attacks":[19,59,72],"on":[20,166],"estimation":[22,149],"typically":[24],"require":[25],"full":[26],"knowledge":[27],"the":[29,66,87,93,115,167],"target":[30],"model,":[31],"which":[32],"is":[33],"impractical":[34],"real-world":[36],"black-box":[37,45,130],"scenarios.":[38],"In":[39],"this":[40],"paper,":[41],"we":[42,133],"explore":[43],"two":[44],"attack":[47,97,124,168],"strategies":[48,111],"for":[49,140],"models:":[53],"transfer-based":[54,71],"and":[55,81,90,122],"decision-based":[56],"Decision-based":[58],"iteratively":[60],"generate":[61],"samples":[63,138],"by":[64],"querying":[65],"model\u2019s":[67],"hard-label":[68],"predictions,":[69],"while":[70],"craft":[73],"perturbations":[74],"using":[75],"surrogate":[76,94],"with":[78],"accessible":[79],"architectures":[80],"data.":[82],"We":[83],"systematically":[84],"investigate":[85],"how":[86],"architecture,":[88],"depth,":[89],"input":[91],"model":[95],"affect":[96],"transferability.":[98],"Under":[99],"an":[100],"8-element":[101],"uniform":[102],"linear":[103],"array":[104],"setting,":[105],"experimental":[106],"results":[107],"reveal":[108],"that":[109,136,154],"both":[110],"can":[112],"substantially":[113],"degrade":[114],"performance":[116],"reach":[123],"success":[125],"rates":[126],"above":[127],"88%":[128],"settings.":[131],"Crucially,":[132],"further":[134],"demonstrate":[135],"designed":[139],"learning":[142],"also":[144],"impair":[145],"classical":[146],"subspace-based":[147],"methods,":[150],"yielding":[151],"RMSE":[152],"values":[153],"are":[155],"1.39":[156],"50.77":[158],"times":[159],"higher":[160],"than":[161],"those":[162],"under":[163],"AWGN,":[164],"depending":[165],"type.":[169]},"counts_by_year":[],"updated_date":"2026-03-28T06:11:35.319607","created_date":"2026-03-24T00:00:00"}
