{"id":"https://openalex.org/W4408324704","doi":"https://doi.org/10.1109/tifs.2025.3550066","title":"A Stable and Efficient Data-Free Model Attack With Label-Noise Data Generation","display_name":"A Stable and Efficient Data-Free Model Attack With Label-Noise Data Generation","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4408324704","doi":"https://doi.org/10.1109/tifs.2025.3550066"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3550066","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3550066","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089036151","display_name":"Zhixuan Zhang","orcid":"https://orcid.org/0000-0002-3933-5401"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhixuan Zhang","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079438627","display_name":"Xianhua Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210112139","display_name":"Quadient (Netherlands)","ror":"https://ror.org/01vxsq455","country_code":"NL","type":"company","lineage":["https://openalex.org/I4210112139","https://openalex.org/I4210124977"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Xingjian Zheng","raw_affiliation_strings":["Frost Drill Intellectual Software Pte., Ltd., International Plaza, Singapore","company of Frost Drill Intellectual Software Pte. Ltd, Singapore"],"affiliations":[{"raw_affiliation_string":"Frost Drill Intellectual Software Pte., Ltd., International Plaza, Singapore","institution_ids":["https://openalex.org/I4210112139"]},{"raw_affiliation_string":"company of Frost Drill Intellectual Software Pte. Ltd, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059067107","display_name":"Linbo Qing","orcid":"https://orcid.org/0000-0003-3555-0005"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linbo Qing","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100453144","display_name":"Qi Liu","orcid":"https://orcid.org/0000-0001-5378-6404"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Liu","raw_affiliation_strings":["School of Future Technology, South China University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Future Technology, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046717491","display_name":"Pingyu Wang","orcid":"https://orcid.org/0000-0001-9769-8035"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pingyu Wang","raw_affiliation_strings":["College of Electronics and Information Engineering, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"College of Electronics and Information Engineering, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24201400","https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yu Liu","orcid":"https://orcid.org/0009-0009-2318-0386"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Liu","raw_affiliation_strings":["College of Electronics and Information Engineering, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"College of Electronics and Information Engineering, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24201400","https://openalex.org/I24185976"]}]},{"author_position":"last","author":{"id":null,"display_name":"Jiyang Liao","orcid":"https://orcid.org/0009-0007-3646-7840"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiyang Liao","raw_affiliation_strings":["College of Electronics and Information Engineering, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"College of Electronics and Information Engineering, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24201400","https://openalex.org/I24185976"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5089036151"],"corresponding_institution_ids":["https://openalex.org/I24185976"],"apc_list":null,"apc_paid":null,"fwci":2.3568,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.8813711,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"20","issue":null,"first_page":"3131","last_page":"3145"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9781000018119812,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9781000018119812,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9452999830245972,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9351999759674072,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7946959733963013},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.550001323223114},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.5484585762023926},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3418656885623932},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24105677008628845},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.10940006375312805}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7946959733963013},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.550001323223114},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.5484585762023926},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3418656885623932},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24105677008628845},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.10940006375312805},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3550066","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3550066","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.46000000834465027,"id":"https://metadata.un.org/sdg/7"}],"awards":[{"id":"https://openalex.org/G5323272726","display_name":null,"funder_award_id":"YJ202326","funder_id":"https://openalex.org/F4320336623","funder_display_name":"Sichuan Education and Scientific Research Grant Project"},{"id":"https://openalex.org/G6323737172","display_name":null,"funder_award_id":"XZ202501ZY0064","funder_id":"https://openalex.org/F4320336589","funder_display_name":"Guangxi Key Research and Development Program"},{"id":"https://openalex.org/G8130295423","display_name":null,"funder_award_id":"62301346","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320336589","display_name":"Guangxi Key Research and Development Program","ror":null},{"id":"https://openalex.org/F4320336623","display_name":"Sichuan Education and Scientific Research Grant Project","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":56,"referenced_works":["https://openalex.org/W2091432990","https://openalex.org/W2112796928","https://openalex.org/W2180612164","https://openalex.org/W2183341477","https://openalex.org/W2194775991","https://openalex.org/W2243397390","https://openalex.org/W2543927648","https://openalex.org/W2551176409","https://openalex.org/W2603766943","https://openalex.org/W2607219512","https://openalex.org/W2618530766","https://openalex.org/W2620038827","https://openalex.org/W2746600820","https://openalex.org/W2766966408","https://openalex.org/W2962872506","https://openalex.org/W2963303354","https://openalex.org/W2963542245","https://openalex.org/W2963684088","https://openalex.org/W2964205597","https://openalex.org/W2982802130","https://openalex.org/W3034190247","https://openalex.org/W3034530016","https://openalex.org/W3034957837","https://openalex.org/W3130624511","https://openalex.org/W3175685622","https://openalex.org/W3178659068","https://openalex.org/W3197912330","https://openalex.org/W3199706488","https://openalex.org/W3213646008","https://openalex.org/W3217532869","https://openalex.org/W4214588288","https://openalex.org/W4293846201","https://openalex.org/W4304701424","https://openalex.org/W4312433364","https://openalex.org/W4313010394","https://openalex.org/W4313140285","https://openalex.org/W4313387422","https://openalex.org/W4386299120","https://openalex.org/W4390421837","https://openalex.org/W4390871686","https://openalex.org/W4393147903","https://openalex.org/W4402916443","https://openalex.org/W6637162671","https://openalex.org/W6637373629","https://openalex.org/W6640425456","https://openalex.org/W6703116779","https://openalex.org/W6732249622","https://openalex.org/W6735913928","https://openalex.org/W6743688258","https://openalex.org/W6745272055","https://openalex.org/W6747733185","https://openalex.org/W6766978945","https://openalex.org/W6787972765","https://openalex.org/W6804277322","https://openalex.org/W6838529080","https://openalex.org/W6857297827"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"The":[0,174],"objective":[1],"of":[2,85,185],"a":[3,11,63,86,95,119,142,242,261],"data-free":[4,66,192],"closed-box":[5,67,193],"adversarial":[6,68],"attack":[7,10,28,56,69,135,139,172,200,209],"is":[8,100,151],"to":[9,37,102,124,137,153,169,189],"victim":[12],"model":[13,159,217],"without":[14,88],"using":[15],"internal":[16],"information,":[17],"training":[18,41,53,233],"datasets":[19,180],"or":[20],"semantically":[21],"similar":[22],"substitute":[23,42,92],"datasets.":[24],"Concerned":[25],"about":[26],"stricter":[27],"scenarios,":[29],"recent":[30],"studies":[31],"have":[32],"tried":[33],"employing":[34],"generative":[35],"networks":[36],"synthesize":[38],"data":[39,245],"for":[40,75,241],"models.":[43,93],"Nevertheless,":[44],"these":[45],"approaches":[46],"concurrently":[47],"encounter":[48],"challenges":[49],"associated":[50],"with":[51],"unstable":[52,73],"and":[54,164,198,260],"diminished":[55],"efficiency.":[57,173],"In":[58,146],"this":[59,147],"paper,":[60],"we":[61,79,117,130],"propose":[62,131],"novel":[64],"query-efficient":[65],"method.":[70],"To":[71],"mitigate":[72],"training,":[74],"the":[76,82,104,113,126,155,182,207,213,225,238,252,256],"first":[77],"time,":[78],"directly":[80],"manipulate":[81],"intermediate-layer":[83],"feature":[84],"generator":[87],"relying":[89],"on":[90,178,212],"any":[91],"Specifically,":[94],"label":[96],"noise-based":[97],"generation":[98,122],"module":[99],"created":[101],"enhance":[103,170],"intra-class":[105,134],"patterns":[106],"by":[107],"incorporating":[108],"partial":[109],"historical":[110],"information":[111,157],"during":[112],"learning":[114],"process.":[115],"Additionally,":[116,224],"present":[118],"feature-disturbed":[120],"diversity":[121],"method":[123,187,204,249],"augment":[125],"inter-class":[127],"distance.":[128],"Meanwhile,":[129],"an":[132,219],"adaptive":[133],"strategy":[136],"heighten":[138],"capability":[140],"within":[141],"limited":[143,262],"query":[144,222,239,263],"budget.":[145,223,264],"strategy,":[148],"entropy-based":[149],"distance":[150],"utilized":[152],"characterize":[154],"relative":[156],"from":[158],"outputs,":[160],"while":[161],"positive":[162],"classes":[163],"negative":[165],"samples":[166],"are":[167],"used":[168],"low":[171,221],"comprehensive":[175],"experiments":[176],"conducted":[177],"six":[179,190],"demonstrate":[181],"superior":[183],"performance":[184,254],"our":[186,203,248],"compared":[188],"state-of-the-art":[191],"competitors":[194],"in":[195],"both":[196],"label-only":[197],"probability-only":[199],"scenarios.":[201],"Intriguingly,":[202],"can":[205,250],"realize":[206],"highest":[208],"success":[210],"rate":[211],"online":[214],"Microsoft":[215],"Azure":[216],"under":[218,255],"extremely":[220],"proposed":[226],"approach":[227],"not":[228],"only":[229],"achieves":[230],"more":[231,243],"stable":[232],"but":[234],"also":[235],"significantly":[236],"reduces":[237],"count":[240],"balanced":[244],"generation.":[246],"Furthermore,":[247],"maintain":[251],"best":[253],"existing":[257],"defense":[258],"models":[259]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
