{"id":"https://openalex.org/W3130775547","doi":"https://doi.org/10.1109/vtc2020-fall49728.2020.9348449","title":"Accelerating Poisoning Attack Through Momentum and Adam Algorithms","display_name":"Accelerating Poisoning Attack Through Momentum and Adam Algorithms","publication_year":2020,"publication_date":"2020-11-01","ids":{"openalex":"https://openalex.org/W3130775547","doi":"https://doi.org/10.1109/vtc2020-fall49728.2020.9348449","mag":"3130775547"},"language":"en","primary_location":{"id":"doi:10.1109/vtc2020-fall49728.2020.9348449","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2020-fall49728.2020.9348449","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066542952","display_name":"Wenbo Jiang","orcid":"https://orcid.org/0000-0002-4592-8094"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenbo Jiang","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering,China","School of Computer Science and Engineering, University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering,China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100325334","display_name":"Hongwei Li","orcid":"https://orcid.org/0000-0002-1961-7946"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongwei Li","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering,China","School of Computer Science and Engineering, University of Electronic Science and Technology of China, China","Peng Cheng Laboratory, Cyberspace Security Research Center, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering,China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Peng Cheng Laboratory, Cyberspace Security Research Center, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101817456","display_name":"Li Gong","orcid":"https://orcid.org/0000-0002-4824-5109"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Gong","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering,China","School of Computer Science and Engineering, University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering,China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048390686","display_name":"Haomiao Yang","orcid":"https://orcid.org/0000-0002-5968-3518"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haomiao Yang","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering,China","School of Computer Science and Engineering, University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering,China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070447777","display_name":"Rongxing Lu","orcid":"https://orcid.org/0000-0001-5720-0941"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rongxing Lu","raw_affiliation_strings":["University of New Brunswick,Faculty of Computer Science,Fredericton,Canada","Faculty of Computer Science, University of New Brunswick, Fredericton, Canada"],"affiliations":[{"raw_affiliation_string":"University of New Brunswick,Faculty of Computer Science,Fredericton,Canada","institution_ids":["https://openalex.org/I106938459"]},{"raw_affiliation_string":"Faculty of Computer Science, University of New Brunswick, Fredericton, Canada","institution_ids":["https://openalex.org/I106938459"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5066542952"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.20489898,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.7483919858932495},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7049450874328613},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6854321360588074},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.6068784594535828},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5581833124160767},{"id":"https://openalex.org/keywords/rate-of-convergence","display_name":"Rate of convergence","score":0.47037285566329956},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4539584219455719},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26262736320495605},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.09618750214576721}],"concepts":[{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.7483919858932495},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7049450874328613},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6854321360588074},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.6068784594535828},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5581833124160767},{"id":"https://openalex.org/C57869625","wikidata":"https://www.wikidata.org/wiki/Q1783502","display_name":"Rate of convergence","level":3,"score":0.47037285566329956},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4539584219455719},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26262736320495605},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.09618750214576721},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vtc2020-fall49728.2020.9348449","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2020-fall49728.2020.9348449","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1996118086","https://openalex.org/W2000343360","https://openalex.org/W2007562169","https://openalex.org/W2095577883","https://openalex.org/W2112507308","https://openalex.org/W2167421362","https://openalex.org/W2182055801","https://openalex.org/W2293844262","https://openalex.org/W2317354861","https://openalex.org/W2343785519","https://openalex.org/W2399587145","https://openalex.org/W2402124760","https://openalex.org/W2404910809","https://openalex.org/W2523246573","https://openalex.org/W2557044351","https://openalex.org/W2741594031","https://openalex.org/W2753089952","https://openalex.org/W2802508687","https://openalex.org/W2892160417","https://openalex.org/W2957377429","https://openalex.org/W2962763344","https://openalex.org/W2964043980","https://openalex.org/W2964121744","https://openalex.org/W3010058322","https://openalex.org/W3101291735","https://openalex.org/W3120740533","https://openalex.org/W6631190155","https://openalex.org/W6676935882","https://openalex.org/W6684559340","https://openalex.org/W6685839400","https://openalex.org/W6696889897","https://openalex.org/W6712837096","https://openalex.org/W6713542723","https://openalex.org/W6727249380","https://openalex.org/W6730054736"],"related_works":["https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2090763504","https://openalex.org/W148178222","https://openalex.org/W2104657898","https://openalex.org/W1948992892","https://openalex.org/W1886884218","https://openalex.org/W1910826599","https://openalex.org/W2012353789","https://openalex.org/W2053286651"],"abstract_inverted_index":{"Machine":[0],"learning":[1,33],"has":[2,194],"demonstrated":[3],"promising":[4],"application":[5],"prospects":[6],"in":[7,114,155],"the":[8,14,22,48,54,61,68,73,78,101,138,159,164,176,222,228],"field":[9],"of":[10,24,47,57,81,125,137,189,227],"vehicular":[11],"technology":[12],"during":[13],"past":[15],"decade,":[16],"for":[17,90],"instance,":[18],"it":[19],"effectively":[20],"propelled":[21],"development":[23],"autonomous":[25],"vehicles":[26],"and":[27,120,193,208,221,224],"intelligent":[28],"transportation":[29],"systems.":[30],"However,":[31],"machine":[32,58],"is":[34,45,84],"still":[35],"vulnerable":[36],"to":[37,53,67,71,99,111,134,157,216],"numerous":[38],"malicious":[39],"attacks.":[40],"Amongst":[41],"them,":[42],"poisoning":[43,82,91,151,166,178],"attack":[44,83,92,152,167,179,219,230],"one":[46],"most":[49,88],"severe":[50],"security":[51],"threats":[52],"training":[55,69],"process":[56],"learning,":[59],"where":[60],"attacker":[62],"injects":[63],"some":[64,190],"poisoned":[65,86,102,139],"samples":[66,244],"dataset":[70],"make":[72],"learned":[74],"model":[75],"unavailable.":[76],"As":[77,127],"crucial":[79],"part":[80],"generating":[85],"samples,":[87],"proposals":[89],"have":[93,121],"employed":[94],"traditional":[95],"gradient-based":[96,106,150],"optimization":[97,107],"algorithms":[98,108,215,220,231],"optimize":[100],"samples.":[103],"Nevertheless,":[104],"conventional":[105],"are":[109,211,232],"liable":[110],"get":[112,187],"trapped":[113],"local":[115,191],"optimums":[116,192],"or":[117],"saddle":[118],"points":[119],"a":[122,128,135,195,237],"slow":[123],"rate":[124],"convergence.":[126],"result,":[129],"these":[130,144],"problems":[131],"may":[132],"lead":[133],"reduction":[136],"samples'":[140],"effect.":[141],"To":[142],"address":[143],"issues,":[145],"we":[146,162,174,235],"propose":[147,163,175,236],"two":[148,229],"improved":[149],"algorithms.":[153],"Specifically,":[154],"order":[156],"accelerate":[158],"convergence":[160,197],"speed,":[161],"first":[165],"algorithm":[168,180],"by":[169,181],"employing":[170],"momentum":[171],"algorithm.":[172],"Also,":[173],"second":[177],"utilizing":[182],"adam":[183],"algorithm,":[184,239],"which":[185,240],"can":[186,241],"rid":[188],"faster":[196],"speed":[198],"simultaneously.":[199],"After":[200],"that,":[201],"support":[202],"vector":[203],"machines":[204],"(SVM),":[205],"linear":[206],"regression":[207,210],"logistics":[209],"chosen":[212],"as":[213],"exemplary":[214],"conduct":[217],"our":[218],"effectiveness":[223],"computational":[225],"overhead":[226],"evaluated.":[233],"Finally,":[234],"countermeasure":[238],"detect":[242],"suspicious":[243],"using":[245],"mahalanobis":[246],"distance.":[247]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
