{"id":"https://openalex.org/W4387321746","doi":"https://doi.org/10.1145/3607199.3607227","title":"Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability","display_name":"Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability","publication_year":2023,"publication_date":"2023-10-03","ids":{"openalex":"https://openalex.org/W4387321746","doi":"https://doi.org/10.1145/3607199.3607227"},"language":"en","primary_location":{"id":"doi:10.1145/3607199.3607227","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3607199.3607227","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607227","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607227","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040342077","display_name":"Marco Alecci","orcid":"https://orcid.org/0000-0002-5963-4599"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":true,"raw_author_name":"Marco Alecci","raw_affiliation_strings":["University of Luxembourg, Luxembourg"],"raw_orcid":"https://orcid.org/0000-0002-5963-4599","affiliations":[{"raw_affiliation_string":"University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063847107","display_name":"Mauro Conti","orcid":"https://orcid.org/0000-0002-3612-1934"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Mauro Conti","raw_affiliation_strings":["University of Padua, Italy"],"raw_orcid":"https://orcid.org/0000-0002-3612-1934","affiliations":[{"raw_affiliation_string":"University of Padua, Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071242130","display_name":"Francesco Marchiori","orcid":"https://orcid.org/0000-0001-5282-0965"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Francesco Marchiori","raw_affiliation_strings":["University of Padua, Italy"],"raw_orcid":"https://orcid.org/0000-0001-5282-0965","affiliations":[{"raw_affiliation_string":"University of Padua, Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103034946","display_name":"Luca Martinelli","orcid":"https://orcid.org/0000-0002-6249-0899"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Luca Martinelli","raw_affiliation_strings":["University of Padua, Italy"],"raw_orcid":"https://orcid.org/0000-0002-6249-0899","affiliations":[{"raw_affiliation_string":"University of Padua, Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051194788","display_name":"Luca Pajola","orcid":"https://orcid.org/0000-0002-6749-6608"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Luca Pajola","raw_affiliation_strings":["University of Padua, Italy"],"raw_orcid":"https://orcid.org/0000-0002-6749-6608","affiliations":[{"raw_affiliation_string":"University of Padua, Italy","institution_ids":["https://openalex.org/I138689650"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5040342077"],"corresponding_institution_ids":["https://openalex.org/I186903577"],"apc_list":null,"apc_paid":null,"fwci":1.7041,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.87581237,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"315","last_page":"329"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9670000076293945,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8842347860336304},{"id":"https://openalex.org/keywords/transferability","display_name":"Transferability","score":0.8213714957237244},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8088283538818359},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.7685762643814087},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.696029782295227},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.5794631242752075},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.49366769194602966},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.47959911823272705},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.41578441858291626},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3621264100074768},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2934908866882324}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8842347860336304},{"id":"https://openalex.org/C61272859","wikidata":"https://www.wikidata.org/wiki/Q7834031","display_name":"Transferability","level":3,"score":0.8213714957237244},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8088283538818359},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.7685762643814087},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.696029782295227},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.5794631242752075},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.49366769194602966},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.47959911823272705},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.41578441858291626},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3621264100074768},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2934908866882324},{"id":"https://openalex.org/C140331021","wikidata":"https://www.wikidata.org/wiki/Q1868104","display_name":"Logit","level":2,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3607199.3607227","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3607199.3607227","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607227","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},{"id":"pmh:oai:orbilu.uni.lu:10993/57619","is_oa":true,"landing_page_url":"https://orbilu.uni.lu/handle/10993/57619","pdf_url":"https://orbilu.uni.lu/bitstream/10993/57619/1/3607199.3607227.pdf","source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023 (2023-10-16); Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, Hong Kong, Hong Kong SAR China [HK], 16-10-2023 => 18-10-2023","raw_type":"peer reviewed"},{"id":"pmh:oai:www.research.unipd.it:11577/3501024","is_oa":true,"landing_page_url":"https://hdl.handle.net/11577/3501024","pdf_url":null,"source":{"id":"https://openalex.org/S4377196283","display_name":"Research Padua  Archive (University of Padua)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138689650","host_organization_name":"University of Padua","host_organization_lineage":["https://openalex.org/I138689650"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"doi:10.1145/3607199.3607227","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3607199.3607227","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3607199.3607227","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.8100000023841858,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4387321746.pdf","grobid_xml":"https://content.openalex.org/works/W4387321746.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W2148143831","https://openalex.org/W2151298633","https://openalex.org/W2194775991","https://openalex.org/W2243397390","https://openalex.org/W2350778671","https://openalex.org/W2595653137","https://openalex.org/W2752929869","https://openalex.org/W2884019276","https://openalex.org/W2888233014","https://openalex.org/W2889016530","https://openalex.org/W2902314211","https://openalex.org/W2913770005","https://openalex.org/W2925709178","https://openalex.org/W2963942586","https://openalex.org/W2969542116","https://openalex.org/W3204913553","https://openalex.org/W3212709629"],"related_works":["https://openalex.org/W4288055406","https://openalex.org/W3137894200","https://openalex.org/W3092178728","https://openalex.org/W3132910851","https://openalex.org/W4377864639","https://openalex.org/W2997056298","https://openalex.org/W2950864148","https://openalex.org/W2570685808","https://openalex.org/W4200630034","https://openalex.org/W4226402597"],"abstract_inverted_index":{"Evasion":[0],"attacks":[1,24],"are":[2,72],"a":[3,46,55],"threat":[4],"to":[5,12,28,50],"machine":[6],"learning":[7],"models,":[8],"where":[9],"adversaries":[10,64],"attempt":[11],"affect":[13],"classifiers":[14],"by":[15],"injecting":[16],"malicious":[17],"samples.":[18],"An":[19],"alarming":[20],"side-effect":[21],"of":[22],"evasion":[23],"is":[25,35,98],"their":[26,67,69],"ability":[27],"transfer":[29,66],"among":[30],"different":[31],"models:":[32],"this":[33],"property":[34],"called":[36],"transferability.":[37],"Therefore,":[38],"an":[39],"attacker":[40,84],"can":[41,65],"produce":[42],"adversarial":[43],"samples":[44],"on":[45,54],"custom":[47],"model":[48,101],"(surrogate)":[49],"conduct":[51],"the":[52,88,95],"attack":[53],"victim\u2019s":[56],"organization":[57],"later.":[58],"Although":[59],"literature":[60],"widely":[61],"discusses":[62],"how":[63,94],"attacks,":[68],"experimental":[70],"settings":[71],"limited":[73],"and":[74,85,100],"far":[75],"from":[76],"reality.":[77],"For":[78],"instance,":[79],"many":[80],"experiments":[81],"consider":[82],"both":[83],"defender":[86],"sharing":[87],"same":[89],"dataset,":[90],"balance":[91],"level":[92],"(i.e.,":[93],"ground":[96],"truth":[97],"distributed),":[99],"architecture.":[102]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2023-10-04T00:00:00"}
