{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:25:10Z","timestamp":1730341510787,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.23919\/acc.2018.8431872","type":"proceedings-article","created":{"date-parts":[[2018,8,17]],"date-time":"2018-08-17T20:16:10Z","timestamp":1534536970000},"page":"5774-5780","source":"Crossref","is-referenced-by-count":6,"title":["Poisoning Attacks on Data-Driven Utility Learning in Games"],"prefix":"10.23919","author":[{"given":"Ruoxi","family":"Jia","sequence":"first","affiliation":[]},{"given":"Ioannis C.","family":"Konstantakopoulos","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Costas","family":"Spanos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1885","article-title":"Data poisoning attacks on factorization-based collaborative filtering","author":"li","year":"2016","journal-title":"Advances in neural information processing systems"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ICB.2013.6613006"},{"year":"2017","author":"ratliff","journal-title":"Risk-sensivtive inverse reinforcement learning via gradient methods","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.2307\/1885620"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.2307\/1911749"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"2301","DOI":"10.1109\/TAC.2016.2583518","article-title":"On the Characterization of Local Nash Equilibria in Continuous Games","volume":"61","author":"ratliff","year":"2016","journal-title":"IEEE Trans on Autom Control"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"3158","DOI":"10.3182\/20140824-6-ZA-1003.02557","article-title":"Incentive design and utility learning via energy disaggregation","volume":"47","author":"ratliff","year":"2014","journal-title":"IFAC Proceedings Volumes"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref18","first-page":"1689","article-title":"Is feature selection secure against training data poisoning?","author":"xiao","year":"2015","journal-title":"International Conference on Machine Learning"},{"key":"ref19","article-title":"Poisoning attacks against support vector machines","author":"biggio","year":"2012","journal-title":"ICML"},{"key":"ref4","article-title":"A robust utility learning framework via inverse optimization","author":"konstantakopoulos","year":"2016","journal-title":"IEEE Transactions on Control Systems Technology"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-48995-6_30","article-title":"Inverse game theory","author":"kuleshov","year":"2015","journal-title":"Web and Internet Economics"},{"year":"2014","author":"goodfellow","journal-title":"Explaining and Harnessing Adversarial Examples","key":"ref6"},{"year":"2016","author":"liu","journal-title":"Delving into transferable adversarial examples and black-box attacks","key":"ref5"},{"year":"2017","author":"evtimov","journal-title":"Robust physical-world attacks on machine learning models","key":"ref8"},{"key":"ref7","first-page":"2087","article-title":"Feature cross-substitution in adversarial classification","author":"li","year":"2014","journal-title":"Advances in Neural Information Processing Systems Ser NIPS"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/AUCC.2016.7868186"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/s10107-014-0819-4"},{"key":"ref9","first-page":"599","article-title":"Scalable optimization of randomized operational decisions in adversarial classification settings","author":"li","year":"2015","journal-title":"Proceedings of the Eighteenth International Conference on Artificial Intelligence and Statistics"},{"key":"ref20","first-page":"681","article-title":"Bayesian learning via stochastic gradient langevin dynamics","author":"welling","year":"2011","journal-title":"Proceedings of the 28th International Conference on Machine Learning (ICML-11)"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/2674061.2674073"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ALLERTON.2014.7028565"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/978-3-642-70634-9_6"}],"event":{"name":"2018 Annual American Control Conference (ACC)","start":{"date-parts":[[2018,6,27]]},"location":"Milwaukee, WI","end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 Annual American Control Conference (ACC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410068\/8430677\/08431872.pdf?arnumber=8431872","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:01:36Z","timestamp":1598227296000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8431872\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.23919\/acc.2018.8431872","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}