{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:05:35Z","timestamp":1775253935202,"version":"3.50.1"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030029210","type":"print"},{"value":"9783030029227","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02922-7_7","type":"book-chapter","created":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T05:42:24Z","timestamp":1539927744000},"page":"96-110","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Gradient Correlation: Are Ensemble Classifiers More Robust Against Evasion Attacks in Practical Settings?"],"prefix":"10.1007","author":[{"given":"Fuyong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,20]]},"reference":[{"key":"7_CR1","unstructured":"Androutsopoulos, I., Paliouras, G., Michelakis, E.: Learning to filter unsolicited commercial e-mail (2004)"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-642-40994-3_25","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"B Biggio","year":"2013","unstructured":"Biggio, B., et al.: Evasion attacks against machine learning at test time. In: Blockeel, H., Kersting, K., Nijssen, S., \u017delezn\u00fd, F. (eds.) ECML PKDD 2013. LNCS (LNAI), vol. 8190, pp. 387\u2013402. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40994-3_25"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-319-02300-7_4","volume-title":"Support Vector Machines Applications","author":"B Biggio","year":"2014","unstructured":"Biggio, B.: Security evaluation of support vector machines in adversarial environments. In: Ma, Y., Guo, G. (eds.) Support Vector Machines Applications, pp. 105\u2013153. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-02300-7_4"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-642-03999-7_2","volume-title":"Studies in Computational Intelligence","author":"Battista Biggio","year":"2009","unstructured":"Biggio, B., Fumera, G., Roli, F.: Evade hard multiple classifier systems. In: Okun, O., Valentini, G. (eds.) Applications of Supervised and Unsupervised Ensemble Methods, pp. 15\u201338. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03999-7_2"},{"issue":"1\u20134","key":"7_CR5","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s13042-010-0007-7","volume":"1","author":"B Biggio","year":"2010","unstructured":"Biggio, B., Fumera, G., Roli, F.: Multiple classifier systems for robust classifier design in adversarial environments. Int. J. Mach. Learn. Cybern. 1(1\u20134), 27\u201341 (2010)","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Biggio, B., Roli, F.: Wild patterns: ten years after the rise of adversarial machine learning. arXiv Preprint (2017). http:\/\/arxiv.org\/abs\/1712.03141","DOI":"10.1145\/3243734.3264418"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TBDATA.2015.2505719","volume":"1","author":"K Cheng","year":"2015","unstructured":"Cheng, K., et al.: Secure k-NN query on encrypted cloud data with multiple keys. IEEE Trans. Big Data 1, 1\u20131 (2015)","journal-title":"IEEE Trans. Big Data"},{"key":"7_CR8","unstructured":"Demontis, A., et al.: Yes, machine learning can be more secure! A case study on android malware detection. IEEE Trans. Dependable Secur. Comput. (2017, in press). https:\/\/ieeexplore.ieee.org\/document\/7917369"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Dong, Y.S., Han, K.S.: Boosting SVM classifiers by ensemble. In: The 14th International Conference on World Wide Web, pp. 1072\u20131073, WWW 2005. ACM (2005)","DOI":"10.1145\/1062745.1062874"},{"key":"7_CR10","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: The International Conference on Learning Representations, ICLR 2015 (2015)"},{"key":"7_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7","volume-title":"The Elements of Statistical Learning","author":"T Hastie","year":"2009","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning, 2nd edn. Springer, New York (2009)","edition":"2"},{"issue":"8","key":"7_CR12","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1109\/34.709601","volume":"20","author":"TK Ho","year":"1998","unstructured":"Ho, T.K.: The random subspace method for constructing decision forests. IEEE Trans. Pattern Anal. Mach. Intell. 20(8), 832\u2013844 (1998)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"7_CR13","unstructured":"Kabir, E., Mahmood, A., Wang, H., Mustafa, A.: Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing. IEEE Trans. Cloud Comput. (2015, in press). https:\/\/ieeexplore.ieee.org\/document\/7208829"},{"issue":"3","key":"7_CR14","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1007\/s10796-011-9305-1","volume":"14","author":"ME Kabir","year":"2012","unstructured":"Kabir, M.E., Wang, H., Bertino, E.: A role-involved purpose-based access control model. Inf. Syst. Front. 14(3), 809\u2013822 (2012)","journal-title":"Inf. Syst. Front."},{"key":"7_CR15","unstructured":"Kantchelian, A., Tygar, J., Joseph, A.: Evasion and hardening of tree ensemble classifiers. In: International Conference on Machine Learning, pp. 2387\u20132396 (2016)"},{"issue":"1\u20132","key":"7_CR16","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1504\/IJKWI.2009.027925","volume":"1","author":"F Khalil","year":"2009","unstructured":"Khalil, F., Li, J., Wang, H.: An integrated model for next page access prediction. Int. J. Knowl. Web Intell. 1(1\u20132), 48\u201380 (2009)","journal-title":"Int. J. Knowl. Web Intell."},{"issue":"12","key":"7_CR17","doi-asserted-by":"publisher","first-page":"2757","DOI":"10.1016\/S0031-3203(03)00175-4","volume":"36","author":"HC Kim","year":"2003","unstructured":"Kim, H.C., Pang, S., Je, H.M., Kim, D., Bang, S.Y.: Constructing support vector machine ensemble. Pattern Recogn. 36(12), 2757\u20132767 (2003)","journal-title":"Pattern Recogn."},{"key":"7_CR18","unstructured":"Ko\u0142cz, A., Teo, C.H.: Feature weighting for improved classifier robustness. In: Sixth Conference On Email and Anti-spam, CEAS 2009 (2009)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect malicious executables in the wild. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 470\u2013478. ACM (2004)","DOI":"10.1145\/1014052.1014105"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Laskov, P., et al.: Practical evasion of a learning-based classifier: a case study. In: 2014 IEEE Symposium on Security and Privacy (SP), pp. 197\u2013211. IEEE (2014)","DOI":"10.1109\/SP.2014.20"},{"key":"7_CR21","doi-asserted-by":"publisher","first-page":"9044","DOI":"10.1109\/ACCESS.2017.2702187","volume":"5","author":"G Mujtaba","year":"2017","unstructured":"Mujtaba, G., Shuib, L., Raj, R.G., Majeed, N., Al-Garadi, M.A.: Email classification research trends: review and open issues. IEEE Access 5, 9044\u20139064 (2017)","journal-title":"IEEE Access"},{"key":"7_CR22","unstructured":"Papernot, N., Mcdaniel, P., Sinha, A., Wellman, M.: SoK: Towards the science of security and privacy in machine learning. arXiv Preprint, pp. 1\u201319 (2016). http:\/\/arxiv.org\/abs\/1611.03814"},{"issue":"1","key":"7_CR23","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s11280-017-0456-y","volume":"21","author":"M Peng","year":"2018","unstructured":"Peng, M., Zeng, G., Sun, Z., Huang, J., Wang, H., Tian, G.: Personalized app recommendation based on app permissions. World Wide Web 21(1), 89\u2013104 (2018)","journal-title":"World Wide Web"},{"issue":"4","key":"7_CR24","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1109\/TPDS.2017.2778734","volume":"29","author":"Z Shah","year":"2018","unstructured":"Shah, Z., Mahmood, A.N., Barlow, M., Tari, Z., Yi, X., Zomaya, A.Y.: Computing hierarchical summary from two-dimensional big data streams. IEEE Trans. Parallel Distrib. Syst. 29(4), 803\u2013818 (2018)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"9","key":"7_CR25","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MCOM.2017.1700104","volume":"55","author":"Y Shen","year":"2017","unstructured":"Shen, Y., Zhang, T., Wang, Y., Wang, H., Jiang, X.: Microthings: a generic iot architecture for flexible data aggregation and scalable service cooperation. IEEE Commun. Mag. 55(9), 86\u201393 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Shu, J., Jia, X., Yang, K., Wang, H.: Privacy-preserving task recommendation services for crowdsourcing. IEEE Trans. Serv. Comput. (2018, in press). https:\/\/ieeexplore.ieee.org\/document\/8253516","DOI":"10.1109\/TSC.2018.2791601"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Smutz, C., Stavrou, A.: When a tree falls: using diversity in ensemble classifiers to identify evasion in malware detectors. In: NDSS (2016)","DOI":"10.14722\/ndss.2016.23078"},{"key":"7_CR28","unstructured":"Sun, X., Li, M., Wang, H., Plank, A.: An efficient hash-based algorithm for minimal k-anonymity. In: Proceedings of the Thirty-First Australasian Conference on Computer Science, vol. 74, pp. 101\u2013107. Australian Computer Society, Inc. (2008)"},{"issue":"5","key":"7_CR29","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1016\/j.cose.2011.05.005","volume":"30","author":"X Sun","year":"2011","unstructured":"Sun, X., Wang, H., Li, J., Zhang, Y.: Injecting purpose and trust into data anonymisation. Comput. Secur. 30(5), 332\u2013345 (2011)","journal-title":"Comput. Secur."},{"key":"7_CR30","volume-title":"The Nature of Statistical Learning","author":"V Vapnik","year":"1999","unstructured":"Vapnik, V.: The Nature of Statistical Learning, 1st edn. Springer, New York (1999)","edition":"1"},{"key":"7_CR31","unstructured":"Wang, G., Wang, T., Zheng, H., Zhao, B.Y.: Man vs. machine: practical adversarial detection of malicious crowdsourcing workers. In: USENIX Security Symposium, pp. 239\u2013254 (2014)"},{"key":"7_CR32","unstructured":"Wang, H., Cao, J., Zhang, Y.: Ticket-based service access scheme for mobile users. In: Australian Computer Science Communications, vol. 24, pp. 285\u2013292. Australian Computer Society, Inc. (2002)"},{"key":"7_CR33","unstructured":"Xu, W., Qi, Y., Evans, D.: Automatically evading classifiers. In: Proceedings of the 2016 Network and Distributed Systems Symposium (2016)"},{"issue":"3","key":"7_CR34","doi-asserted-by":"publisher","first-page":"2065","DOI":"10.1109\/TIT.2018.2795019","volume":"64","author":"X Yi","year":"2018","unstructured":"Yi, X., Sun, H., Jafar, S.A., Gesbert, D.: Tdma is optimal for all-unicast dof region of tim if and only if topology is chordal bipartite. IEEE Trans. Inf. Theory 64(3), 2065\u20132076 (2018)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"7_CR35","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/TCYB.2015.2415032","volume":"46","author":"F Zhang","year":"2016","unstructured":"Zhang, F., Chan, P.P., Biggio, B., Yeung, D.S., Roli, F.: Adversarial feature selection against evasion attacks. IEEE Trans. Cybern. 46(3), 766\u2013777 (2016)","journal-title":"IEEE Trans. Cybern."},{"issue":"2","key":"7_CR36","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/TSC.2015.2478453","volume":"11","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Shen, Y., Wang, H., Zhang, Y., Jiang, X.: On secure wireless communications for service oriented computing. IEEE Trans. Serv. Comput. 11(2), 318\u2013328 (2018)","journal-title":"IEEE Trans. Serv. Comput."}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02922-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T20:47:53Z","timestamp":1775249273000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-02922-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030029210","9783030029227"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02922-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"20 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wise2018.connect.rs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}