{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:37:14Z","timestamp":1743068234444,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030134525"},{"type":"electronic","value":"9783030134532"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-13453-2_13","type":"book-chapter","created":{"date-parts":[[2019,2,15]],"date-time":"2019-02-15T06:33:53Z","timestamp":1550212433000},"page":"159-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cyber Attacks Against the PC Learning Algorithm"],"prefix":"10.1007","author":[{"given":"Emad","family":"Alsuwat","sequence":"first","affiliation":[]},{"given":"Hatim","family":"Alsuwat","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Valtorta","sequence":"additional","affiliation":[]},{"given":"Csilla","family":"Farkas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,16]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Alfeld, S., Zhu, X., Barford, P.: Data poisoning attacks against autoregressive models. In: AAAI, pp. 1452\u20131458 (2016)","DOI":"10.1609\/aaai.v30i1.10237"},{"key":"13_CR2","unstructured":"Ali, A.R., Richardson, T.S., Spirtes, P.L., Zhang, J.: Towards characterizing Markov equivalence classes for directed acyclic graphs with latent variables. arXiv preprint arXiv:1207.1365 (2012)"},{"key":"13_CR3","unstructured":"Alsuwat, E., Valtorta, M., Farkas, C.: Bayesian structure learning attacks. University of South Carolina, SC, USA, Technical report (2018)"},{"key":"13_CR4","first-page":"1","volume":"18","author":"E Alsuwat","year":"2018","unstructured":"Alsuwat, E., Valtorta, M., Farkas, C.: How to generate the network you want with the pc learning algorithm. Proc. WUPES 18, 1\u201312 (2018)","journal-title":"Proc. WUPES"},{"issue":"2","key":"13_CR5","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s10994-010-5188-5","volume":"81","author":"M Barreno","year":"2010","unstructured":"Barreno, M., Nelson, B., Joseph, A.D., Tygar, J.D.: The security of machine learning. Mach. Learn. 81(2), 121\u2013148 (2010). https:\/\/doi.org\/10.1007\/s10994-010-5188-5","journal-title":"Mach. Learn."},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 16\u201325. ACM (2006)","DOI":"10.1145\/1128817.1128824"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-642-40994-3_25","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"B Biggio","year":"2013","unstructured":"Biggio, B., et al.: Evasion attacks against machine learning at test time. In: Blockeel, H., Kersting, K., Nijssen, S., \u017delezn\u00fd, F. (eds.) ECML PKDD 2013. LNCS (LNAI), vol. 8190, pp. 387\u2013402. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40994-3_25"},{"key":"13_CR8","unstructured":"Biggio, B., Nelson, B., Laskov, P.: Poisoning attacks against support vector machines. In: Proceedings of the 29th International Conference on International Conference on Machine Learning, pp. 1467\u20131474. Omnipress (2012)"},{"key":"13_CR9","unstructured":"Boerlage, B.: Link strength in Bayesian networks. Ph.D. thesis, University of British Columbia (1992)"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Burkard, C., Lagesse, B.: Analysis of causative attacks against SVMs learning from data streams. In: Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, pp. 31\u201336. ACM (2017)","DOI":"10.1145\/3041008.3041012"},{"key":"13_CR11","unstructured":"Ebert-Uphoff, I.: Tutorial on how to measure link strengths in discrete Bayesian networks. Technical report, Georgia Institute of Technology (2009)"},{"key":"13_CR12","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Huang, L., Joseph, A.D., Nelson, B., Rubinstein, B.I., Tygar, J.: Adversarial machine learning. In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, pp. 43\u201358. ACM (2011)","DOI":"10.1145\/2046684.2046692"},{"key":"13_CR14","unstructured":"Hugin Expert A\/S: HUGIN Researcher API 7.0 (2008). https:\/\/www.hugin.com\/"},{"key":"13_CR15","unstructured":"Kantchelian, A., Tygar, J., Joseph, A.: Evasion and hardening of tree ensemble classifiers. In: International Conference on Machine Learning, pp. 2387\u20132396 (2016)"},{"key":"13_CR16","unstructured":"Koh, P.W., Liang, P.: Understanding black-box predictions via influence functions. In: International Conference on Machine Learning, pp. 1885\u20131894 (2017)"},{"key":"13_CR17","unstructured":"Laskov, P., et al.: Practical evasion of a learning-based classifier: a case study. In: 2014 IEEE Symposium on Security and Privacy (SP), pp. 197\u2013211. IEEE (2014)"},{"key":"13_CR18","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1111\/j.2517-6161.1988.tb01721.x","volume":"50","author":"SL Lauritzen","year":"1988","unstructured":"Lauritzen, S.L., Spiegelhalter, D.J.: Local computations with probabilities on graphical structures and their application to expert systems. J. R. Stat. Soc. Ser. B (Methodol.) 50, 157\u2013224 (1988)","journal-title":"J. R. Stat. Soc. Ser. B (Methodol.)"},{"key":"13_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71265-9","volume-title":"Introduction to Applied Bayesian Statistics and Estimation for Social Scientists","author":"SM Lynch","year":"2007","unstructured":"Lynch, S.M.: Introduction to Applied Bayesian Statistics and Estimation for Social Scientists. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-0-387-71265-9"},{"issue":"03","key":"13_CR20","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1142\/S0218213005002235","volume":"14","author":"AL Madsen","year":"2005","unstructured":"Madsen, A.L., Jensen, F., Kjaerulff, U.B., Lang, M.: The hugin tool for probabilistic graphical models. Int. J. Artif. Intell. Tools 14(03), 507\u2013543 (2005)","journal-title":"Int. J. Artif. Intell. Tools"},{"issue":"2","key":"13_CR21","doi-asserted-by":"publisher","first-page":"143","DOI":"10.11613\/BM.2013.018","volume":"23","author":"ML McHugh","year":"2013","unstructured":"McHugh, M.L.: The chi-square test of independence. Biochem. Med.: Biochem. Med. 23(2), 143\u2013149 (2013)","journal-title":"Biochem. Med.: Biochem. Med."},{"key":"13_CR22","unstructured":"Mei, S., Zhu, X.: The security of latent Dirichlet allocation. In: Artificial Intelligence and Statistics, pp. 681\u2013689 (2015)"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Mei, S., Zhu, X.: Using machine teaching to identify optimal training-set attacks on machine learners. In: AAAI, pp. 2871\u20132877 (2015)","DOI":"10.1609\/aaai.v29i1.9569"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Mu\u00f1oz-Gonz\u00e1lez, L., et al.: Towards poisoning of deep learning algorithms with back-gradient optimization. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp. 27\u201338. ACM (2017)","DOI":"10.1145\/3128572.3140451"},{"key":"13_CR25","volume-title":"Learning Bayesian Networks","author":"RE Neapolitan","year":"2004","unstructured":"Neapolitan, R.E., et al.: Learning Bayesian Networks, vol. 38. Pearson Prentice Hall, Upper Saddle River (2004)"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Newell, A., Potharaju, R., Xiang, L., Nita-Rotaru, C.: On the practicality of integrity attacks on document-level sentiment analysis. In: Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, pp. 83\u201393. ACM (2014)","DOI":"10.1145\/2666652.2666661"},{"key":"13_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-68282-2","volume-title":"Bayesian Networks and Decision Graphs","author":"TD Nielsen","year":"2009","unstructured":"Nielsen, T.D., Jensen, F.V.: Bayesian Networks and Decision Graphs. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-0-387-68282-2"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Olesen, K.G., Lauritzen, S.L., Jensen, F.V.: aHUGIN: a system creating adaptive causal probabilistic networks. In: Uncertainty in Artificial Intelligence, pp. 223\u2013229. Elsevier (1992)","DOI":"10.1016\/B978-1-4832-8287-9.50035-9"},{"key":"13_CR29","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I.: Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. arXiv preprint arXiv:1605.07277 (2016)"},{"key":"13_CR30","unstructured":"Raiffa, H., Schlaifer, R.: Applied statistical decision theory. Graduate School of Business Administration, Harvard University, Division of Research (1961)"},{"issue":"3","key":"13_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v035.i03","volume":"35","author":"M Scutari","year":"2010","unstructured":"Scutari, M.: Learning Bayesian networks with the bnlearn R package. J. Stat. Softw. 35(3), 1\u201322 (2010)","journal-title":"J. Stat. Softw."},{"issue":"1","key":"13_CR32","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1177\/089443939100900106","volume":"9","author":"P Spirtes","year":"1991","unstructured":"Spirtes, P., Glymour, C.: An algorithm for fast recovery of sparse causal graphs. Soc. Sci. Comput. Rev. 9(1), 62\u201372 (1991)","journal-title":"Soc. Sci. Comput. Rev."},{"key":"13_CR33","volume-title":"Causation, Prediction, and Search","author":"P Spirtes","year":"2000","unstructured":"Spirtes, P., Glymour, C.N., Scheines, R.: Causation, Prediction, and Search. MIT Press, Cambridge (2000)"},{"key":"13_CR34","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)"},{"key":"13_CR35","unstructured":"Xiao, H., Xiao, H., Eckert, C.: Adversarial label flips attack on support vector machines. In: ECAI, pp. 870\u2013875 (2012)"},{"key":"13_CR36","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.neucom.2014.08.081","volume":"160","author":"H Xiao","year":"2015","unstructured":"Xiao, H., Biggio, B., Nelson, B., Xiao, H., Eckert, C., Roli, F.: Support vector machines under adversarial label contamination. Neurocomputing 160, 53\u201362 (2015)","journal-title":"Neurocomputing"},{"key":"13_CR37","unstructured":"Yang, C., Wu, Q., Li, H., Chen, Y.: Generative poisoning attack method against neural networks. arXiv preprint arXiv:1703.01340 (2017)"}],"container-title":["Lecture Notes in Computer Science","ECML PKDD 2018 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-13453-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T20:20:53Z","timestamp":1720988453000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-13453-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030134525","9783030134532"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-13453-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"16 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dublin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ecmlpkdd2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"535","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"131","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}