{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:25:46Z","timestamp":1743017146144,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030224783"},{"type":"electronic","value":"9783030224790"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22479-0_1","type":"book-chapter","created":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T23:02:56Z","timestamp":1562194976000},"page":"3-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Detecting Adversarial Attacks in the Context of Bayesian Networks"],"prefix":"10.1007","author":[{"given":"Emad","family":"Alsuwat","sequence":"first","affiliation":[]},{"given":"Hatim","family":"Alsuwat","sequence":"additional","affiliation":[]},{"given":"John","family":"Rose","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Valtorta","sequence":"additional","affiliation":[]},{"given":"Csilla","family":"Farkas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,11]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Alfeld, S., Zhu, X., Barford, P.: Data poisoning attacks against autoregressive models. In: AAAI, pp. 1452\u20131458 (2016)","DOI":"10.1609\/aaai.v30i1.10237"},{"key":"1_CR2","unstructured":"Alsuwat, E., Alsuwat, H., Rose, J., Valtorta, M., Farkas, C.: Long duration data poisoning attacks on Bayesian networks. Technical report, University of South Carolina, SC, USA (2019)"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-030-13453-2_13","volume-title":"ECML PKDD 2018 Workshops","author":"E Alsuwat","year":"2019","unstructured":"Alsuwat, E., Alsuwat, H., Valtorta, M., Farkas, C.: Cyber attacks against the PC learning algorithm. In: Alzate, C., et al. (eds.) ECML PKDD 2018. LNCS (LNAI), vol. 11329, pp. 159\u2013176. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-13453-2_13"},{"key":"1_CR4","unstructured":"Alsuwat, E., Valtorta, M., Farkas, C.: Bayesian structure learning attacks. Technical report, University of South Carolina, SC, USA (2018)"},{"key":"1_CR5","unstructured":"Alsuwat, E., Valtorta, M., Farkas, C.: How to generate the network you want with the PC learning algorithm. In: Proceedings of the 11th Workshop on Uncertainty Processing (WUPES 2018), pp. 1\u201312 (2018)"},{"issue":"2","key":"1_CR6","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s10994-010-5188-5","volume":"81","author":"M Barreno","year":"2010","unstructured":"Barreno, M., Nelson, B., Joseph, A.D., Tygar, J.D.: The security of machine learning. Mach. Learn. 81(2), 121\u2013148 (2010)","journal-title":"Mach. Learn."},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 16\u201325. ACM (2006)","DOI":"10.1145\/1128817.1128824"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-662-44415-3_5","volume-title":"Structural, Syntactic, and Statistical Pattern Recognition","author":"B Biggio","year":"2014","unstructured":"Biggio, B., et al.: Poisoning complete-linkage hierarchical clustering. In: Fr\u00e4nti, P., Brown, G., Loog, M., Escolano, F., Pelillo, M. (eds.) S+SSPR 2014. LNCS, vol. 8621, pp. 42\u201352. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44415-3_5"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Biggio, B., Didaci, L., Fumera, G., Roli, F.: Poisoning attacks to compromise face templates. In: 2013 International Conference on Biometrics (ICB), pp. 1\u20137. IEEE (2013)","DOI":"10.1109\/ICB.2013.6613006"},{"key":"1_CR10","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/978-3-642-34166-3_46","volume-title":"SSPR \/SPR 2012","author":"B Biggio","year":"2012","unstructured":"Biggio, B., Fumera, G., Roli, F., Didaci, L.: Poisoning adaptive biometric systems. In: Gimel\u2019farb, G., et al. (eds.) SSPR \/SPR 2012. LNCS, vol. 7626, pp. 417\u2013425. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34166-3_46"},{"key":"1_CR11","unstructured":"Biggio, B., Nelson, B., Laskov, P.: Poisoning attacks against support vector machines. In: Proceedings of the 29th International Conference on International Conference on Machine Learning, pp. 1467\u20131474. Omnipress (2012)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Biggio, B., Pillai, I., Rota Bul\u00f2, S., Ariu, D., Pelillo, M., Roli, F.: Is data clustering in adversarial settings secure? In: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, pp. 87\u201398. ACM (2013)","DOI":"10.1145\/2517312.2517321"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Adversarial examples are not easily detected: bypassing ten detection methods. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp. 3\u201314. ACM (2017)","DOI":"10.1145\/3128572.3140444"},{"issue":"6","key":"1_CR14","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1007\/s13042-016-0629-5","volume":"9","author":"PP Chan","year":"2018","unstructured":"Chan, P.P., He, Z.M., Li, H., Hsu, C.C.: Data sanitization against adversarial label contamination based on data complexity. Int. J. Mach. Learn. Cybern. 9(6), 1039\u20131052 (2018)","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"1_CR15","unstructured":"Feinman, R., Curtin, R.R., Shintre, S., Gardner, A.B.: Detecting adversarial samples from artifacts. CoRR abs\/1703.00410 (2017)"},{"issue":"3","key":"1_CR16","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/3003816","volume":"49","author":"J Gardiner","year":"2016","unstructured":"Gardiner, J., Nagaraja, S.: On the security of machine learning in malware C&C detection: a survey. ACM Comput. Surv. (CSUR) 49(3), 59 (2016)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"1_CR17","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Huang, L., Joseph, A.D., Nelson, B., Rubinstein, B.I., Tygar, J.: Adversarial machine learning. In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, pp. 43\u201358. ACM (2011)","DOI":"10.1145\/2046684.2046692"},{"key":"1_CR19","unstructured":"de Jongh, M., Druzdzel, M.J.: A comparison of structural distance measures for causal Bayesian network models. In: Recent Advances in Intelligent Information Systems, Challenging Problems of Science, Computer Science Series, pp. 443\u2013456 (2009)"},{"key":"1_CR20","unstructured":"Kantchelian, A., Tygar, J., Joseph, A.: Evasion and hardening of tree ensemble classifiers. In: International Conference on Machine Learning, pp. 2387\u20132396 (2016)"},{"key":"1_CR21","unstructured":"Koh, P.W., Liang, P.: Understanding black-box predictions via influence functions. In: International Conference on Machine Learning, pp. 1885\u20131894 (2017)"},{"key":"1_CR22","unstructured":"Laskov, P., et al.: Practical evasion of a learning-based classifier: a case study. In: 2014 IEEE Symposium on Security and Privacy (SP), pp. 197\u2013211. IEEE (2014)"},{"issue":"2","key":"1_CR23","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1111\/j.2517-6161.1988.tb01721.x","volume":"50","author":"S. L. Lauritzen","year":"1988","unstructured":"Lauritzen, S.L., Spiegelhalter, D.J.: Local computations with probabilities on graphical structures and their application to expert systems. J. Roy. Stat. Soc. Ser. B (Methodol.) 50, 157\u2013224 (1988)","journal-title":"Journal of the Royal Statistical Society: Series B (Methodological)"},{"key":"1_CR24","doi-asserted-by":"publisher","first-page":"12103","DOI":"10.1109\/ACCESS.2018.2805680","volume":"6","author":"Q Liu","year":"2018","unstructured":"Liu, Q., Li, P., Zhao, W., Cai, W., Yu, S., Leung, V.C.: A survey on security threats and defensive techniques of machine learning: a data driven view. IEEE Access 6, 12103\u201312117 (2018)","journal-title":"IEEE Access"},{"key":"1_CR25","doi-asserted-by":"publisher","unstructured":"Lu, J., Issaranon, T., Forsyth, D.: Safetynet: detecting and rejecting adversarial examples robustly. In: 2017 IEEE International Conference on Computer Vision (ICCV), pp. 446\u2013454, October 2017. https:\/\/doi.org\/10.1109\/ICCV.2017.56","DOI":"10.1109\/ICCV.2017.56"},{"issue":"03","key":"1_CR26","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1142\/S0218213005002235","volume":"14","author":"AL Madsen","year":"2005","unstructured":"Madsen, A.L., Jensen, F., Kjaerulff, U.B., Lang, M.: The Hugin tool for probabilistic graphical models. Int. J. Artif. Intell. Tools 14(03), 507\u2013543 (2005)","journal-title":"Int. J. Artif. Intell. Tools"},{"key":"1_CR27","unstructured":"Mei, S., Zhu, X.: The security of latent Dirichlet allocation. In: Artificial Intelligence and Statistics, pp. 681\u2013689 (2015)"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Mei, S., Zhu, X.: Using machine teaching to identify optimal training-set attacks on machine learners. In: AAAI, pp. 2871\u20132877 (2015)","DOI":"10.1609\/aaai.v29i1.9569"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Mu\u00f1oz-Gonz\u00e1lez, L., et al.: Towards poisoning of deep learning algorithms with back-gradient optimization. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp. 27\u201338. ACM (2017)","DOI":"10.1145\/3128572.3140451"},{"key":"1_CR30","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-0-387-88735-7_2","volume-title":"Machine Learning in Cyber Trust","author":"B Nelson","year":"2009","unstructured":"Nelson, B., et al.: Misleading learners: co-opting your spam filter. In: Yu, P.S., Tsai, J.J.P. (eds.) Machine Learning in Cyber Trust, pp. 17\u201351. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-0-387-88735-7_2"},{"key":"1_CR31","volume-title":"Bayesian Networks and Decision Graphs","author":"TD Nielsen","year":"2009","unstructured":"Nielsen, T.D., Jensen, F.V.: Bayesian Networks and Decision Graphs. Springer, Heidelberg (2009)"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Olesen, K.G., Lauritzen, S.L., Jensen, F.V.: aHUGIN: a system creating adaptive causal probabilistic networks. In: Uncertainty in Artificial Intelligence, pp. 223\u2013229. Elsevier (1992)","DOI":"10.1016\/B978-1-4832-8287-9.50035-9"},{"key":"1_CR33","unstructured":"Paudice, A., Mu\u00f1oz-Gonz\u00e1lez, L., Gyorgy, A., Lupu, E.C.: Detection of adversarial training examples in poisoning attacks through anomaly detection. arXiv preprint arXiv:1802.03041 (2018)"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Spirtes, P., Glymour, C.N., Scheines, R.: Causation, Prediction, and Search. MIT Press, Cambridge (2000)","DOI":"10.7551\/mitpress\/1754.001.0001"},{"key":"1_CR35","unstructured":"Wang, Y., Chaudhuri, K.: Data poisoning attacks against online learning. arXiv preprint arXiv:1808.08994 (2018)"},{"key":"1_CR36","unstructured":"Yang, C., Wu, Q., Li, H., Chen, Y.: Generative poisoning attack method against neural networks. arXiv preprint arXiv:1703.01340 (2017)"},{"issue":"3","key":"1_CR37","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1111\/j.1551-6709.2011.01223.x","volume":"36","author":"SKM Yi","year":"2012","unstructured":"Yi, S.K.M., Steyvers, M., Lee, M.D., Dry, M.J.: The wisdom of the crowd in combinatorial problems. Cogn. Sci. 36(3), 452\u2013470 (2012)","journal-title":"Cogn. Sci."}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXIII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22479-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T16:08:51Z","timestamp":1721491731000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22479-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030224783","9783030224790"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22479-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Charleston, SC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dbsec2019.cse.sc.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}