{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T15:09:03Z","timestamp":1759072143425},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030295158"},{"type":"electronic","value":"9783030295165"}],"license":[{"start":{"date-parts":[[2019,8,24]],"date-time":"2019-08-24T00:00:00Z","timestamp":1566604800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-29516-5_10","type":"book-chapter","created":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T16:03:48Z","timestamp":1566576228000},"page":"111-125","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Timing Attacks on Machine Learning: State of the Art"],"prefix":"10.1007","author":[{"given":"Mazaher","family":"Kianpour","sequence":"first","affiliation":[]},{"given":"Shao-Fang","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,24]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/4235.585893","volume":"1","author":"D Wolpert","year":"1997","unstructured":"Wolpert, D.: No free lunch theorem for optimization. IEEE Trans. Evol. Comput. 1, 467\u2013482 (1997)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"10_CR2","volume-title":"Introduction to Machine Learning\/Ethem Alpaydin","author":"E Alpaydin","year":"2010","unstructured":"Alpaydin, E.: Introduction to Machine Learning\/Ethem Alpaydin. The MIT Press, Cambridge (2010)"},{"key":"10_CR3","unstructured":"Chapelle, O., Zien, A.: Semi-supervised classification by low density separation. In: AISTATS 2005, vol. 2005, pp. 57\u201364 (2005)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Yang, B., Sun, J.-T., Wang, T., Chen, Z.: Effective multi-label active learning for text classification. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 917\u2013926 (2009)","DOI":"10.1145\/1557019.1557119"},{"issue":"2","key":"10_CR5","doi-asserted-by":"publisher","first-page":"884","DOI":"10.1016\/j.patcog.2011.08.009","volume":"45","author":"E Lughofer","year":"2012","unstructured":"Lughofer, E.: Hybrid active learning for reducing the annotation effort of operators in classification systems. Pattern Recognit. 45(2), 884\u2013896 (2012)","journal-title":"Pattern Recognit."},{"key":"10_CR6","unstructured":"Settles, B.: Active learning literature survey. 2010 Computer Sciences Technical Report 1648 (2014)"},{"key":"10_CR7","unstructured":"Settles, B., Craven, M., Ray, S.: Multiple-instance active learning. In: Advances in Neural Information Processing Systems, pp. 1289\u20131296 (2008)"},{"key":"10_CR8","volume-title":"Introduction to Reinforcement Learning","author":"RS Sutton","year":"1998","unstructured":"Sutton, R.S., Barto, A.G.: Introduction to Reinforcement Learning, vol. 135. MIT Press, Cambridge (1998)"},{"key":"10_CR9","unstructured":"Bojarski, M., et al.: End to end learning for self-driving cars. arXiv Prepr arXiv:1604.07316 (2016)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Chen, Z., Huang, X.: End-to-end learning for lane keeping of self-driving cars. In: 2017 IEEE Intelligent Vehicles Symposium (IV), pp. 1856\u20131860 (2017)","DOI":"10.1109\/IVS.2017.7995975"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Bhowmick, A., Hazarika, S.M.: E-mail spam filtering: a review of techniques and trends. In: Advances in Electronics, Communication and Computing, pp. 583\u2013590. Springer (2018)","DOI":"10.1007\/978-981-10-4765-7_61"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Melo-Acosta, G.E., Duitama-Mu\u00f1oz, F., Arias-Londo\u00f1o, J.D.: Fraud detection in big data using supervised and semi-supervised learning techniques. In: 2017 IEEE Colombian Conference on Communications and Computing (COLCOM), pp. 1\u20136 (2017)","DOI":"10.1109\/ColComCon.2017.8088206"},{"issue":"3","key":"10_CR13","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/3073559","volume":"50","author":"Y Ye","year":"2017","unstructured":"Ye, Y., Li, T., Adjeroh, D., Iyengar, S.S.: A survey on malware detection using data mining techniques. ACM Comput. Surv. 50(3), 41 (2017)","journal-title":"ACM Comput. Surv."},{"issue":"2","key":"10_CR14","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1016\/j.comnet.2012.06.022","volume":"57","author":"R Perdisci","year":"2013","unstructured":"Perdisci, R., Ariu, D., Giacinto, G.: Scalable fine-grained behavioral clustering of HTTP-based malware. Comput. Networks 57(2), 487\u2013500 (2013)","journal-title":"Comput. Networks"},{"issue":"4","key":"10_CR15","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1145\/1030194.1015492","volume":"34","author":"A Lakhina","year":"2004","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Diagnosing network-wide traffic anomalies. ACM SIGCOMM Comput. Commun. Rev. 34(4), 219\u2013230 (2004)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"10_CR16","first-page":"226","volume-title":"Lecture Notes in Computer Science","author":"Ke Wang","year":"2006","unstructured":"Wang, K., Parekh, J.J., Stolfo, S.J.: Anagram: a content anomaly detector resistant to mimicry attack. In: International Workshop on Recent Advances in Intrusion Detection, pp. 226\u2013248 (2006)"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 16\u201325 (2006)","DOI":"10.1145\/1128817.1128824"},{"issue":"2","key":"10_CR18","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s10994-010-5188-5","volume":"81","author":"M Barreno","year":"2010","unstructured":"Barreno, M., Nelson, B., Joseph, A.D., Tygar, J.D.: The security of machine learning. Mach. Learn. 81(2), 121\u2013148 (2010)","journal-title":"Mach. Learn."},{"key":"10_CR19","unstructured":"Suciu, O., Marginean, R., Kaya, Y., Daum\u00e9 III, H., Dumitras, T.: When does machine learning FAIL? Generalized transferability for evasion and poisoning attacks. arXiv Prepr. arXiv:1803.06975 (2018)"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Alfeld, S., Zhu, X., Barford, P.: Explicit defense actions against test-set attacks. In: AAAI, pp. 1274\u20131280 (2017)","DOI":"10.1609\/aaai.v31i1.10767"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1007\/978-3-030-00470-5_23","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"Ishai Rosenberg","year":"2018","unstructured":"Rosenberg, I., Shabtai, A., Rokach, L., Elovici, Y.: Generic black-box end-to-end attack against state of the art API call based malware classifiers. In: International Symposium on Research in Attacks, Intrusions, and Defenses, pp. 490\u2013510 (2018)"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Audio adversarial examples: targeted attacks on speech-to-text. arXiv Prepr arXiv:1801.01944 (2018)","DOI":"10.1109\/SPW.2018.00009"},{"key":"10_CR23","unstructured":"Xu, W., Qi, Y., Evans, D.: Automatically evading classifiers. In: Proceedings of the 2016 Network and Distributed Systems Symposium (2016)"},{"issue":"May","key":"10_CR24","first-page":"1293","volume":"13","author":"B Nelson","year":"2012","unstructured":"Nelson, B., et al.: Query strategies for evading convex-inducing classifiers. J. Mach. Learn. Res. 13(May), 1293\u20131332 (2012)","journal-title":"J. Mach. Learn. Res."},{"issue":"3","key":"10_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00861ED1V01Y201806AIM039","volume":"12","author":"Y Vorobeychik","year":"2018","unstructured":"Vorobeychik, Y., Kantarcioglu, M.: Adversarial machine learning. Synth. Lect. Artif. Intell. Mach. Learn. 12(3), 1\u2013169 (2018)","journal-title":"Synth. Lect. Artif. Intell. Mach. Learn."},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Yao, G., Bi, J., Xiao, P.: Source address validation solution with OpenFlow\/NOX architecture. In: 2011 19th IEEE International Conference on Network Protocols (ICNP), pp. 7\u201312 (2011)","DOI":"10.1109\/ICNP.2011.6089085"},{"issue":"4","key":"10_CR27","doi-asserted-by":"publisher","first-page":"984","DOI":"10.1109\/TKDE.2013.57","volume":"26","author":"B Biggio","year":"2014","unstructured":"Biggio, B., Fumera, G., Roli, F.: Security evaluation of pattern classifiers under attack. IEEE Trans. Knowl. Data Eng. 26(4), 984\u2013996 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10_CR28","unstructured":"Li, B., Vorobeychik, Y.: Scalable optimization of randomized operational decisions in adversarial classification settings. In: Artificial Intelligence and Statistics, pp. 599\u2013607 (2015)"},{"key":"10_CR29","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031","volume-title":"Security and Game Theory: Algorithms, Deployed Systems","author":"M Tambe","year":"2011","unstructured":"Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems. Lessons Learned. Cambridge University Press, Cambridge (2011)"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Miao, C., Li, Q., Xiao, H., Jiang, W., Huai, M., Su, L.: Towards data poisoning attacks in crowd sensing systems. In: Proceedings of the Eighteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 111\u2013120 (2018)","DOI":"10.1145\/3209582.3209594"},{"issue":"7","key":"10_CR31","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/3134599","volume":"61","author":"I Goodfellow","year":"2018","unstructured":"Goodfellow, I., McDaniel, P., Papernot, N.: Making machine learning robust against adversarial inputs. Commun. ACM 61(7), 56\u201366 (2018)","journal-title":"Commun. ACM"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Hanif, M.A., Khalid, F., Putra, R.V.W., Rehman, S., Shafique, M.: Robust machine learning systems: reliability and security for deep neural networks. In: 2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS), pp. 257\u2013260 (2018)","DOI":"10.1109\/IOLTS.2018.8474192"},{"key":"10_CR33","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1007\/978-3-540-27819-1_43","volume-title":"Learning Theory","author":"Mikhail Belkin","year":"2004","unstructured":"Belkin, M., Matveeva, I., Niyogi, P.: Regularization and semi-supervised learning on large graphs. In: International Conference on Computational Learning Theory, pp. 624\u2013638 (2004)"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29516-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T07:43:22Z","timestamp":1664178202000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-29516-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,24]]},"ISBN":["9783030295158","9783030295165"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29516-5_10","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,8,24]]},"assertion":[{"value":"24 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IntelliSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of SAI Intelligent Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intellisys2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/IntelliSys","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}