{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:05:33Z","timestamp":1767704733064,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030617240"},{"type":"electronic","value":"9783030617257"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61725-7_32","type":"book-chapter","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T13:05:25Z","timestamp":1604322325000},"page":"274-282","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Resilient Machine Learning (rML) Ensemble Against Adversarial Machine Learning Attacks"],"prefix":"10.1007","author":[{"given":"Likai","family":"Yao","sequence":"first","affiliation":[]},{"given":"Cihan","family":"Tunc","sequence":"additional","affiliation":[]},{"given":"Pratik","family":"Satam","sequence":"additional","affiliation":[]},{"given":"Salim","family":"Hariri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,3]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Dalvi, N., Domingos, P., Sanghai, S., Verma, D.: Adversarial classification. In: Proceedings of the tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 99\u2013108 (2004)","DOI":"10.1145\/1014052.1014066"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Biggio, B., et al.: Evasion attacks against machine learning at test time. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases (2013)","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"32_CR3","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"32_CR4","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, pp. 2672\u20132680 (2014)"},{"key":"32_CR5","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","volume":"84","author":"B Biggio","year":"2018","unstructured":"Biggio, B., Roli, F.: Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recogn. 84, 317\u2013331 (2018)","journal-title":"Pattern Recogn."},{"key":"32_CR6","unstructured":"Lee, P.: Learning from Tay\u2019s introduction. Official Microsoft Blog (2016). https:\/\/blogs.microsoft.com\/blog\/2016\/03\/25\/learning-tays-introduction\/. Accessed 27 July 2020"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., et al.: Practical black-box attacks against deep learning systems using adversarial examples. arXiv:1602.02697 (2016)","DOI":"10.1145\/3052973.3053009"},{"issue":"3","key":"32_CR8","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1109\/JPROC.2004.842783","volume":"93","author":"F Darema","year":"2005","unstructured":"Darema, F.: Grid computing and beyond: the context of dynamic data driven applications systems. Proc. IEEE 93(3), 692\u2013697 (2005)","journal-title":"Proc. IEEE"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Blasch, E.: DDDAS advantages from high-dimensional simulation. In: 2018 IEEE Winter Simulation Conference (WSC), pp. 1418\u20131429 (2018)","DOI":"10.1109\/WSC.2018.8632336"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Blasch, E., Al-Nashif, Y., Hariri, S.: Static versus dynamic data information fusion analysis using DDDAS for cyber security trust. Procedia Comput. Sci. 29 (2014)","DOI":"10.1016\/j.procs.2014.05.117"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Ditzler, G., Hariri, S., Akoglu, A.: High performance machine learning (HPML) framework to support DDDAS decision support systems: design overview. In: IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS* W) pp. 360\u2013362 (2017)","DOI":"10.1109\/FAS-W.2017.174"},{"key":"32_CR12","doi-asserted-by":"publisher","first-page":"2623","DOI":"10.1016\/j.procs.2015.05.370","volume":"51","author":"Y Badr","year":"2015","unstructured":"Badr, Y., Hariri, S., Youssif, A.N., Blasch, E.: Resilient and trustworthy dynamic data-driven application systems (DDDAS) services for crisis management environments. Procedia Comput. Sci. 51, 2623\u20132637 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Blasch, E., e al.: DDDAS-based Joint Nonlinear Manifold Learning for Target Localization. Structural Health Monitoring (2017)","DOI":"10.12783\/shm2017\/14241"},{"key":"32_CR14","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-319-95504-9_5","volume-title":"Handbook of Dynamic Data Driven Applications Systems","author":"S Chen","year":"2018","unstructured":"Chen, S., Imai, S., Zhu, W., Varela, C.A.: Towards learning spatio-temporal data stream relationships for failure detection in avionics. In: Blasch, E., Ravela, S., Aved, A. (eds.) Handbook of Dynamic Data Driven Applications Systems, pp. 97\u2013121. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95504-9_5"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Nguyen, A., Yosinski, J., Clune, J.: Deep neural networks are easily fooled: high confidence predictions for unrecognizable images. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 427\u2013436 (2015)","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"32_CR16","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.eswa.2017.09.053","volume":"92","author":"Z Katzir","year":"2018","unstructured":"Katzir, Z., Elovici, Y.: Quantifying the resilience of machine learning classifiers used for cyber security. Expert Syst. Appl. 92, 419\u2013429 (2018)","journal-title":"Expert Syst. Appl."},{"key":"32_CR17","unstructured":"Biggio, B., Nelson, B., Laskov, P.: Support vector machines under adversarial label noise. In: Asian Conference on Machine Learning, pp. 97\u2013112 (2011)"},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Rosenberg, I., Shabtai, A., Rokach, L., Elovici, Y.: Generic black-box end-to-end attack against RNNs and other api calls based malware classifiers. arXiv:1707.05970 (2017)","DOI":"10.1007\/978-3-030-00470-5_23"},{"issue":"3","key":"32_CR19","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O., et al.: Imagenet large scale visual recognition challenge. Int. J. Comput. Vision 115(3), 211\u2013252 (2015)","journal-title":"Int. J. Comput. Vision"},{"key":"32_CR20","unstructured":"Chen, S., Huang, X., He, Z., Sun, C.: DAmageNet: A Universal Adversarial Dataset. arXiv:1912.07160 (2019)"},{"key":"32_CR21","doi-asserted-by":"publisher","unstructured":"Boyer, R.S., Moore, J.S.: MJRTY\u2014a fast majority vote algorithm. In: Boyer, R.S. (ed.) Automated Reasoning, pp. 105\u2013117. Springer, Dordrecht (1991). https:\/\/doi.org\/10.1007\/978-94-011-3488-0_5","DOI":"10.1007\/978-94-011-3488-0_5"}],"container-title":["Lecture Notes in Computer Science","Dynamic Data Driven Applications Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61725-7_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,26]],"date-time":"2022-11-26T05:39:38Z","timestamp":1669441178000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-61725-7_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030617240","9783030617257"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61725-7_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"3 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DDDAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Dynamic Data Driven Application Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Boston, MA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dddas2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/view\/dddas-conf\/home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}