{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T01:21:28Z","timestamp":1760404888110,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031084201"},{"type":"electronic","value":"9783031084218"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-08421-8_34","type":"book-chapter","created":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T21:02:38Z","timestamp":1658178158000},"page":"490-502","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Adversarial Machine Learning in\u00a0e-Health: Attacking a\u00a0Smart Prescription System"],"prefix":"10.1007","author":[{"given":"Salvatore","family":"Gaglio","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Giammanco","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Lo Re","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Morana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,19]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Agate, V., Concone, F., Ferraro, P.: WIP: smart services for an augmented campus. In: 2018 IEEE International Conference on Smart Computing, pp. 276\u2013278 (2018)","DOI":"10.1109\/SMARTCOMP.2018.00056"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Agate, V., De Paola, A., Gaglio, S., Lo Re, G., Morana, M.: A framework for parallel assessment of reputation management systems. In: 17th International Conference on Computer Systems and Technologies, pp. 121\u2013128 (2016)","DOI":"10.1145\/2983468.2983474"},{"issue":"1\u20134","key":"34_CR3","first-page":"1","volume":"37","author":"V Agate","year":"2021","unstructured":"Agate, V., De Paola, A., Lo Re, G., Morana, M.: A simulation software for the evaluation of vulnerabilities in reputation management systems. ACM Trans. Comput. Syst. (TOCS) 37(1\u20134), 1\u201330 (2021)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"34_CR4","unstructured":"Agate, V., Ferraro, P., Gaglio, S.: A cognitive architecture for ambient intelligence systems. In: AIC, pp. 52\u201358 (2018)"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Al-Dujaili, A., Huang, A., Hemberg, E., O\u2019Reilly, U.M.: Adversarial deep learning for robust detection of binary encoded malware. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 76\u201382 (2018)","DOI":"10.1109\/SPW.2018.00020"},{"key":"34_CR6","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","volume":"84","author":"B Biggio","year":"2018","unstructured":"Biggio, B., Roli, F.: Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recogn. 84, 317\u2013331 (2018)","journal-title":"Pattern Recogn."},{"key":"34_CR7","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1038\/s42256-020-00266-y","volume":"2","author":"C Buckner","year":"2020","unstructured":"Buckner, C.: Understanding adversarial examples requires a theory of artefacts for deep learning. Nat. Mach. Intell. 2, 731\u2013736 (2020)","journal-title":"Nat. Mach. Intell."},{"key":"34_CR8","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1016\/j.dcan.2020.11.001","volume":"7","author":"J Chen","year":"2020","unstructured":"Chen, J., Wu, D., Zhao, Y., Sharma, N., Blumenstein, M., Yu, S.: Fooling intrusion detection systems using adversarially autoencoder. Digit. Commun. Netw. 7, 453\u2013460 (2020)","journal-title":"Digit. Commun. Netw."},{"key":"34_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-319-70169-1_5","volume-title":"Advances in Artificial Intelligence","author":"F Concone","year":"2017","unstructured":"Concone, F., Gaglio, S., Lo Re, G., Morana, M.: Smartphone data analysis for human activity recognition. In: Esposito, F., Basili, R., Ferilli, S., Lisi, F. (eds.) AI*IA 2017. LNCS, vol. 10640, pp. 58\u201371. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70169-1_5"},{"issue":"2","key":"34_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3266142","volume":"19","author":"F Concone","year":"2019","unstructured":"Concone, F., Lo Re, G., Morana, M.: A fog-based application for human activity recognition using personal smart devices. ACM Trans. Internet Technol. (TOIT) 19(2), 1\u201320 (2019)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"34_CR11","unstructured":"Concone, F., Lo Re, G., Morana, M., Ruocco, C.: Twitter spam account detection by effective labeling. In: ITASEC (2019)"},{"key":"34_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-319-67585-5_44","volume-title":"Ubiquitous Computing and Ambient Intelligence","author":"A De Paola","year":"2017","unstructured":"De Paola, A., et al.: A context-aware system for ambient assisted living. In: Ochoa, S.F., Singh, P., Bravo, J. (eds.) UCAmI 2017. LNCS, vol. 10586, pp. 426\u2013438. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67585-5_44"},{"issue":"7","key":"34_CR13","doi-asserted-by":"publisher","first-page":"2793","DOI":"10.1007\/s12652-019-01375-2","volume":"11","author":"A De Paola","year":"2019","unstructured":"De Paola, A., Ferraro, P., Lo Re, G., Morana, M., Ortolani, M.: A fog-based hybrid intelligent system for energy saving in smart buildings. J. Ambient. Intell. Humaniz. Comput. 11(7), 2793\u20132807 (2019). https:\/\/doi.org\/10.1007\/s12652-019-01375-2","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"De Paola, A., Gaglio, S., Giammanco, A., Lo Re, G., Morana, M.: A multi-agent system for itinerary suggestion in smart environments. In: CAAI Transactions on Intelligence Technology (2021)","DOI":"10.1049\/cit2.12056"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"De Paola, A., Gaglio, S., Lo Re, G., Morana, M.: A hybrid system for malware detection on big data. In: IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 45\u201350 (2018)","DOI":"10.1109\/INFCOMW.2018.8406963"},{"key":"34_CR16","unstructured":"Demontis, A., et al.: Why do adversarial attacks transfer? Explaining transferability of evasion and poisoning attacks. In: 28th USENIX Security Symposium (USENIX Security 2019), pp. 321\u2013338 (2019)"},{"issue":"6433","key":"34_CR17","doi-asserted-by":"publisher","first-page":"1287","DOI":"10.1126\/science.aaw4399","volume":"363","author":"SG Finlayson","year":"2019","unstructured":"Finlayson, S.G., Bowers, J.D., Ito, J., Zittrain, J.L., Beam, A.L., Kohane, I.S.: Adversarial attacks on medical machine learning. Science 363(6433), 1287\u20131289 (2019)","journal-title":"Science"},{"key":"34_CR18","doi-asserted-by":"crossref","unstructured":"Goldberger, A.L., et al.: PhysioBank, PhysioToolkit, and PhysioNet: components of a new research resource for complex physiologic signals. Circulation 101(23), e215\u2013e220 (2000)","DOI":"10.1161\/01.CIR.101.23.e215"},{"key":"34_CR19","volume-title":"Deep Learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press, Cambridge (2016)"},{"key":"34_CR20","unstructured":"Goodfellow, I., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: International Conference on Learning Representations (2015)"},{"key":"34_CR21","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.neucom.2020.02.110","volume":"401","author":"Q Guo","year":"2020","unstructured":"Guo, Q., et al.: INOR-an intelligent noise reduction method to defend against adversarial audio examples. Neurocomputing 401, 160\u2013172 (2020)","journal-title":"Neurocomputing"},{"key":"34_CR22","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Delving deep into rectifiers: surpassing human-level performance on ImageNet classification. In: Proceedings of the IEEE International Conference on Computer Vision (ICCV) (2015)","DOI":"10.1109\/ICCV.2015.123"},{"key":"34_CR23","doi-asserted-by":"crossref","unstructured":"Kanjilal, S., Oberst, M., Boominathan, S., Zhou, H., Hooper, D.C., Sontag, D.: A decision algorithm to promote outpatient antimicrobial stewardship for uncomplicated urinary tract infection. Science Transl. Med. 12(568) (2020)","DOI":"10.1126\/scitranslmed.aay5067"},{"key":"34_CR24","doi-asserted-by":"crossref","unstructured":"Maiorca, D., Demontis, A., Biggio, B., Roli, F., Giacinto, G.: Adversarial detection of flash malware: limitations and open issues. Comput. Secur. 96 (2020)","DOI":"10.1016\/j.cose.2020.101901"},{"issue":"2","key":"34_CR25","doi-asserted-by":"publisher","first-page":"143","DOI":"10.11613\/BM.2013.018","volume":"23","author":"ML McHugh","year":"2013","unstructured":"McHugh, M.L.: The chi-square test of independence. Biochemia medica 23(2), 143\u2013149 (2013)","journal-title":"Biochemia medica"},{"key":"34_CR26","doi-asserted-by":"crossref","unstructured":"Newaz, A.I., Haque, N.I., Sikder, A.K., Rahman, M.A., Uluagac, A.S.: Adversarial attacks to machine learning-based smart healthcare systems. In: 2020 IEEE Global Communications Conference, GLOBECOM 2020, pp. 1\u20136 (2020)","DOI":"10.1109\/GLOBECOM42002.2020.9322472"},{"key":"34_CR27","unstructured":"Oberst, M., Boominathan, S., Zhou, H., Kanjilal, S., Sontag, D.: AMR-UTI: antimicrobial resistance in urinary tract infections (version 1.0.0). Physionet (2020)"},{"issue":"2","key":"34_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3377454","volume":"53","author":"J Verbraeken","year":"2020","unstructured":"Verbraeken, J., Wolting, M., Katzy, J., Kloppenburg, J., Verbelen, T., Rellermeyer, J.S.: A survey on distributed machine learning. ACM Comput. Surv. (CSUR) 53(2), 1\u201333 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"34_CR29","doi-asserted-by":"crossref","unstructured":"Xue, M., Yuan, C., He, C., Wang, J., Liu, W.: NaturalAE: natural and robust physical adversarial examples for object detectors. J. Inf. Secur. Appl. 57, 102694 (2021)","DOI":"10.1016\/j.jisa.2020.102694"},{"key":"34_CR30","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1109\/TCSS.2019.2960824","volume":"7","author":"P Zhao","year":"2020","unstructured":"Zhao, P., Huang, H., Zhao, X., Huang, D.: P$$^3$$: privacy-preserving scheme against poisoning attacks in mobile-edge computing. IEEE Trans. Comput. Soc. Syst. 7, 818\u2013826 (2020)","journal-title":"IEEE Trans. Comput. Soc. Syst."}],"container-title":["Lecture Notes in Computer Science","AIxIA 2021 \u2013 Advances in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-08421-8_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T21:07:39Z","timestamp":1658178459000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-08421-8_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031084201","9783031084218"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-08421-8_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"19 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIxIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of the Italian Association for Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aiia2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aixia2021.disco.unimib.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}