{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:50:00Z","timestamp":1742989800762,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031365737"},{"type":"electronic","value":"9783031365744"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-36574-4_22","type":"book-chapter","created":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T13:01:58Z","timestamp":1689426118000},"page":"368-384","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Poisoning-Attack Detection Using an\u00a0Auto-encoder for\u00a0Deep Learning Models"],"prefix":"10.1007","author":[{"given":"El Moadine","family":"Anass","sequence":"first","affiliation":[]},{"given":"Coatrieux","family":"Gouenou","sequence":"additional","affiliation":[]},{"given":"Bellafqira","family":"Reda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,16]]},"reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-030-11389-6_24","volume-title":"Digital Forensics and Watermarking","author":"R Bellafqira","year":"2019","unstructured":"Bellafqira, R., Coatrieux, G., Genin, E., Cozic, M.: Secure multilayer perceptron based on homomorphic encryption. In: Yoo, C.D., Shi, Y.-Q., Kim, H.J., Piva, A., Kim, G. (eds.) IWDW 2018. LNCS, vol. 11378, pp. 322\u2013336. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-11389-6_24"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Castro, F.M., Mar\u00edn-Jim\u00e9nez, M.J., Guil, N., Schmid, C., Alahari, K.: End-to-end incremental learning. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 233\u2013248 (2018)","DOI":"10.1007\/978-3-030-01258-8_15"},{"key":"22_CR3","doi-asserted-by":"publisher","first-page":"3412","DOI":"10.1109\/TIFS.2021.3080522","volume":"16","author":"J Chen","year":"2021","unstructured":"Chen, J., Zhang, X., Zhang, R., Wang, C., Liu, L.: De-pois: an attack-agnostic defense against data poisoning attacks. IEEE Trans. Inf. Forensics Secur. 16, 3412\u20133425 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"22_CR4","unstructured":"Cin\u00e0, A.E., Grosse, K., Demontis, A., Biggio, B., Roli, F., Pelillo, M.: Machine learning security against data poisoning: are we there yet? arXiv preprint arXiv:2204.05986 (2022)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Gu, Z., Yang, Y.: Detecting malicious model updates from federated learning on conditional variational autoencoder. In: 2021 IEEE International Parallel and Distributed Processing Symposium (IPDPS), pp. 671\u2013680. IEEE (2021)","DOI":"10.1109\/IPDPS49936.2021.00075"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"issue":"4","key":"22_CR7","doi-asserted-by":"publisher","first-page":"4439","DOI":"10.1109\/TVT.2020.2977378","volume":"69","author":"W Jiang","year":"2020","unstructured":"Jiang, W., Li, H., Liu, S., Luo, X., Lu, R.: Poisoning and evasion attacks against deep learning algorithms in autonomous vehicles. IEEE Trans. Veh. Technol. 69(4), 4439\u20134449 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1007\/978-3-642-04898-2_327","volume-title":"International Encyclopedia of Statistical Science","author":"JM Joyce","year":"2011","unstructured":"Joyce, J.M.: Kullback-leibler divergence. In: Lovric, M. (ed.) International Encyclopedia of Statistical Science, pp. 720\u2013722. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-04898-2_327"},{"key":"22_CR9","unstructured":"Krizhevsky, A., Hinton, G., et al.: Learning multiple layers of features from tiny images. Technical report (2009)"},{"issue":"1","key":"22_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/sdata.2017.177","volume":"4","author":"RS Lee","year":"2017","unstructured":"Lee, R.S., Gimenez, F., Hoogi, A., Miyake, K.K., Gorovoy, M., Rubin, D.L.: A curated mammography data set for use in computer-aided detection and diagnosis research. Scientific data 4(1), 1\u20139 (2017)","journal-title":"Scientific data"},{"key":"22_CR11","unstructured":"Li, S., Cheng, Y., Wang, W., Liu, Y., Chen, T.: Learning to detect malicious clients for robust federated learning. arXiv preprint arXiv:2002.00211 (2020)"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Madani, P., Vlajic, N.: Robustness of deep autoencoder in intrusion detection under adversarial contamination. In: Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, pp. 1\u20138 (2018)","DOI":"10.1145\/3190619.3190637"},{"issue":"3","key":"22_CR13","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan, Y., et al.: N-baiot-network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12\u201322 (2018)","journal-title":"IEEE Pervasive Comput."},{"issue":"3","key":"22_CR14","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/JPROC.2020.2970615","volume":"108","author":"DJ Miller","year":"2020","unstructured":"Miller, D.J., Xiang, Z., Kesidis, G.: Adversarial learning targeting deep neural network classification: a comprehensive review of defenses against attacks. Proc. IEEE 108(3), 402\u2013433 (2020)","journal-title":"Proc. IEEE"},{"issue":"6","key":"22_CR15","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1109\/JBHI.2014.2344095","volume":"19","author":"M Mozaffari-Kermani","year":"2014","unstructured":"Mozaffari-Kermani, M., Sur-Kolay, S., Raghunathan, A., Jha, N.K.: Systematic poisoning attacks on and defenses for machine learning in healthcare. IEEE J. Biomed. Health Inform. 19(6), 1893\u20131905 (2014)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Mu\u00f1oz-Gonz\u00e1lez, L., et al.: Towards poisoning of deep learning algorithms with back-gradient optimization. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp. 27\u201338 (2017)","DOI":"10.1145\/3128572.3140451"},{"key":"22_CR17","unstructured":"Razmi, F., Xiong, L.: Classification auto-encoder based detector against diverse data poisoning attacks. arXiv preprint arXiv:2108.04206 (2021)"},{"key":"22_CR18","unstructured":"Shafahi, A., et al.: Poison frogs! targeted clean-label poisoning attacks on neural networks. In: Advances in Neural Information Processing Systems, vol. 31 (2018)"},{"key":"22_CR19","unstructured":"Shamir, O., Srebro, N., Zhang, T.: Communication-efficient distributed optimization using an approximate newton-type method. In: International Conference on Machine Learning, pp. 1000\u20131008. PMLR (2014)"},{"key":"22_CR20","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)"},{"key":"22_CR21","unstructured":"Smith, V., Chiang, C.K., Sanjabi, M., Talwalkar, A.S.: Federated multi-task learning. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Soni, R., Paliya, S., Gupta, L.: Security threats to machine learning systems. In: 2022 IEEE International Students\u2019 Conference on Electrical, Electronics and Computer Science (SCEECS), pp. 1\u20133. IEEE (2022)","DOI":"10.1109\/SCEECS54111.2022.9740774"},{"key":"22_CR23","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.dcan.2021.07.009","volume":"8","author":"C Wang","year":"2021","unstructured":"Wang, C., Chen, J., Yang, Y., Ma, X., Liu, J.: Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects. Digital Commun. Netw. 8, 225\u2013234 (2021)","journal-title":"Digital Commun. Netw."},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Wang, Y.X., Ramanan, D., Hebert, M.: Growing a brain: fine-tuning by increasing model capacity. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2471\u20132480 (2017)","DOI":"10.1109\/CVPR.2017.323"},{"key":"22_CR25","doi-asserted-by":"publisher","first-page":"102083","DOI":"10.1016\/j.media.2021.102083","volume":"71","author":"Y Yan","year":"2021","unstructured":"Yan, Y., Conze, P.H., Lamard, M., Quellec, G., Cochener, B., Coatrieux, G.: Towards improved breast mass detection using dual-view mammogram matching. Med. Image Anal. 71, 102083 (2021)","journal-title":"Med. Image Anal."},{"key":"22_CR26","unstructured":"Yu, F.: A comprehensive guide to fine-tuning deep learning models in keras (part i). Felix Yu (2020)"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Zagoruyko, S., Komodakis, N.: Wide residual networks. arXiv preprint arXiv:1605.07146 (2016)","DOI":"10.5244\/C.30.87"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-36574-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T13:04:36Z","timestamp":1689426276000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-36574-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031365737","9783031365744"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-36574-4_22","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"16 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDF2C","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Digital Forensics and Cyber Crime","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Boston, MA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdf2c2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy plus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"80","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}