{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:09:12Z","timestamp":1757617752135,"version":"3.44.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031823619"},{"type":"electronic","value":"9783031823626"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82362-6_18","type":"book-chapter","created":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T10:00:05Z","timestamp":1743501605000},"page":"289-304","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Proposition of\u00a0a\u00a0Novel Type of\u00a0Attacks Targetting Explainable AI Algorithms in\u00a0Cybersecurity"],"prefix":"10.1007","author":[{"given":"Sebastian","family":"Szelest","sequence":"first","affiliation":[]},{"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[]},{"given":"Aleksandra","family":"Pawlicka","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,1]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/978-3-319-07995-0_54","volume-title":"International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914: Bilbao, Spain, June 25th-27th, 2014, Proceedings","author":"T Andrysiak","year":"2014","unstructured":"Andrysiak, T., Saganowski, \u0141, Chora\u015b, M., Kozik, R.: Network traffic prediction and anomaly detection based on ARFIMA model. In: de la Puerta, J.G., et al. (eds.) International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914: Bilbao, Spain, June 25th-27th, 2014, Proceedings, pp. 545\u2013554. Springer International Publishing, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07995-0_54"},{"key":"18_CR2","unstructured":"Baniecki, H., Biecek, P.: Adversarial Attacks and Defenses in Explainable Artificial Intelligence: A Survey (jun 2023). https:\/\/doi.org\/2306.06123v2, http:\/\/arxiv.org\/abs\/2306.06123"},{"key":"18_CR3","doi-asserted-by":"publisher","unstructured":"Barredo Arrieta, A., et al.: Explainable Artificial Intelligence (XAI): Concepts, taxonomies, opportunities and challenges toward responsible AI. Inform. Fusion 58, 82\u2013115 (jun 2020). https:\/\/doi.org\/10.1016\/j.inffus.2019.12.012, https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1566253519308103","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Chen, Z., Silvestri, F., Wang, J., Zhang, Y., Tolomei, G.: The Dark Side of Explanations: Poisoning Recommender Systems with Counterfactual Examples (apr 2023). http:\/\/arxiv.org\/abs\/2305.00574","DOI":"10.1145\/3539618.3592070"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/978-3-030-50423-6_46","volume-title":"Computational Science \u2013 ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, June 3\u20135, 2020, Proceedings, Part IV","author":"M Chora\u015b","year":"2020","unstructured":"Chora\u015b, M., Pawlicki, M., Puchalski, D., Kozik, R.: Machine learning \u2013 the results are not the only thing that matters! what about security, explainability and fairness? In: Krzhizhanovskaya, V.V., Z\u00e1vodszky, G., Lees, M.H., Dongarra, J.J., Sloot, P.M.A., Brissos, S., Teixeira, J. (eds.) Computational Science \u2013 ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, June 3\u20135, 2020, Proceedings, Part IV, pp. 615\u2013628. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50423-6_46"},{"key":"18_CR6","doi-asserted-by":"publisher","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (sep 1995). https:\/\/doi.org\/10.1007\/BF00994018, http:\/\/link.springer.com\/10.1007\/BF00994018","DOI":"10.1007\/BF00994018"},{"key":"18_CR7","doi-asserted-by":"publisher","unstructured":"Damasevicius, R., et al.: LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion Detection. Electronics 9(5), 800 (may 2020). https:\/\/doi.org\/10.3390\/electronics9050800, https:\/\/www.mdpi.com\/2079-9292\/9\/5\/800","DOI":"10.3390\/electronics9050800"},{"issue":"6","key":"18_CR8","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/MSP.2012.2211477","volume":"29","author":"L Deng","year":"2012","unstructured":"Deng, L.: The mnist database of handwritten digit images for machine learning research. IEEE Signal Process. Mag. 29(6), 141\u2013142 (2012)","journal-title":"IEEE Signal Process. Mag."},{"key":"18_CR9","doi-asserted-by":"publisher","unstructured":"Ghorbani, A., Abid, A., Zou, J.: Interpretation of neural networks is fragile. In: Proceedings of the AAAI Conference on Artificial Intelligence 33(01), 3681\u20133688 (jul 2019). https:\/\/doi.org\/10.1609\/aaai.v33i01.33013681","DOI":"10.1609\/aaai.v33i01.33013681"},{"key":"18_CR10","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and Harnessing Adversarial Examples (Dec 2014). http:\/\/arxiv.org\/abs\/1412.6572"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Kozik, R., Ficco, M., Pawlicka, A., Pawlicki, M., Palmieri, F., Chora\u015b, M.: When explainability turns into a threat - using xAI to fool a fake news detection method. Comput. Security 137, 103599 (Feb 2024). https:\/\/doi.org\/10.1016\/j.cose.2023.103599","DOI":"10.1016\/j.cose.2023.103599"},{"key":"18_CR12","doi-asserted-by":"publisher","unstructured":"Kuppa, A., Le-Khac, N.A.: Adversarial XAI methods in cybersecurity. IEEE Trans. Inform. Forensics Secur. 16, 4924\u20134938 (2021). https:\/\/doi.org\/10.1109\/TIFS.2021.3117075, https:\/\/ieeexplore.ieee.org\/document\/9555622\/","DOI":"10.1109\/TIFS.2021.3117075"},{"key":"18_CR13","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial examples in the physical world (Jul 2016). http:\/\/arxiv.org\/abs\/1607.02533"},{"key":"18_CR14","unstructured":"LeCun, Y.: The mnist database of handwritten digits. https:\/\/www.yann.lecun.com\/exdb\/mnist\/ (1998)"},{"key":"18_CR15","unstructured":"Lundberg, S.M., Lee, S.I.: A unified approach to interpreting model predictions. In: Guyon, I., Luxburg, U.V., Bengio, S., Wallach, H., Fergus, R., Vishwanathan, S., Garnett, R. (eds.) Advances in Neural Information Processing Systems. vol.\u00a030. Curran Associates, Inc. (2017). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2017\/file\/ 8a20a8621978632d76c43dfd28b67767-Paper.pdf"},{"key":"18_CR16","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: International Conference on Learning Representations (2018). https:\/\/openreview.net\/forum?id=rJzIBfZAb"},{"key":"18_CR17","unstructured":"Nicolae, M.I., et al.: Adversarial Robustness Toolbox v1.0.0 (Jul 2018). http:\/\/arxiv.org\/abs\/1807.01069"},{"issue":"5","key":"18_CR18","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1007\/s00779-021-01568-7","volume":"25","author":"A Pawlicka","year":"2021","unstructured":"Pawlicka, A., Chora\u015b, M., Pawlicki, M.: The stray sheep of cyberspace aka the actors who claim they break the law for the greater good. Pers. Ubiquit. Comput. 25(5), 843\u2013852 (2021)","journal-title":"Pers. Ubiquit. Comput."},{"key":"18_CR19","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/978-3-031-44721-1_52","volume-title":"Research and Innovation Forum 2023: Navigating Shocks and Crises in Uncertain Times\u2014Technology, Business, Society","author":"A Pawlicka","year":"2024","unstructured":"Pawlicka, A., Pawlicki, M., Kozik, R., Kurek, W., Chora\u015b, M.: How explainable is explainability? towards better metrics for explainable AI. In: Visvizi, A., Troisi, O., Corvello, V. (eds.) Research and Innovation Forum 2023: Navigating Shocks and Crises in Uncertain Times\u2014Technology, Business, Society, pp. 685\u2013695. Springer International Publishing, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-44721-1_52"},{"key":"18_CR20","doi-asserted-by":"publisher","unstructured":"Pawlicki, M., Pawlicka, A., Kozik, R., Chora\u015b, M.: Advanced insights through systematic analysis: Mapping future research directions and opportunities for xAI in deep learning and artificial intelligence used in cybersecurity. Neurocomputing 127759 (apr 2024). https:\/\/doi.org\/10.1016\/j.neucom.2024.127759, https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231224005307","DOI":"10.1016\/j.neucom.2024.127759"},{"key":"18_CR21","doi-asserted-by":"publisher","unstructured":"Pawlicki, M., et al.: Evaluating the necessity of the multiple metrics for assessing explainable AI: A critical examination. Neurocomputing 602, 128282 (oct 2024). https:\/\/doi.org\/10.1016\/j.neucom.2024.128282, https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231224010531","DOI":"10.1016\/j.neucom.2024.128282"},{"key":"18_CR22","doi-asserted-by":"publisher","unstructured":"Rafy, M.F.: Artificial Intelligence in Cyber Security (Jan 2024). https:\/\/doi.org\/10.13140\/RG.2.2.19552.66561","DOI":"10.13140\/RG.2.2.19552.66561"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: why should i trust you? explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1135\u20131144 (2016)","DOI":"10.1145\/2939672.2939778"},{"issue":"5","key":"18_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3453158","volume":"54","author":"I Rosenberg","year":"2021","unstructured":"Rosenberg, I., Shabtai, A., Elovici, Y., Rokach, L.: Adversarial machine learning attacks and defense methods in the cyber security domain. ACM Comput. Surv. (CSUR) 54(5), 1\u201336 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"8","key":"18_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3547330","volume":"55","author":"S Zhou","year":"2022","unstructured":"Zhou, S., Liu, C., Ye, D., Zhu, T., Zhou, W., Yu, P.S.: Adversarial attacks and defenses in deep learning: from a perspective of cybersecurity. ACM Comput. Surv. 55(8), 1\u201339 (2022)","journal-title":"ACM Comput. Surv."}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2024 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82362-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T08:54:15Z","timestamp":1757148855000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82362-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031823619","9783031823626"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82362-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}