{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T20:39:12Z","timestamp":1757623152240,"version":"3.44.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032041999","type":"print"},{"value":"9783032042002","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T00:00:00Z","timestamp":1757376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T00:00:00Z","timestamp":1757376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-04200-2_25","type":"book-chapter","created":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T03:03:13Z","timestamp":1757386993000},"page":"361-370","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploring Perturbation Patterns and\u00a0Impact in\u00a0Adversarial Machine Learning: A Systematic Literature Review"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-9734-3645","authenticated-orcid":false,"given":"Alexandra","family":"Sheykina","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9337-5116","authenticated-orcid":false,"given":"Fabio","family":"Palomba","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4238-1425","authenticated-orcid":false,"given":"Andrea","family":"De Lucia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,9]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: Proceedings of the ACM Symposium on Information, Computer and Communications Security, pp. 16\u201325. ACM, New York (2006)","DOI":"10.1145\/1128817.1128824"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"12103","DOI":"10.1109\/ACCESS.2018.2805680","volume":"6","author":"Q Liu","year":"2018","unstructured":"Liu, Q., Li, P., Zhao, W., Cai, W., Yu, S., Leung, V.C.M.: A survey on security threats and defensive techniques of machine learning: a data driven view. IEEE Access 6, 12103\u201312117 (2018)","journal-title":"IEEE Access"},{"key":"25_CR3","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar, N., Mian, A.: Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6, 14410\u201314430 (2018)","journal-title":"IEEE Access"},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"155161","DOI":"10.1109\/ACCESS.2021.3127960","volume":"9","author":"N Akhtar","year":"2021","unstructured":"Akhtar, N., Mian, A., Kardan, N., Shah, M.: Advances in adversarial attacks and defenses in computer vision: a survey. IEEE Access 9, 155161\u2013155196 (2021)","journal-title":"IEEE Access"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Biggio, B., Roli, F.: Wild patterns: ten years after the rise of adversarial machine learning. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 2154\u20132156. ACM, New York (2018)","DOI":"10.1145\/3243734.3264418"},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s11633-019-1211-x","volume":"17","author":"H Xu","year":"2020","unstructured":"Xu, H., et al.: Adversarial attacks and defenses in images, graphs and text: a review. Int. J. Autom. Comput. 17, 151\u2013178 (2020)","journal-title":"Int. J. Autom. Comput."},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Jin, W., et al.: Adversarial attacks and defenses on graphs. ACM SIGKDD Explor. Newsl. 22(2) (2021)","DOI":"10.1145\/3447556.3447566"},{"key":"25_CR8","doi-asserted-by":"publisher","first-page":"92735","DOI":"10.1109\/ACCESS.2021.3092646","volume":"9","author":"F Vakhshiteh","year":"2021","unstructured":"Vakhshiteh, F., Nickabadi, A., Ramachandra, R.: Adversarial attacks against face recognition: a comprehensive study. IEEE Access 9, 92735\u201392756 (2021)","journal-title":"IEEE Access"},{"key":"25_CR9","unstructured":"Aryal, K., Gupta, M., Abdelsalam, M.: A survey on adversarial attacks for malware analysis. arXiv preprint arXiv:2111.08223 (2021)"},{"key":"25_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100199","volume":"34","author":"N Pitropakis","year":"2019","unstructured":"Pitropakis, N., Panaousis, E., Giannetsos, T., Anastasiadis, E., Loukas, G.: A taxonomy and survey of attacks against machine learning. Comput. Sci. Rev. 34, 100199 (2019)","journal-title":"Comput. Sci. Rev."},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Wang, Z., Ma, J., Wang, X., Hu, J., Qin, Z., Ren, K.: Threats to training: a survey of poisoning attacks and defenses on machine learning systems. ACM Comput. Surv. 55(7) (2022)","DOI":"10.1145\/3538707"},{"key":"25_CR12","doi-asserted-by":"publisher","first-page":"74720","DOI":"10.1109\/ACCESS.2020.2987435","volume":"8","author":"M Xue","year":"2020","unstructured":"Xue, M., Yuan, C., Wu, H., Zhang, Y., Liu, W.: Machine learning security: threats, countermeasures, and evaluations. IEEE Access 8, 74720\u201374742 (2020)","journal-title":"IEEE Access"},{"key":"25_CR13","doi-asserted-by":"publisher","unstructured":"Aldahdooh, A., Hamidouche, W., Fezza, S.A., D\u00e9forges, O.: Adversarial example detection for DNN models: a review and experimental comparison. Artif. Intell. Rev. 1\u201360 (2022). https:\/\/doi.org\/10.1007\/s10462-021-10125-w","DOI":"10.1007\/s10462-021-10125-w"},{"key":"25_CR14","unstructured":"Cin\u00e0, A.E., Grosse, K., Demontis, A., Biggio, B., Roli, F., Pelillo, M.: Machine learning security against data poisoning: are we there yet? arXiv preprint arXiv:2204.05986 (2022)"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Ilahi, I., et al.: Challenges and countermeasures for adversarial attacks on deep reinforcement learning. IEEE Trans. Artif. Intell. 3(2) (2021)","DOI":"10.1109\/TAI.2021.3111139"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Liu, Y., Tantithamthavorn, C., Li, L., Liu, Y.: Deep learning for Android malware defenses: a systematic literature review. ACM Comput. Surv. 55(8) (2022)","DOI":"10.1145\/3544968"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Cin\u00e0, A.E., et al.: Wild patterns reloaded: a survey of machine learning security against training data poisoning. ACM Comput. Surv. 55(13s) (2023)","DOI":"10.1145\/3585385"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Dong, H., Dong, J., Yuan, S., Guan, Z.: Adversarial attack and defense on natural language processing in deep learning: a survey and perspective. In: Proceedings of the International Conference on Machine Learning for Cyber Security, pp. 409\u2013424 (2022)","DOI":"10.1007\/978-3-031-20096-0_31"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Ling, X., et al.: Adversarial attacks against Windows PE malware detection: a survey of the state-of-the-art. Comput. Secur. 103134 (2023)","DOI":"10.1016\/j.cose.2023.103134"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Yuan, X., He, P., Zhu, Q., Li, X.: Adversarial examples: attacks and defenses for deep learning. IEEE Trans. Neural Netw. Learn. Syst. 30(9) (2019)","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"25_CR21","unstructured":"Silva, S.H., Najafirad, P.: Opportunities and challenges in deep learning adversarial robustness: a survey. arXiv preprint arXiv:2007.00753 (2020)"},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Chakraborty, A., Alam, M., Dey, V., Chattopadhyay, A., Mukhopadhyay, D.: A survey on adversarial attacks and defences. CAAI Trans. Intell. Technol. 6(1) (2021)","DOI":"10.1049\/cit2.12028"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Serban, A., Poll, E., Visser, J.: Adversarial examples on object recognition: a comprehensive survey. ACM Comput. Surv. 53(3) (2020)","DOI":"10.1145\/3398394"},{"key":"25_CR24","unstructured":"Kitchenham, B.: Procedures for performing systematic reviews. Technical report 33, Keele University (2004)"},{"issue":"1","key":"25_CR25","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","volume":"51","author":"B Kitchenham","year":"2009","unstructured":"Kitchenham, B., Brereton, O.P., Budgen, D., Turner, M., Bailey, J., Linkman, S.: Systematic literature reviews in software engineering-a systematic literature review. Inf. Softw. Technol. 51(1), 7\u201315 (2009)","journal-title":"Inf. Softw. Technol."},{"key":"25_CR26","doi-asserted-by":"crossref","unstructured":"Petersen, K., Feldt, R., Mujtaba, S., Mattsson, M.: Systematic mapping studies in software engineering. In: 12th International Conference on Evaluation and Assessment in Software Engineering, pp. 1\u201310. BCS, Swinton (2008)","DOI":"10.14236\/ewic\/EASE2008.8"},{"key":"25_CR27","unstructured":"Sheykina, A.: Replication package for Exploring Perturbation Patterns and Impact in AML. https:\/\/github.com\/sashasheykina\/Adversarial-Machine-Lerning-SRL"}],"container-title":["Lecture Notes in Computer Science","Software Engineering and Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-04200-2_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T03:03:23Z","timestamp":1757387003000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-04200-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,9]]},"ISBN":["9783032041999","9783032042002"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-04200-2_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,9]]},"assertion":[{"value":"9 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"SEAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Euromicro Conference on Software Engineering and Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salerno","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"51","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"seaa-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dsd-seaa.com\/seaa2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}