{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T22:43:57Z","timestamp":1769553837077,"version":"3.49.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319202471","type":"print"},{"value":"9783319202488","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20248-8_15","type":"book-chapter","created":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T03:05:22Z","timestamp":1433300722000},"page":"168-180","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["One-and-a-Half-Class Multiple Classifier Systems for Secure Learning Against Evasion Attacks at Test Time"],"prefix":"10.1007","author":[{"given":"Battista","family":"Biggio","sequence":"first","affiliation":[]},{"given":"Igino","family":"Corona","sequence":"additional","affiliation":[]},{"given":"Zhi-Min","family":"He","sequence":"additional","affiliation":[]},{"given":"Patrick P. K.","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Giorgio","family":"Giacinto","sequence":"additional","affiliation":[]},{"given":"Daniel S.","family":"Yeung","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Roli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,3]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Dalvi, N., Domingos, P., Mausam, Sanghai, S., Verma, D.: Adversarial classification. In: 10th International Conference on Knowledge Discovery and Data Mining. ACM, pp. 99\u2013108 (2004)","DOI":"10.1145\/1014052.1014066"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Lowd, D., Meek, C.: Adversarial learning. In: 11th International Conference on Knowledge Discovery and Data Mining. ACM, pp. 641\u2013647 (2005)","DOI":"10.1145\/1081870.1081950"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: ASIA CCS. ACM, pp. 16\u201325 (2006)","DOI":"10.1145\/1128817.1128824"},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s10994-010-5188-5","volume":"81","author":"M Barreno","year":"2010","unstructured":"Barreno, M., Nelson, B., Joseph, A., Tygar, J.: The security of machine learning. Mach. Learn. 81, 121\u2013148 (2010)","journal-title":"Mach. Learn."},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Huang, L., Joseph, A.D., Nelson, B., Rubinstein, B., Tygar, J.D.: Adversarial machine learning. In: 4th Workshop Artificial Intelligence and Security. ACM, pp. 43\u201357 (2011)","DOI":"10.1145\/2046684.2046692"},{"issue":"4","key":"15_CR6","doi-asserted-by":"publisher","first-page":"984","DOI":"10.1109\/TKDE.2013.57","volume":"26","author":"B Biggio","year":"2014","unstructured":"Biggio, B., Fumera, G., Roli, F.: Security evaluation of pattern classifiers under attack. IEEE Trans. Knowl. Data Eng. 26(4), 984\u2013996 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"7","key":"15_CR7","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1142\/S0218001414600027","volume":"28","author":"B Biggio","year":"2014","unstructured":"Biggio, B., Fumera, G., Roli, F.: Pattern recognition systems under attack: design issues and research challenges. Int. J. Pattern Recogn. Artif. Intell. 28(7), 21 (2014)","journal-title":"Int. J. Pattern Recogn. Artif. Intell."},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-642-40994-3_25","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"B Biggio","year":"2013","unstructured":"Biggio, B., Corona, I., Maiorca, D., Nelson, B., \u0160rndi\u0107, N., Laskov, P., Giacinto, G., Roli, F.: Evasion attacks against machine learning at test time. In: Blockeel, H., Kersting, K., Nijssen, S., \u017delezn\u00fd, F. (eds.) ECML PKDD 2013, Part III. LNCS, vol. 8190, pp. 387\u2013402. Springer, Heidelberg (2013)"},{"issue":"11","key":"15_CR9","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1109\/34.730549","volume":"20","author":"M Gori","year":"1998","unstructured":"Gori, M., Scarselli, F.: Are multilayer perceptrons adequate for pattern recognition and verification? IEEE TPAMI 20(11), 1121\u20131132 (1998)","journal-title":"IEEE TPAMI"},{"key":"15_CR10","unstructured":"Tax, D.M.J.: One-class classification. Ph.D. thesis (2001)"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Biggio, B., Fumera, G., Roli, F.: Design of robust classifiers for adversarial environments. In: IEEE International Conference on Systems, Man, and Cybernetics, pp. 977\u2013982 (2011)","DOI":"10.1109\/ICSMC.2011.6083796"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Globerson, A., Roweis, S.: Nightmare at test time: robust learning by feature deletion. In: 23rd ICML, vol. 148, pp. 353\u2013360. ACM (2006)","DOI":"10.1145\/1143844.1143889"},{"key":"15_CR13","unstructured":"Teo, C.H., Globerson, A., Roweis, S., Smola, A.: Convex learning with invariances. In: Platt, J., et al., eds.: NIPS 20, pp. 1489\u20131496. MIT Press (2008)"},{"key":"15_CR14","first-page":"2617","volume":"13","author":"M Br\u00fcckner","year":"2012","unstructured":"Br\u00fcckner, M., Kanzow, C., Scheffer, T.: Static prediction games for adversarial learning problems. J. Mach. Learn. Res. 13, 2617\u20132654 (2012)","journal-title":"J. Mach. Learn. Res."},{"key":"15_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The nature of statistical learning theory","author":"VN Vapnik","year":"1995","unstructured":"Vapnik, V.N.: The nature of statistical learning theory. Springer, New York (1995)"},{"key":"15_CR16","first-page":"1293","volume":"13","author":"B Nelson","year":"2012","unstructured":"Nelson, B., Rubinstein, B.I., Huang, L., Joseph, A.D., Lee, S.J., Rao, S., Tygar, J.D.: Query strategies for evading convex-inducing classifiers. J. Mach. Learn. Res. 13, 1293\u20131332 (2012)","journal-title":"J. Mach. Learn. Res."},{"key":"15_CR17","unstructured":"Nelson, B. et al.: Exploiting machine learning to subvert your spam filter. In: Large-scale Exploits and Emergent Threats, USENIX, pp. 1\u20139 (2008)"},{"issue":"1","key":"15_CR18","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s13042-010-0007-7","volume":"1","author":"B Biggio","year":"2010","unstructured":"Biggio, B., Fumera, G., Roli, F.: Multiple classifier systems for robust classifier design in adversarial environments. Int. J. Mach. Learn. Cyb. 1(1), 27\u201341 (2010)","journal-title":"Int. J. Mach. Learn. Cyb."},{"key":"15_CR19","first-page":"1115","volume":"9","author":"Z Jorgensen","year":"2008","unstructured":"Jorgensen, Z., Zhou, Y., Inge, M.: A multiple instance learning strategy for combating good word attacks on spam filters. J. Mach. Learn. Res. 9, 1115\u20131146 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Cormack, G.V.: Trec 2007 spam track overview. In: Voorhees, E.M., Buckland, L.P., eds.: TREC, pp. 500\u2013274. Volume Special Publication, NIST (2007)","DOI":"10.6028\/NIST.SP.500-274.spam-overview"},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/505282.505283","volume":"34","author":"F Sebastiani","year":"2002","unstructured":"Sebastiani, F.: Machine learning in automated text categorization. ACM Comput. Surv. 34, 1\u201347 (2002)","journal-title":"ACM Comput. Surv."},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Maiorca, D., Corona, I., Giacinto, G.: Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection. In: 8th ASIA CCS, pp. 119\u2013130. ACM (2013)","DOI":"10.1145\/2484313.2484327"},{"key":"15_CR23","unstructured":"Kolcz, A., Teo, C.H.: Feature weighting for improved classifier robustness. In: 6th Conference on Email and Anti-spam (2009)"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Sutton, C., Sindelar, M., McCallum, A.: Feature bagging: preventing weight undertraining in structured discriminative learning. Technical report, IR-402, University of Massachusetts (2005)","DOI":"10.3115\/1220835.1220847"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Kantarcioglu, M., Thuraisingham, B., Xi, B.: Adversarial support vector machine learning. In: 18th International Conference on Knowledge Discovery and Data Mining, pp. 1059\u20131067. ACM (2012)","DOI":"10.1145\/2339530.2339697"},{"key":"15_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-642-02326-2_14","volume-title":"Multiple Classifier Systems","author":"B Biggio","year":"2009","unstructured":"Biggio, B., Fumera, G., Roli, F.: Multiple classifier systems for adversarial classification tasks. In: Benediktsson, J.A., Kittler, J., Roli, F. (eds.) MCS 2009. LNCS, vol. 5519, pp. 132\u2013141. Springer, Heidelberg (2009)"},{"key":"15_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-642-12127-2_8","volume-title":"Multiple Classifier Systems","author":"B Biggio","year":"2010","unstructured":"Biggio, B., Fumera, G., Roli, F.: Multiple classifier systems under attack. In: El Gayar, N., Kittler, J., Roli, F. (eds.) MCS 2010. LNCS, vol. 5997, pp. 74\u201383. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Multiple Classifier Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20248-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T09:34:19Z","timestamp":1717925659000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-20248-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319202471","9783319202488"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20248-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"3 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}