{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T13:05:41Z","timestamp":1776776741230,"version":"3.51.2"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319317496","type":"print"},{"value":"9783319317502","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31750-2_28","type":"book-chapter","created":{"date-parts":[[2016,4,14]],"date-time":"2016-04-14T11:27:08Z","timestamp":1460633228000},"page":"350-362","source":"Crossref","is-referenced-by-count":12,"title":["Modeling Adversarial Learning as Nested Stackelberg Games"],"prefix":"10.1007","author":[{"given":"Yan","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Murat","family":"Kantarcioglu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,12]]},"reference":[{"key":"28_CR1","unstructured":"Lowd, D.: Good word attacks on statistical spam filters. In: Proceedings of the Second Conference on Email and Anti-Spam (CEAS) (2005)"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Globerson, A., Roweis, S.: Nightmare at test time: robust learning by feature deletion. In: ICML, pp. 353\u2013360. ACM (2006)","DOI":"10.1145\/1143844.1143889"},{"key":"28_CR3","unstructured":"El Ghaoui, L., Lanckriet, G.R.G., Natsoulis, G.: Robust classification with interval data. Technical report UCB\/CSD-03-1279, EECS Department, University of California, Berkeley, October 2003"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Kantarcioglu, M., Thuraisingham, B., Xi, B.: Adversarial support vector machine learning. In: SIGKDD, pp. 1059\u20131067. ACM (2012)","DOI":"10.1145\/2339530.2339697"},{"key":"28_CR5","first-page":"555","volume":"3","author":"GRG Lanckriet","year":"2002","unstructured":"Lanckriet, G.R.G., Ghaoui, L.E., Bhattacharyya, C., Jordan, M.I.: A robust minimax approach to classification. J. Mach. Learn. Res. 3, 555\u2013582 (2002)","journal-title":"J. Mach. Learn. Res."},{"key":"28_CR6","unstructured":"Teo, C.H., Globerson, A., Roweis, S.T., Smola, A.J.: Convex learning with invariances. In: Advances in Neural Information Processing Systems (2007)"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Dekel, O., Shamir, O.: Learning to classify with missing and corrupted features. In: ICML, pp. 216\u2013223. ACM (2008)","DOI":"10.1145\/1390156.1390184"},{"issue":"2","key":"28_CR8","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s10994-009-5124-8","volume":"81","author":"O Dekel","year":"2010","unstructured":"Dekel, O., Shamir, O., Xiao, L.: Learning to classify with missing and corrupted features. Mach. Learn. 81(2), 149\u2013178 (2010)","journal-title":"Mach. Learn."},{"key":"28_CR9","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s10618-010-0197-3","volume":"22","author":"M Kantarcioglu","year":"2011","unstructured":"Kantarcioglu, M., Xi, B., Clifton, C.: Classifier evaluation and attribute selection against active adversaries. Data Min. Knowl. Discov. 22, 291\u2013335 (2011)","journal-title":"Data Min. Knowl. Discov."},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Liu, W., Chawla, S.: A game theoretical model for adversarial learning. In: Proceedings of the 2009 IEEE International Conference on Data Mining Workshops. ICDMW 2009, pp. 25\u201330, Washington, DC, USA. IEEE Computer Society (2009)","DOI":"10.1109\/ICDMW.2009.9"},{"key":"28_CR11","unstructured":"Bruckner, M., Scheffer, T.: Nash equilibria of static prediction games. In: Advances in Neural Information Processing Systems, MIT Press, Cambridge (2009)"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Br\u00fcckner, M., Scheffer, T.: Stackelberg games for adversarial prediction problems. In: KDD, pp. 547\u2013555, New York (2011)","DOI":"10.1145\/2020408.2020495"},{"key":"28_CR13","unstructured":"Biggio, B., Nelson, B., Laskov, P.: Poisoning attacks against support vector machines. In: ICML, pp. 1807\u20131814 (2012)"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Kantarcioglu, M., Thuraisingham, B.M.: Sparse bayesian adversarial learning using relevance vector machine ensembles. In: ICDM, pp. 1206\u20131211 (2012)","DOI":"10.1109\/ICDM.2012.58"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Kantarcioglu, M.: Adversarial learning with bayesian hierarchical mixtures of experts. In: SDM, pp. 929\u2013937 (2014)","DOI":"10.1137\/1.9781611973440.106"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Basar, T., Olsder, G.J.: Dynamic Noncooperative Game Theory. Society for Industrial and Applied Mathematics, Classics in Applied Mathematics (1999)","DOI":"10.1137\/1.9781611971132"},{"key":"28_CR17","unstructured":"Paruchuri, P.: Playing games for security: an efficient exact algorithm for solving bayesian stackelberg games. In: AAMAS (2008)"},{"key":"28_CR18","unstructured":"UCI:UCI Machine Learning Repository (2014). \n                      http:\/\/archive.ics.uci.edu\/ml\/"},{"key":"28_CR19","unstructured":"LIBSVM:LIBSVM Data: Classification, Regression, and Multi-label (2014). \n                      http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvmtools\/datasets\/"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31750-2_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T00:04:11Z","timestamp":1559433851000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31750-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319317496","9783319317502"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31750-2_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}