{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T11:20:07Z","timestamp":1767612007698},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319942674"},{"type":"electronic","value":"9783319942681"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94268-1_22","type":"book-chapter","created":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T12:49:21Z","timestamp":1528807761000},"page":"261-273","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model"],"prefix":"10.1007","author":[{"given":"Pan","family":"Li","sequence":"first","affiliation":[]},{"given":"Wentao","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Linyuan","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,13]]},"reference":[{"issue":"10","key":"22_CR1","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"CF Tsai","year":"2009","unstructured":"Tsai, C.F., Hsu, Y.F., Lin, C.Y., Lin, W.Y.: Intrusion detection by machine learning: a review. Expert Syst. Appl. Int. J. 36(10), 11994\u201312000 (2009). \nhttps:\/\/doi.org\/10.1016\/j.eswa.2009.05.029","journal-title":"Expert Syst. Appl. Int. J."},{"unstructured":"Kloft, M., Laskov, P.: Online anomaly detection under adversarial impact. In: Proceedings of the AISTATS 2010, pp. 405\u2013412 (2010)","key":"22_CR2"},{"key":"22_CR3","doi-asserted-by":"publisher","first-page":"12103","DOI":"10.1109\/ACCESS.2018.2805680","volume":"6","author":"Q Liu","year":"2018","unstructured":"Liu, Q., Li, P., Zhao, W., Cai, W., Yu, S., Leung, V.C.M.: A survey on security threats and defensive techniques of machine learning: a data driven view. IEEE Access 6, 12103\u201312117 (2018). \nhttps:\/\/doi.org\/10.1109\/ACCESS.2018.2805680","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","unstructured":"Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: Proceedings of the ASIACCS 2006, pp. 16\u201325. ACM (2006). \nhttps:\/\/doi.org\/10.1145\/1128817.1128824","key":"22_CR4","DOI":"10.1145\/1128817.1128824"},{"doi-asserted-by":"publisher","unstructured":"Zhao, M., An, B., Gao, W., Zhang, T.: Efficient label contamination attacks against black-box learning models. In: Proceedings of the IJCAI 2017, pp. 3945\u20133951 (2017). \nhttps:\/\/doi.org\/10.24963\/ijcai.2017\/551","key":"22_CR5","DOI":"10.24963\/ijcai.2017\/551"},{"unstructured":"Wittel, G.L., Wu, S.F.: On attacking statistical spam filters. In: Proceedings of the CEAS 2004 (2004). \nhttp:\/\/www.ceas.cc\/papers-2004\/170.pdf","key":"22_CR6"},{"unstructured":"Hu, W., Tan, Y.: Generating adversarial malware examples for black-box attacks based on GAN (2017). \nhttps:\/\/arxiv.org\/abs\/1702.05983","key":"22_CR7"},{"unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction APIs, pp. 601\u2013618 (2016)","key":"22_CR8"},{"doi-asserted-by":"publisher","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: Proceedings of the Symposium on Security and Privacy 2017, pp. 3\u201318 (2017). \nhttps:\/\/doi.org\/10.1109\/SP.2017.41","key":"22_CR9","DOI":"10.1109\/SP.2017.41"},{"unstructured":"Biggio, B., Nelson, B., Laskov, P.: Poisoning attacks against support vector machines. In: Proceedings of the ICML 2012, pp. 1467\u20131474 (2012)","key":"22_CR10"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/978-3-642-34166-3_46","volume-title":"Structural, Syntactic, and Statistical Pattern Recognition","author":"B Biggio","year":"2012","unstructured":"Biggio, B., Fumera, G., Roli, F., Didaci, L.: Poisoning adaptive biometric systems. In: Gimel\u2019farb, G., et al. (eds.) SSPR\/SPR 2012. LNCS, vol. 7626, pp. 417\u2013425. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-34166-3_46"},{"unstructured":"Li, P., Liu, Q., Zhao, W., Wang, D., Wang, S.: BEBP: an poisoning method against machine learning based IDSs (2018). \nhttps:\/\/arxiv.org\/abs\/1803.03965","key":"22_CR12"},{"doi-asserted-by":"publisher","unstructured":"Rubinstein, B.I., Nelson, B., Huang, L., Joseph, A.D., Lau, S., Rao, S., Taft, N., Tygar, J.D.: Antidote: understanding and defending against poisoning of anomaly detectors. In: Proceedings of the IMC 2009, pp. 1\u201314. ACM, New York (2009). \nhttps:\/\/doi.org\/10.1145\/1644893.1644895","key":"22_CR13","DOI":"10.1145\/1644893.1644895"},{"issue":"1","key":"22_CR14","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16(1), 321\u2013357 (2002). \nhttps:\/\/doi.org\/10.1613\/jair.953","journal-title":"J. Artif. Intell. Res."},{"doi-asserted-by":"publisher","unstructured":"Song, J., Takakura, H., Okabe, Y., Eto, M., Inoue, D., Nakao, K.: Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDs evaluation. In: Proceedings of the BADGERS 2011, pp. 29\u201336. ACM, New York (2011). \nhttps:\/\/doi.org\/10.1145\/1978672.1978676","key":"22_CR15","DOI":"10.1145\/1978672.1978676"},{"issue":"2","key":"22_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2016\/4731953","volume":"2016","author":"I Almomani","year":"2016","unstructured":"Almomani, I., Al-Kasasbeh, B., Al-Akhras, M.: WSN-DS: a dataset for intrusion detection systems in wireless sensor networks. J. Sens. 2016(2), 1\u201316 (2016). \nhttps:\/\/doi.org\/10.1155\/2016\/4731953","journal-title":"J. Sens."},{"issue":"10","key":"22_CR17","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TrustCom.2014.15","volume":"65","author":"MA Ambusaidi","year":"2016","unstructured":"Ambusaidi, M.A., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65(10), 2986\u20132998 (2016). \nhttps:\/\/doi.org\/10.1109\/TrustCom.2014.15","journal-title":"IEEE Trans. Comput."},{"doi-asserted-by":"publisher","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against machine learning. In: Proceedings of the ASIACCS 2017, pp. 506\u2013519. ACM, New York (2017). \nhttps:\/\/doi.org\/10.1145\/3052973.3053009","key":"22_CR18","DOI":"10.1145\/3052973.3053009"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94268-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T12:58:41Z","timestamp":1528808321000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-94268-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319942674","9783319942681"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94268-1_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}