{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T04:55:56Z","timestamp":1768971356102,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642215568","type":"print"},{"value":"9783642215575","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21557-5_37","type":"book-chapter","created":{"date-parts":[[2011,9,8]],"date-time":"2011-09-08T11:33:54Z","timestamp":1315481634000},"page":"350-359","source":"Crossref","is-referenced-by-count":66,"title":["Bagging Classifiers for Fighting Poisoning Attacks in Adversarial Classification Tasks"],"prefix":"10.1007","author":[{"given":"Battista","family":"Biggio","sequence":"first","affiliation":[]},{"given":"Igino","family":"Corona","sequence":"additional","affiliation":[]},{"given":"Giorgio","family":"Fumera","sequence":"additional","affiliation":[]},{"given":"Giorgio","family":"Giacinto","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Roli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s10994-010-5188-5","volume":"81","author":"M. Barreno","year":"2010","unstructured":"Barreno, M., Nelson, B., Joseph, A., Tygar, J.: The security of machine learning. Machine Learning\u00a081, 121\u2013148 (2010)","journal-title":"Machine Learning"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: Proc. 2006 ACM Symp. Information, Computer and Comm. Sec. (ASIACCS 2006), NY, USA pp. 16\u201325 (2006)","DOI":"10.1145\/1128817.1128824"},{"issue":"2","key":"37_CR3","first-page":"123","volume":"24","author":"L. Breiman","year":"1996","unstructured":"Breiman, L.: Bagging predictors. Machine Learning\u00a024(2), 123\u2013140 (1996)","journal-title":"Machine Learning"},{"key":"37_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-540-74320-0_13","volume-title":"Recent Advances in Intrusion Detection","author":"S.P. Chung","year":"2007","unstructured":"Chung, S.P., Mok, A.K.: Advanced allergy attacks: Does a corpus really help? In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol.\u00a04637, pp. 236\u2013255. Springer, Heidelberg (2007)"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Corona, I., Ariu, D., Giacinto, G.: Hmm-web: a framework for the detection of attacks against web applications. In: Proc.\u00a02009 IEEE Int\u2019l Conf. Comm. (ICC 2009), NJ, USA, pp. 747\u2013752 (2009)","DOI":"10.1109\/ICC.2009.5199054"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Dalvi, N., Domingos, P.: Mausam, S.\u00a0Sanghai, and D.\u00a0Verma. Adversarial classification. In: Proc.\u00a010th ACM SIGKDD Int\u2019l Conf. Knowledge Disc. and Data Mining (KDD), USA, pp. 99\u2013108 (2004)","DOI":"10.1145\/1014052.1014066"},{"issue":"7","key":"37_CR7","doi-asserted-by":"publisher","first-page":"1293","DOI":"10.1109\/TPAMI.2008.30","volume":"30","author":"G. Fumera","year":"2008","unstructured":"Fumera, G., Roli, F., Serrau, A.: A theoretical analysis of bagging as a linear combination of classifiers. IEEE TPAMI\u00a030(7), 1293\u20131299 (2008)","journal-title":"IEEE TPAMI"},{"key":"37_CR8","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/11893011_55","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"B. Gabrys","year":"2006","unstructured":"Gabrys, B., Baruque, B., Corchado, E.: Outlier resistant PCA ensembles. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds.) KES 2006. LNCS (LNAI), vol.\u00a04253, pp. 432\u2013440. Springer, Heidelberg (2006)"},{"key":"37_CR9","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1023\/B:MACH.0000027783.34431.42","volume":"55","author":"Y. Grandvalet","year":"2004","unstructured":"Grandvalet, Y.: Bagging equalizes influence. Machine Learning\u00a055, 251\u2013270 (2004)","journal-title":"Machine Learning"},{"key":"37_CR10","unstructured":"Hall, P., Turlach, B.: Bagging in the presence of outliers. In: Scott, D. (ed.) Mining and Modeling Massive Data Sets In Science, Engineering, and Business, CSS, vol.\u00a029, pp. 536\u2013539 (1998)"},{"key":"37_CR11","unstructured":"Kloft, M., Laskov, P.: Online anomaly detection under adversarial impact. In: Proc. 13th Int\u2019l Conf. Artificial Intell. and Statistics (AISTATS), pp. 405\u2013412 (2010)"},{"key":"37_CR12","unstructured":"Kolcz, A., Teo, C.H.: Feature weighting for improved classifier robustness. In: 6th Conf.\u00a0Email and Anti-Spam (CEAS), CA, USA (2009)"},{"key":"37_CR13","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s10994-010-5207-6","volume":"81","author":"P. Laskov","year":"2010","unstructured":"Laskov, P., Lippmann, R.: Machine learning in adversarial environments. Machine Learning\u00a081, 115\u2013119 (2010)","journal-title":"Machine Learning"},{"key":"37_CR14","unstructured":"Nelson, B., Barreno, M., Chi, F.J., Joseph, A.D., Rubinstein, B.I.P., Saini, U., Sutton, C., Tygar, J.D., Xia, K.: Exploiting machine learning to subvert your spam filter. In: Proc.\u00a01st Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), CA, USA, pp. 1\u20139 (2008)"},{"key":"37_CR15","unstructured":"Robinson, G.: A statistical approach to the spam problem. Linux J (2001), http:\/\/www.linuxjournal.com\/article\/6467"},{"key":"37_CR16","doi-asserted-by":"crossref","unstructured":"Perdisci, R., Dagon, D., Lee, W., Fogla, P., Sharif, M.: Misleading worm signature generators using deliberate noise injection. In: Proc.\u00a02006 IEEE Symp.\u00a0Sec. and Privacy (S&P 2006), USA (2006)","DOI":"10.1109\/SP.2006.26"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Rubinstein, B.I., Nelson, B., Huang, L., Joseph, A.D.: Antidote: understanding and defending against poisoning of anomaly detectors. In: Proc. 9th ACM Internet Meas. Conf. IMC 2009, pp. 1\u201314 (2009)","DOI":"10.1145\/1644893.1644895"},{"key":"37_CR18","series-title":"LNCS","first-page":"1","volume-title":"Proc. 9th Int. Workshop on MCSs","author":"S. Segui","year":"2010","unstructured":"Segui, S., Igual, L., Vitria, J.: Weighted bagging for graph based one-class classifiers. In: Proc. 9th Int. Workshop on MCSs. LNCS, vol.\u00a05997, pp. 1\u201310. Springer, Heidelberg (2010)"},{"key":"37_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-642-02326-2_19","volume-title":"Multiple Classifier Systems","author":"A.D. Shieh","year":"2009","unstructured":"Shieh, A.D., Kamm, D.F.: Ensembles of one class support vector machines. In: Benediktsson, J.A., Kittler, J., Roli, F. (eds.) MCS 2009. LNCS, vol.\u00a05519, pp. 181\u2013190. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Multiple Classifier Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21557-5_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,15]],"date-time":"2019-06-15T00:39:40Z","timestamp":1560559180000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21557-5_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642215568","9783642215575"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21557-5_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}