{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:29:22Z","timestamp":1725679762954},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642302169"},{"type":"electronic","value":"9783642302176"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30217-6_18","type":"book-chapter","created":{"date-parts":[[2012,5,9]],"date-time":"2012-05-09T06:14:58Z","timestamp":1336544098000},"page":"207-218","source":"Crossref","is-referenced-by-count":2,"title":["Evasion Attack of Multi-class Linear Classifiers"],"prefix":"10.1007","author":[{"given":"Han","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Stibor","sequence":"additional","affiliation":[]},{"given":"Claudia","family":"Eckert","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"18_CR1","first-page":"465","volume":"97","author":"K. Ball","year":"1986","unstructured":"Ball, K.: Cube slicing in \u211d n . Proc. American Mathematical Society\u00a097(3), 465\u2013473 (1986)","journal-title":"Proc. American Mathematical Society"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Barbara, D., Jajodia, S.: Applications of data mining in computer security. Springer (2002)","DOI":"10.1007\/978-1-4615-0953-0"},{"key":"18_CR3","first-page":"2673","volume":"7","author":"A. Bratko","year":"2006","unstructured":"Bratko, A., Filipi\u010d, B., Cormack, G., Lynam, T., Zupan, B.: Spam filtering using statistical data compression models. JMLR\u00a07, 2673\u20132698 (2006)","journal-title":"JMLR"},{"issue":"2","key":"18_CR4","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1023\/A:1013637720281","volume":"47","author":"K. Crammer","year":"2002","unstructured":"Crammer, K., Singer, Y.: On the learnability and design of output codes for multiclass problems. Machine Learning\u00a047(2), 201\u2013233 (2002)","journal-title":"Machine Learning"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Dalvi, N., Domingos, P., et al.: Adversarial classification. In: Proc. 10th SIGKDD, pp. 99\u2013108. ACM (2004)","DOI":"10.1145\/1014052.1014066"},{"key":"18_CR6","first-page":"1871","volume":"9","author":"R.E. Fan","year":"2008","unstructured":"Fan, R.E., Chang, K.W., Hsieh, C.J., Wang, X.R., Lin, C.J.: LIBLINEAR: A library for large linear classification. JMLR\u00a09, 1871\u20131874 (2008)","journal-title":"JMLR"},{"key":"18_CR7","first-page":"2699","volume":"7","author":"G. Fumera","year":"2006","unstructured":"Fumera, G., Pillai, I., Roli, F.: Spam filtering based on the analysis of text information embedded into images. JMLR\u00a07, 2699\u20132720 (2006)","journal-title":"JMLR"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Gr\u00fcnbaum, B.: Convex polytopes, vol.\u00a0221. Springer (2003)","DOI":"10.1007\/978-1-4613-0019-9"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Keerthi, S., Sundararajan, S., Chang, K., Hsieh, C., Lin, C.: A sequential dual method for large scale multi-class linear svms. In: Proc. 14th SIGKDD, pp. 408\u2013416. ACM (2008)","DOI":"10.1145\/1401890.1401942"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Lowd, D., Meek, C.: Adversarial learning. In: Proc. 11th SIGKDD, pp. 641\u2013647. ACM (2005)","DOI":"10.1145\/1081870.1081950"},{"key":"18_CR11","unstructured":"Lowd, D., Meek, C.: Good word attacks on statistical spam filters. In: Proc. 2nd Conference on Email and Anti-Spam, pp. 125\u2013132 (2005)"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Maloof, M.: Machine learning and data mining for computer security: methods and applications. Springer (2006)","DOI":"10.1007\/1-84628-253-5"},{"key":"18_CR13","unstructured":"Nelson, B., Rubinstein, B.I.P., Huang, L., Joseph, A.D., Hon Lau, S., Lee, S., Rao, S., Tran, A., Tygar, J.D.: Near-optimal evasion of convex-inducing classifiers. In: Proc. 13th AISTATS (2010)"},{"key":"18_CR14","unstructured":"Rockafellar, R.: Convex analysis, vol.\u00a028. Princeton Univ. Pr. (1997)"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Santal\u00f3, L.: Integral geometry and geometric probability. Cambridge Univ. Pr. (2004)","DOI":"10.1017\/CBO9780511617331"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30217-6_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,15]],"date-time":"2022-01-15T02:14:57Z","timestamp":1642212897000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30217-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642302169","9783642302176"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30217-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}