{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T20:35:40Z","timestamp":1778099740567,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":71,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811680588","type":"print"},{"value":"9789811680595","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8059-5_36","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:03:12Z","timestamp":1638450192000},"page":"586-600","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Threats on Machine Learning Technique by Data Poisoning Attack: A Survey"],"prefix":"10.1007","author":[{"given":"Ibrahim M.","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Manar Younis","family":"Kashmoola","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"issue":"1","key":"36_CR1","first-page":"26","volume":"1","author":"SVA Amanuel","year":"2021","unstructured":"Amanuel, S.V.A., Ameen, S.Y.: Device-to-device communication for 5G security: a review. J. Inf. Technol. Inf. 1(1), 26\u201331 (2021)","journal-title":"J. Inf. Technol. Inf."},{"issue":"1","key":"36_CR2","first-page":"6","volume":"1","author":"LF Khalid","year":"2021","unstructured":"Khalid, L.F., Ameen, S.Y.: Secure IoT integration in daily lives: a review. J. Inf. Technol. Inf. 1(1), 6\u201312 (2021)","journal-title":"J. Inf. Technol. Inf."},{"key":"36_CR3","unstructured":"Medak, T., Krishna, A.P.: Power controlled secured transmission using self organizing trusted node model. Int. J. Pure Appl. Math. 118(24), 11\u201321 (2018)"},{"key":"36_CR4","doi-asserted-by":"publisher","first-page":"100199","DOI":"10.1016\/j.cosrev.2019.100199","volume":"34","author":"N Pitropakis","year":"2019","unstructured":"Pitropakis, N., et al.: A taxonomy and survey of attacks against machine learning. Comput. Sci. Rev. 34, 100199 (2019)","journal-title":"Comput. Sci. Rev."},{"key":"36_CR5","unstructured":"Goldblum, M., et al.: Data security for machine learning: data poisoning, backdoor attacks, and defenses. arXiv preprint arXiv:2012.10544 (2020)"},{"issue":"12s","key":"36_CR6","first-page":"64","volume":"29","author":"ZA Hamed","year":"2020","unstructured":"Hamed, Z.A., Ahmed, I.M., Ameen, S.Y.: Protecting windows OS against local threats without using antivirus. Relation 29(12s), 64\u201370 (2020)","journal-title":"Relation"},{"key":"36_CR7","unstructured":"Abd Al Nomani, M.M., Birmani, A.H.T.: Informational destruction crime; A comparative Study. PalArch\u2019s J. Archaeol. Egypt 17(3), 2266\u20132281 (2020)"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Yao, Y., et al.: Latent backdoor attacks on deep neural networks, pp. 2041\u20132055 (2019)","DOI":"10.1145\/3319535.3354209"},{"key":"36_CR9","unstructured":"Li, Y., et al.: Backdoor learning: a survey. arXiv preprint arXiv:2007.08745 (2020)"},{"key":"36_CR10","unstructured":"Tang, D., Wang, X., et al.: Demon in the variant: statistical analysis of DNNs for robust backdoor contamination detection. In: 30th {USENIX} Security Symposium ({USENIX} Security 21) (2021)"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Xia, Y., et al.: Weighted speech distortion losses for neural-network-based real-time speech enhancement. In: ICASSP 2020\u20132020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE (2020)","DOI":"10.1109\/ICASSP40776.2020.9054254"},{"issue":"1-2","key":"36_CR12","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s00170-020-05065-8","volume":"107","author":"J Ning","year":"2020","unstructured":"Ning, J., et al.: Analytical modeling of part distortion in metal additive manufacturing. Int. J. Adv. Manuf. Technol. 107(1\u20132), 49\u201357 (2020). https:\/\/doi.org\/10.1007\/s00170-020-05065-8","journal-title":"Int. J. Adv. Manuf. Technol."},{"issue":"12","key":"36_CR13","first-page":"18","volume":"137","author":"I Ahmed","year":"2016","unstructured":"Ahmed, I.: Enhancement of network attack classification using particle swarm optimization and multi-layer perceptron. Int. J. Comput. Appl. 137(12), 18\u201322 (2016)","journal-title":"Int. J. Comput. Appl."},{"key":"36_CR14","unstructured":"Huang, J., et al.: An exploratory analysis on users\u2019 contributions in federated learning. arXiv preprint arXiv:2011.06830 (2020)"},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Tomsett, R., Chan, K.S., et al.: Model poisoning attacks against distributed machine learning systems (2019)","DOI":"10.1117\/12.2520275"},{"key":"36_CR16","doi-asserted-by":"publisher","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","volume":"7","author":"T Gu","year":"2019","unstructured":"Gu, T., et al.: BadNets: evaluating backdooring attacks on deep neural networks. IEEE Access 7, 47230\u201347244 (2019)","journal-title":"IEEE Access"},{"key":"36_CR17","unstructured":"Bagdasaryan, E., et al.: How to backdoor federated learning. In: International Conference on Artificial Intelligence and Statistics. PMLR (2020)"},{"key":"36_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/978-3-030-58951-6_24","volume-title":"Computer Security \u2013 ESORICS 2020","author":"V Tolpegin","year":"2020","unstructured":"Tolpegin, V., et al.: Data poisoning attacks against federated learning systems. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020. LNCS, vol. 12308, pp. 480\u2013501. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58951-6_24"},{"key":"36_CR19","unstructured":"Liu, Y., et al.: RC-SSFL towards robust and communication-efficient semi-supervised federated learning system. arXiv preprint arXiv:2012.04432 (2020)"},{"key":"36_CR20","doi-asserted-by":"crossref","unstructured":"Lyu, L., Yu, H., Yang, Q.: Threats to federated learning: a survey. arXiv preprint arXiv:2003.02133 (2020)","DOI":"10.1007\/978-3-030-63076-8_1"},{"key":"36_CR21","unstructured":"Weerasinghe, S., et al.: Defending regression learners against poisoning attacks. arXiv preprint arXiv:2008.09279 (2020)"},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Jagielski, M., et al.: Manipulating machine learning: poisoning attacks and countermeasures for regression learning. In: 2018 IEEE Symposium on Security and Privacy (SP). IEEE (2018)","DOI":"10.1109\/SP.2018.00057"},{"key":"36_CR23","unstructured":"Xiao, H., Rasul, K., Vollgraf, R.: Fashion-MNIST: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747 (2017)"},{"key":"36_CR24","unstructured":"Recht, B., et al.: Do CIFAR-10 classifiers generalize to CIFAR-10? arXiv preprint arXiv:1806.00451 (2018)"},{"issue":"7","key":"36_CR25","doi-asserted-by":"publisher","first-page":"892","DOI":"10.3390\/sym11070892","volume":"11","author":"H Kwon","year":"2019","unstructured":"Kwon, H., Yoon, H., Park, K.-W.: Selective poisoning attack on deep neural networks. Symmetry 11(7), 892 (2019)","journal-title":"Symmetry"},{"key":"36_CR26","doi-asserted-by":"crossref","unstructured":"Kurita, K., Michel, P., Neubig, G.: Weight poisoning attacks on pre-trained models. arXiv preprint arXiv:2004.06660 (2020)","DOI":"10.18653\/v1\/2020.acl-main.249"},{"key":"36_CR27","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.buildenv.2018.04.035","volume":"138","author":"LM Candanedo","year":"2018","unstructured":"Candanedo, L.M., Feldheim, V., Deramaix, D.: Reconstruction of the indoor temperature dataset of a house using data driven models for performance evaluation. Build. Environ. 138, 250\u2013261 (2018)","journal-title":"Build. Environ."},{"issue":"1","key":"36_CR28","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1080\/10691898.2018.1434342","volume":"26","author":"M Li","year":"2018","unstructured":"Li, M., Mickel, A., Taylor, S.: Should this loan be approved or denied?: a large dataset with class assignment guidelines. J. Stat. Educ. 26(1), 55\u201366 (2018)","journal-title":"J. Stat. Educ."},{"issue":"1","key":"36_CR29","doi-asserted-by":"publisher","first-page":"8","DOI":"10.3390\/data3010008","volume":"3","author":"S Makonin","year":"2018","unstructured":"Makonin, S., Wang, Z.J., Tumpach, C.: RAE: the rainforest automation energy dataset for smart grid meter data analysis. Data 3(1), 8 (2018)","journal-title":"Data"},{"key":"36_CR30","doi-asserted-by":"crossref","unstructured":"Purohit, H., et al.: MIMII dataset: sound dataset for malfunctioning industrial machine investigation and inspection. arXiv preprint arXiv:1909.09347 (2019)","DOI":"10.33682\/m76f-d618"},{"key":"36_CR31","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.jbi.2018.04.007","volume":"83","author":"S Purushotham","year":"2018","unstructured":"Purushotham, S., et al.: Benchmarking deep learning models on large healthcare datasets. J. Biomed. Inform. 83, 112\u2013134 (2018)","journal-title":"J. Biomed. Inform."},{"key":"36_CR32","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1007\/978-981-15-3514-7_52","volume-title":"Advances in Artificial Intelligence and Data Engineering","author":"R Wadawadagi","year":"2021","unstructured":"Wadawadagi, R., Pagi, V.: Fine-grained sentiment rating of online reviews with Deep-RNN. In: Chiplunkar, N., Fukao, T. (eds.) Advances in Artificial Intelligence and Data Engineering. Advances in Intelligent Systems and Computing, vol. 1133, pp. 687\u2013700. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-3514-7_52"},{"issue":"3","key":"36_CR33","doi-asserted-by":"publisher","first-page":"102524","DOI":"10.1016\/j.ipm.2021.102524","volume":"58","author":"P Fortuna","year":"2021","unstructured":"Fortuna, P., Soler-Company, J., Wanner, L.: How well do hate speech, toxicity, abusive and offensive language classification models generalize across datasets? Inf. Process. Manag. 58(3), 102524 (2021)","journal-title":"Inf. Process. Manag."},{"issue":"3","key":"36_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42452-020-04127-6","volume":"3","author":"KA Apoorva","year":"2021","unstructured":"Apoorva, K.A., Sangeetha, S.: Deep neural network and model-based clustering technique for forensic electronic mail author attribution. SN Appl. Sci. 3(3), 1\u201312 (2021). https:\/\/doi.org\/10.1007\/s42452-020-04127-6","journal-title":"SN Appl. Sci."},{"key":"36_CR35","doi-asserted-by":"crossref","unstructured":"Huang, H., et al.: Data poisoning attacks to deep learning based recommender systems. arXiv preprint arXiv:2101.02644 (2021)","DOI":"10.14722\/ndss.2021.24525"},{"key":"36_CR36","doi-asserted-by":"crossref","unstructured":"Shejwalkar, V., Houmansadr, A.: Manipulating the Byzantine: optimizing model poisoning attacks and defenses for federated learning (2021)","DOI":"10.14722\/ndss.2021.24498"},{"key":"36_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/978-3-030-49669-2_18","volume-title":"Data and Applications Security and Privacy XXXIV. DBSec 2020","author":"F Tahmasebian","year":"2020","unstructured":"Tahmasebian, F., et al.: Crowdsourcing under data poisoning attacks: a comparative study. In: Singhal, A., Vaidya, J. (eds.) DBSec 2020. LNCS, vol. 12122, pp. 310\u2013332. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49669-2_18"},{"key":"36_CR38","doi-asserted-by":"crossref","first-page":"e3872","DOI":"10.1002\/ett.3872","volume":"32","author":"L Chen","year":"2020","unstructured":"Chen, L., et al.: Data poisoning attacks on neighborhood-based recommender systems. Trans. Emerg. Telecommun. Technol. 32, e3872 (2020)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"36_CR39","unstructured":"Koh, P.W., Steinhardt, J., Liang, P.: Stronger data poisoning attacks break data sanitization defenses. arXiv preprint arXiv:1811.00741 (2018)"},{"key":"36_CR40","doi-asserted-by":"publisher","first-page":"23253","DOI":"10.1109\/ACCESS.2017.2776930","volume":"6","author":"Z Jianqiang","year":"2018","unstructured":"Jianqiang, Z., Xiaolin, G., Xuejun, Z.: Deep convolution neural networks for Twitter sentiment analysis. IEEE Access 6, 23253\u201323260 (2018)","journal-title":"IEEE Access"},{"issue":"15","key":"36_CR41","doi-asserted-by":"publisher","first-page":"3169","DOI":"10.3390\/app9153169","volume":"9","author":"A Baldominos","year":"2019","unstructured":"Baldominos, A., Saez, Y., Isasi, P.: A survey of handwritten character recognition with MNIST and EMNIST. Appl. Sci. 9(15), 3169 (2019)","journal-title":"Appl. Sci."},{"key":"36_CR42","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/978-981-15-4992-2_46","volume-title":"Proceedings of International Conference on Artificial Intelligence and Applications","author":"A Jain","year":"2021","unstructured":"Jain, A., Jain, V.: Effect of activation functions on deep learning algorithms performance for IMDB movie review analysis. In: Bansal, P., Tushir, M., Balas, V.E., Srivastava, R. (eds.) Proceedings of International Conference on Artificial Intelligence and Applications. AISC, vol. 1164, pp. 489\u2013497. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-4992-2_46"},{"key":"36_CR43","unstructured":"Perry, E.: Lethean attack: an online data poisoning technique. arXiv preprint arXiv:2011.12355 (2020)"},{"key":"36_CR44","unstructured":"Zhang, X., Zhu, X., Lessard, L.: Online data poisoning attacks. In: Learning for Dynamics and Control. PMLR (2020)"},{"key":"36_CR45","unstructured":"Geiping, J., et al.: Witches\u2019 Brew industrial scale data poisoning via gradient matching. arXiv preprint arXiv:2009.02276 (2020)"},{"key":"36_CR46","unstructured":"Wang, Y., Chaudhuri, K.: Data poisoning attacks against online learning. arXiv preprint arXiv:1808.08994 (2018)"},{"key":"36_CR47","unstructured":"Fang, M., et al.: Local model poisoning attacks to Byzantine-robust federated learning. In: 29th {USENIX} [17] Security Symposium ({USENIX} Security 20) (2020)"},{"key":"36_CR48","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/978-3-030-58951-6_23","volume-title":"Computer Security \u2013 ESORICS 2020","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., et al.: Towards poisoning the neural collaborative filtering-based recommender systems. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020. LNCS, vol. 12308, pp. 461\u2013479. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58951-6_23"},{"key":"36_CR49","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: A survey on neural trojans. In: 2020 21st International Symposium on Quality Electronic Design (ISQED). IEEE (2020)","DOI":"10.1109\/ISQED48828.2020.9137011"},{"issue":"8","key":"36_CR50","doi-asserted-by":"publisher","first-page":"2079","DOI":"10.1587\/transinf.2015INP0020","volume":"99","author":"Y Aono","year":"2016","unstructured":"Aono, Y., et al.: Privacy-preserving logistic regression with distributed data sources via homomorphic encryption. IEICE Trans. Inf. Syst. 99(8), 2079\u20132089 (2016)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"3","key":"36_CR51","first-page":"115","volume":"2","author":"TA Assegie","year":"2021","unstructured":"Assegie, T.A.: An optimized K-nearest neighbor based breast cancer detection. J. Robot. Control (JRC) 2(3), 115\u2013118 (2021)","journal-title":"J. Robot. Control (JRC)"},{"key":"36_CR52","doi-asserted-by":"crossref","unstructured":"Amin, B., et al.: Intelligent neutrosophic diagnostic system for cardiotocography data. Comput. Intell. Neurosci. 2021, 20\u201331 (2021)","DOI":"10.1155\/2021\/6656770"},{"key":"36_CR53","unstructured":"Rezaei, M.R.: Amazon product recommender system. arXiv preprint arXiv:2102.04238 (2021)"},{"key":"36_CR54","doi-asserted-by":"crossref","unstructured":"Ramasamy, L.K., et al.: Performance analysis of sentiments in Twitter dataset using SVM models. Int. J. Electr. Comput. Eng. 11(3), 2275\u20132284 (2088\u20138708) (2021)","DOI":"10.11591\/ijece.v11i3.pp2275-2284"},{"key":"36_CR55","unstructured":"Leung, J.K., Griva, I., Kennedy, W.G.: An affective aware pseudo association method to connect disjoint users across multiple datasets\u2013an enhanced validation method for text-based emotion aware recommender. arXiv preprint arXiv:2102.05719 (2021)"},{"key":"36_CR56","unstructured":"Liu, Y., et al.: Towards communication-efficient and attack-resistant federated edge learning for industrial internet of things. arXiv preprint arXiv:2012.04436 (2020)"},{"key":"36_CR57","unstructured":"Siddiqui, M., Wang, M.C., Lee, J.: Data mining methods for malware detection using instruction sequences. In: Artificial Intelligence and Applications (2008)"},{"key":"36_CR58","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-030-65411-5_4","volume-title":"Cryptology and Network Security","author":"S Narisada","year":"2020","unstructured":"Narisada, S., et al.: Stronger targeted poisoning attacks against malware detection. In: Krenn, S., Shulman, H., Vaudenay, S. (eds.) CANS 2020. LNCS, vol. 12579, pp. 65\u201384. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-65411-5_4"},{"key":"36_CR59","unstructured":"Weerasinghe, S., et al.: Defending distributed classifiers against data poisoning attacks. arXiv preprint arXiv:2008.09284 (2020)"},{"key":"36_CR60","unstructured":"Xu, X., et al.: Detecting ai trojans using meta neural analysis. arXiv preprint arXiv:1910.03137 (2019)"},{"key":"36_CR61","unstructured":"Weerasinghe, P.S.L.: Novel defenses against data poisoning in adversarial machine learning (2019)"},{"key":"36_CR62","doi-asserted-by":"crossref","unstructured":"Borgnia, E., et al.: Strong data augmentation sanitizes poisoning and backdoor attacks without an accuracy tradeoff. arXiv preprint arXiv:2011.09527 (2020)","DOI":"10.1109\/ICASSP39728.2021.9414862"},{"key":"36_CR63","unstructured":"Gray, J., Sgandurra, D., Cavallaro, L.: Identifying authorship style in malicious binaries: techniques, challenges & datasets. arXiv preprint arXiv:2101.06124 (2021)"},{"key":"36_CR64","doi-asserted-by":"crossref","unstructured":"Sridhar, K., et al.: ICASSP 2021 acoustic echo cancellation challenge: datasets and testing framework. arXiv preprint arXiv:2009.04972 (2020)","DOI":"10.1109\/ICASSP39728.2021.9413457"},{"key":"36_CR65","doi-asserted-by":"publisher","first-page":"49","DOI":"10.3389\/fninf.2020.601829","volume":"14","author":"L Gu","year":"2020","unstructured":"Gu, L., et al.: Semi-supervised learning in medical images through graph-embedded random forest. Front. Neuroinf. 14, 49 (2020)","journal-title":"Front. Neuroinf."},{"key":"36_CR66","doi-asserted-by":"publisher","first-page":"30271","DOI":"10.1109\/ACCESS.2020.2972464","volume":"8","author":"L Yang","year":"2020","unstructured":"Yang, L., et al.: Random noise attenuation based on residual convolutional neural network in seismic datasets. IEEE Access 8, 30271\u201330286 (2020)","journal-title":"IEEE Access"},{"issue":"12","key":"36_CR67","doi-asserted-by":"publisher","first-page":"3703","DOI":"10.1093\/bioinformatics\/btaa232","volume":"36","author":"H Asghari","year":"2020","unstructured":"Asghari, H., et al.: CircMiner: accurate and rapid detection of circular RNA through the splice-aware pseudo-alignment scheme. Bioinformatics 36(12), 3703\u20133711 (2020)","journal-title":"Bioinformatics"},{"key":"36_CR68","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1007\/978-981-13-9042-5_49","volume-title":"Computational Intelligence in Pattern Recognition","author":"N Panda","year":"2020","unstructured":"Panda, N., Majhi, S.K.: How effective is the salp swarm algorithm in data classification. In: Das, A.K., Nayak, J., Naik, B., Pati, S.K., Pelusi, D. (eds.) Computational Intelligence in Pattern Recognition. AISC, vol. 999, pp. 579\u2013588. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-13-9042-5_49"},{"key":"36_CR69","unstructured":"Schwarzschild, A., et al.: Just how toxic is data poisoning? A unified benchmark for backdoor and data poisoning attacks. arXiv preprint arXiv:2006.12557 (2020)"},{"key":"36_CR70","unstructured":"Sablayrolles, A., et al.: Radioactive data: tracing through training. In: International Conference on Machine Learning. PMLR (2020)"},{"key":"36_CR71","doi-asserted-by":"crossref","unstructured":"Dang, T.K., Truong, P.T.T., et al.: Data poisoning attack on deep neural network and some defense methods, pp. 15\u201322 (2020)","DOI":"10.1109\/ACOMP50827.2020.00010"}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8059-5_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T14:09:57Z","timestamp":1699884597000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8059-5_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811680588","9789811680595"],"references-count":71,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8059-5_36","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}