{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:13:50Z","timestamp":1743081230844,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819619061"},{"type":"electronic","value":"9789819619078"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1907-8_30","type":"book-chapter","created":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T19:54:42Z","timestamp":1740426882000},"page":"314-324","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Evaluation of Adversarial Attacks Against ML-Powered NIDS in a Realistic Scenario"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9243-7047","authenticated-orcid":false,"given":"Federica","family":"Uccello","sequence":"first","affiliation":[]},{"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[]},{"given":"Aleksandra","family":"Pawlicka","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9327-0138","authenticated-orcid":false,"given":"Salvatore","family":"D\u2019Antonio","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Michal","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,25]]},"reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Pawlicka, A., Chora\u015b, M., Pawlicki, M.: Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers\u2019 perspective. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1\u201311 (2020)","DOI":"10.1145\/3407023.3409181"},{"issue":"11","key":"30_CR2","doi-asserted-by":"publisher","first-page":"1532","DOI":"10.3390\/e23111532","volume":"23","author":"M Komisarek","year":"2021","unstructured":"Komisarek, M., Pawlicki, M., Kozik, R., Ho\u0142ubowicz, W., Chora\u015b, M.: How to effectively collect and process network data for intrusion detection? Entropy 23(11), 1532 (2021)","journal-title":"Entropy"},{"issue":"10","key":"30_CR3","doi-asserted-by":"publisher","first-page":"18024","DOI":"10.1109\/TITS.2022.3154884","volume":"23","author":"Y Ding","year":"2022","unstructured":"Ding, Y., Zhu, G., Chen, D., Qin, X., Cao, M., Qin, Z.: Adversarial sample attack and defense method for encrypted traffic data. IEEE Trans. Intell. Transp. Syst. 23(10), 18024\u201318039 (2022)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"9","key":"30_CR4","doi-asserted-by":"publisher","first-page":"7868","DOI":"10.1109\/JIOT.2022.3229906","volume":"10","author":"J Kotak","year":"2023","unstructured":"Kotak, J., Elovici, Y.: Adversarial attacks against IoT identification systems. IEEE Internet Things J. 10(9), 7868\u20137883 (2023)","journal-title":"IEEE Internet Things J."},{"key":"30_CR5","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.procs.2021.04.118","volume":"187","author":"S Zhao","year":"2021","unstructured":"Zhao, S., Li, J., Wang, J., Zhang, Z., Zhu, L., Zhang, Y.: AttackGAN: adversarial attack against black-box ids using generative adversarial networks. Procedia Comput. Sci. 187, 128\u2013133 (2021)","journal-title":"Procedia Comput. Sci."},{"key":"30_CR6","doi-asserted-by":"publisher","first-page":"133717","DOI":"10.1109\/ACCESS.2023.3334645","volume":"11","author":"RM Arif","year":"2023","unstructured":"Arif, R.M., et al.: A deep reinforcement learning framework to evade blackbox machine learning based IoT malware detectors using GAN-generated influential features. IEEE Access 11, 133717\u2013133729 (2023)","journal-title":"IEEE Access"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Kuppa, A., Grzonkowski, S., Asghar, M.R., Le-Khac, N.-A.: Black box attacks on deep anomaly detectors. In: Proceedings of the 14th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2019)","DOI":"10.1145\/3339252.3339266"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Wang, Y., et al.: Adversarial attacks and defenses in machine learning-empowered communication systems and networks: a contemporary survey. IEEE Commun. Surv. Tutorials 25(4), 2245\u20132298 (2023)","DOI":"10.1109\/COMST.2023.3319492"},{"key":"30_CR9","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar, N., Mian, A.: Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6, 14410\u201314430 (2018)","journal-title":"IEEE Access"},{"issue":"2","key":"30_CR10","doi-asserted-by":"publisher","first-page":"62","DOI":"10.3390\/fi15020062","volume":"15","author":"A Alotaibi","year":"2023","unstructured":"Alotaibi, A., Rassam, M.A.: Adversarial machine learning attacks against intrusion detection systems: a survey on strategies and defense. Future Internet 15(2), 62 (2023)","journal-title":"Future Internet"},{"key":"30_CR11","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"30_CR12","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Suthishni, D.N.P., Kumar, K.S.S.: A review on machine learning based security approaches in intrusion detection system. In: 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom), pp. 341\u2013348 (2022)","DOI":"10.23919\/INDIACom54597.2022.9763261"},{"issue":"7","key":"30_CR14","doi-asserted-by":"publisher","first-page":"4245","DOI":"10.1007\/s11831-023-09943-8","volume":"30","author":"A Thakkar","year":"2023","unstructured":"Thakkar, A., Lohiya, R.: A review on challenges and future research directions for machine learning-based intrusion detection system. Arch. Comput. Methods Eng. 30(7), 4245\u20134269 (2023)","journal-title":"Arch. Comput. Methods Eng."},{"issue":"2","key":"30_CR15","doi-asserted-by":"publisher","first-page":"29","DOI":"10.3390\/jsan12020029","volume":"12","author":"D Musleh","year":"2023","unstructured":"Musleh, D., Alotaibi, M., Alhaidari, F., Rahman, A., Mohammad, R.M.: Intrusion detection system using feature extraction with machine learning algorithms in IoT. J. Sens. Actuator Netw. 12(2), 29 (2023)","journal-title":"J. Sens. Actuator Netw."},{"key":"30_CR16","unstructured":"Abadi, M., et al.: TensorFlow: large-scale machine learning on heterogeneous systems (2015). Software available from tensorflow.org"},{"key":"30_CR17","unstructured":"Nicolae, M.-I., et al.: Adversarial robustness toolbox v1. 0.0. arXiv preprint arXiv:1807.01069 (2018)"}],"container-title":["Communications in Computer and Information Science","Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1907-8_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T19:54:47Z","timestamp":1740426887000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1907-8_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819619061","9789819619078"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1907-8_30","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"25 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhenzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icai12024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icai.org.cn\/2024\/Organization.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}