{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T01:21:41Z","timestamp":1760404901517,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"11-12","license":[{"start":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T00:00:00Z","timestamp":1675987200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T00:00:00Z","timestamp":1675987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s12243-023-00951-0","type":"journal-article","created":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T15:52:13Z","timestamp":1676044333000},"page":"655-665","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Effects of dataset attacks on machine learning models in e-health"],"prefix":"10.1007","volume":"78","author":[{"given":"Tarek","family":"Moulahi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9765-1605","authenticated-orcid":false,"given":"Salim El","family":"Khediri","sequence":"additional","affiliation":[]},{"given":"Durre","family":"Nayab","sequence":"additional","affiliation":[]},{"given":"Mushira","family":"Freihat","sequence":"additional","affiliation":[]},{"given":"Rehan Ullah","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,10]]},"reference":[{"issue":"1","key":"951_CR1","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/JSEN.2017.2771226","volume":"18","author":"S Zidi","year":"2017","unstructured":"Zidi S, Moulahi T, Alaya B (2017) Fault detection in wireless sensor networks through SVM classifier. IEEE Sens J 18(1):340\u2013347","journal-title":"IEEE Sens J"},{"key":"951_CR2","doi-asserted-by":"crossref","unstructured":"Zaouiat CA, Latif A (2017) Internet of things and machine learning convergence: the e-healthcare revolution. In: Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems, pp. 1\u20135","DOI":"10.1145\/3167486.3167551"},{"key":"951_CR3","doi-asserted-by":"crossref","unstructured":"Sughasiny M, Rajeshwari J (2018) Application of machine learning techniques, big data analytics in health care sector \u2013 a literature survey. In:\u00a02018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference. IEEE, pp 741\u2013749","DOI":"10.1109\/I-SMAC.2018.8653654"},{"key":"951_CR4","unstructured":"Biggio B, Nelson B, Laskov P (2012) Poisoning attacks against support vector machines, arXiv preprint. arXiv:1206.6389. Accessed 20 Jul 2022"},{"key":"951_CR5","doi-asserted-by":"publisher","first-page":"100199","DOI":"10.1016\/j.cosrev.2019.100199","volume":"34","author":"N Pitropakis","year":"2019","unstructured":"Pitropakis N, Panaousis E, Giannetsos T, Anastasiadis E, Loukas G (2019) A taxonomy and survey of attacks against machine learning. Comput Sci Rev 34:100199","journal-title":"Comput Sci Rev"},{"key":"951_CR6","doi-asserted-by":"crossref","unstructured":"Banerjee N,Giannetsos T, Panaousis E, Took CC (2018) Unsupervised learning for trustworthy IoT. In:\u00a02018 IEEE international conference on fuzzy systems (FUZZ-IEEE), IEEE, pp 1\u20138","DOI":"10.1109\/FUZZ-IEEE.2018.8491672"},{"issue":"3","key":"951_CR7","doi-asserted-by":"publisher","first-page":"3729","DOI":"10.1007\/s11042-016-3719-1","volume":"77","author":"H Ying","year":"2018","unstructured":"Ying H et al (2018) Simultaneously aided diagnosis model for outpatient departments via healthcare big data analytics. Multimed Tools Appl 77(3):3729\u20133743","journal-title":"Multimed Tools Appl"},{"issue":"2017","key":"951_CR8","doi-asserted-by":"publisher","first-page":"14797","DOI":"10.1109\/ACCESS.2017.2724555","volume":"5","author":"RM Mehmood","year":"2017","unstructured":"Mehmood RM, Du R, Lee HJ (2017) Optimal feature selection and deep learning ensembles method for emotion recognition from human brain EEG sensors. IEEE Access 5(2017):14797\u201314806","journal-title":"IEEE Access"},{"key":"951_CR9","doi-asserted-by":"crossref","unstructured":"Bhatt A, Kumar DubeyS, Kumar Bhatt A (2018) Analytical study on cardiovascular health issues prediction using decision model-based predictive analytic techniques. In: Soft Computing: Theories and Applications,\u00a0vol 2. Springer, Singapore, pp 289\u2013299","DOI":"10.1007\/978-981-10-5699-4_28"},{"key":"951_CR10","doi-asserted-by":"crossref","unstructured":"Ndaba M, Pillay AW, Ezugwu AE (2018) An improved generalized regression neural network for type II diabetes classification. In: Computational Science and Its Applications\u2013ICCSA 2018: 18th International Conference, Melbourne, VIC, Australia, July 2\u20135, 2018, Proceedings, Part IV 18, Springer International Publishing,\u00a0pp. 659\u2013671","DOI":"10.1007\/978-3-319-95171-3_52"},{"issue":"1","key":"951_CR11","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s12539-016-0144-0","volume":"9","author":"A Kumar","year":"2017","unstructured":"Kumar A, Singh TR (2017) A new decision tree to solve the puzzle of Alzheimer\u2019s disease pathogenesis through standard diagnosis scoring system. Interdiscipl Sci Comput Life Sci 9(1):107\u2013115","journal-title":"Interdiscipl Sci Comput Life Sci"},{"key":"951_CR12","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","volume":"84","author":"B Biggio","year":"2018","unstructured":"Biggio B, Roli F (2018) Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recogn 84:317\u2013331","journal-title":"Pattern Recogn"},{"key":"951_CR13","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/s10916-018-0940-7","volume":"42","author":"M Maniruzzaman","year":"2018","unstructured":"Maniruzzaman M, Rahman MJ, Al-MehediHasan M et al (2018) Accurate diabetes risk stratification using machine learning: role of missing value and outliers. J Med Syst 42:92","journal-title":"J Med Syst"},{"key":"951_CR14","unstructured":"Chen B, Carvalho W, Baracaldo N, Ludwig H, Edwards B, Lee T, Molloy I,Srivastava B (2018) Detecting backdoor attacks on deep neural networks by activation clustering, arXiv preprint. arXiv:1811.03728. Accessed 20 Jul 2022"},{"key":"951_CR15","unstructured":"Google images (no date) Google images. Google. Available at: https:\/\/images.google.com\/. (Accessed: 31 Oct 2022)"},{"key":"951_CR16","doi-asserted-by":"crossref","unstructured":"Huang L., Joseph AD, Nelson B, Rubinstein BI, Tygar J (2011) Adversarial machine learning. In: Proceedings of the 4th ACM workshop on Security and artificial intelligence, pp. 43\u201358","DOI":"10.1145\/2046684.2046692"},{"key":"951_CR17","unstructured":"Shumailov I, Zhao Y, Mullins R, Anderson R (2018) The taboo trap: behavioural detection of adversarial samples, arXiv preprint.\u00a0arXiv:1811.07375. Accessed 5 Jul 2022"},{"key":"951_CR18","doi-asserted-by":"crossref","unstructured":"Zhou Y, Kantarcioglu M, Xi B (2019) A survey of game theoretic approachfor adversarial machine learning, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 9(3):e1259","DOI":"10.1002\/widm.1259"},{"key":"951_CR19","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar N, Mian A (2018) Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6:14410\u201314430","journal-title":"IEEE Access"},{"key":"951_CR20","unstructured":"Zhang J, Jiang X (2018) Adversarial examples: opportunities and challenges, arXiv preprint. arXiv:1809.04790. Accessed 8 Jul 2022"},{"issue":"4","key":"951_CR21","doi-asserted-by":"publisher","first-page":"356","DOI":"10.14429\/dsj.68.12371","volume":"68","author":"V Duddu","year":"2018","unstructured":"Duddu V (2018) A survey of adversarial machine learning in cyber warfare. Def Sci J 68(4):356","journal-title":"Def Sci J"},{"key":"951_CR22","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/s42400-018-0012-9","volume":"1","author":"L Sun","year":"2018","unstructured":"Sun L, Tan M, Zhou Z (2018) A survey of practical adversarial example attacks. Cybersecurity 1:9","journal-title":"Cybersecurity"},{"issue":"9","key":"951_CR23","doi-asserted-by":"publisher","first-page":"2484","DOI":"10.1093\/comjnl\/bxab085","volume":"65","author":"T Moulahi","year":"2022","unstructured":"Moulahi T (2022) Joining formal concept analysis to feature extraction for data pruning in cloud of things. Comput J 65(9):2484\u20132492","journal-title":"Comput J"},{"issue":"9","key":"951_CR24","doi-asserted-by":"publisher","first-page":"e4812","DOI":"10.1002\/dac.4812","volume":"34","author":"T Moulahi","year":"2021","unstructured":"Moulahi T, El Khediri S, Khan RU, Zidi S (2021) A fog computing data reduce level to enhance the cloud of things performance. Int J Commun Syst 34(9):e4812","journal-title":"Int J Commun Syst"},{"issue":"1","key":"951_CR25","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1023\/A:1022631118932","volume":"11","author":"RC Holte","year":"1993","unstructured":"Holte RC (1993) Very simple classification rules perform well on most commonly used datasets. Mach Learn 11(1):63\u201390","journal-title":"Mach Learn"},{"key":"951_CR26","first-page":"181","volume":"98","author":"MA Hall","year":"1998","unstructured":"Hall MA, Smith LA (1998) Practical feature subset selection for machine learning. Comput Sci 98:181\u2013191","journal-title":"Comput Sci"},{"key":"951_CR27","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.asoc.2017.09.038","volume":"62","author":"J Indu","year":"2018","unstructured":"Indu J, Kumar Jain V, Jain R (2018) Correlation feature selection based improved-binary particle swarm optimization for gene selection and cancer classification. Appl Soft Comput 62:203\u2013215","journal-title":"Appl Soft Comput"},{"issue":"2","key":"951_CR28","first-page":"271","volume":"2","author":"A Gowda Karegowda","year":"2010","unstructured":"Gowda Karegowda A, Manjunath AS, Jayaram MA (2010) Comparative study of attribute selection using gain ratio and correlation based feature selection. Int J Inf Technol Knowl Manag 2(2):271\u2013277","journal-title":"Int J Inf Technol Knowl Manag"},{"key":"951_CR29","first-page":"249","volume":"1992","author":"K Kira","year":"1992","unstructured":"Kira K, Rendell LA (1992) A practical approach to feature selection. Mach Learn Proc 1992:249\u2013256","journal-title":"Mach Learn Proc"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-023-00951-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-023-00951-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-023-00951-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T09:11:30Z","timestamp":1701853890000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-023-00951-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,10]]},"references-count":29,"journal-issue":{"issue":"11-12","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["951"],"URL":"https:\/\/doi.org\/10.1007\/s12243-023-00951-0","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2023,2,10]]},"assertion":[{"value":"14 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}