{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:12:24Z","timestamp":1774678344364,"version":"3.50.1"},"reference-count":72,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2974752","type":"journal-article","created":{"date-parts":[[2020,2,18]],"date-time":"2020-02-18T21:33:43Z","timestamp":1582061623000},"page":"35403-35419","source":"Crossref","is-referenced-by-count":183,"title":["Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1665-6226","authenticated-orcid":false,"given":"Nuno","family":"Martins","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4516-6752","authenticated-orcid":false,"given":"Jose Magalhaes","family":"Cruz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9278-6503","authenticated-orcid":false,"given":"Tiago","family":"Cruz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9278-8194","authenticated-orcid":false,"given":"Pedro","family":"Henriques Abreu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201257"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.159"},{"key":"ref70","first-page":"74","article-title":"Survey on malware detection methods","author":"vinod","year":"2009","journal-title":"Proc 3rd Hackers&#x2019; Workshop Comput Internet Secur"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2017.21"},{"key":"ref33","article-title":"Evading machine learning malware detection","author":"anderson","year":"2017","journal-title":"Black Hat"},{"key":"ref32","article-title":"Defense against universal adversarial perturbations","author":"akhtar","year":"2017","journal-title":"arXiv 1711 05929 [cs]"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.04.092"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599759"},{"key":"ref37","article-title":"Towards evaluating the robustness of neural networks","author":"carlini","year":"2016","journal-title":"arXiv 1608 04644"},{"key":"ref36","article-title":"Evasion attacks against machine learning at test time","author":"biggio","year":"2017","journal-title":"arXiv 1708 06131"},{"key":"ref35","article-title":"Wasserstein GAN","author":"arjovsky","year":"2017","journal-title":"arXiv 1701 07875"},{"key":"ref34","first-page":"1093","article-title":"Understanding the Mirai Botnet","author":"antonakakis","year":"2017","journal-title":"Proc 26th USENIX Security Symp"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref62","article-title":"NIPS 2016 Tutorial: Generative adversarial networks","author":"goodfellow","year":"2014","journal-title":"arXiv 1701 00160"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref63","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"arXiv 1312 6199"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref64","article-title":"Machine learning techniques for intrusion detection","author":"zamani","year":"2013","journal-title":"arXiv 1312 2177"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref65","first-page":"37","article-title":"Autoencoders, unsupervised learning, and deep architectures","author":"baldi","year":"2012","journal-title":"Proc ICML Workshop Unsupervised Transf Learn"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31537-4_40"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854599"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref2","year":"2019","journal-title":"Cifar-10 (canadian institute for advanced research)"},{"key":"ref1","year":"2019","journal-title":"Alexa Top 1m"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.11.032"},{"key":"ref22","author":"domingos","year":"2018","journal-title":"The Master Algorithm How the Quest for the Ultimate Learning Machine Will Remake Our World"},{"key":"ref21","author":"chio","year":"2018","journal-title":"Machine Learning and Security Protecting Systems with Data and Algorithms"},{"key":"ref24","article-title":"Security matters: A survey on adversarial machine learning","author":"li","year":"2018","journal-title":"arXiv 1810 07339"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14429\/dsj.68.12371"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805680"},{"key":"ref25","article-title":"IDSGAN: Generative adversarial networks for attack generation against intrusion detection","author":"lin","year":"2018","journal-title":"arXiv 1809 02077"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3003816"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502964"},{"key":"ref59","article-title":"DeepFool: A simple and accurate method to fool deep neural networks","author":"moosavi-dezfooli","year":"2015","journal-title":"arXiv 1511 04599"},{"key":"ref58","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"arXiv 1412 6572"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23115"},{"key":"ref56","article-title":"Improved techniques for training GANs","author":"salimans","year":"2016","journal-title":"arXiv 1606 03498"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref54","article-title":"Practical black-box attacks against machine learning","author":"papernot","year":"2016","journal-title":"arXiv 1602 02697"},{"key":"ref53","article-title":"Towards the science of security and privacy in machine learning","author":"papernot","year":"2016","journal-title":"arXiv 1611 03814"},{"key":"ref52","article-title":"Distillation as a defense to adversarial perturbations against deep neural networks","author":"papernot","year":"2015","journal-title":"arXiv 1511 04508"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/CYCON.2019.8756865"},{"key":"ref11","article-title":"Rallying adversarial techniques against deep learning for network security","author":"clements","year":"2019","journal-title":"arXiv 1903 11688"},{"key":"ref40","article-title":"EAD: Elastic-net attacks to deep neural networks via adversarial examples","author":"chen","year":"2017","journal-title":"arXiv 1709 04114"},{"key":"ref12","first-page":"127","author":"john","year":"2019","journal-title":"Adversarial Attacks and Defenses in Malware Detection Classifiers"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30244-3_22"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.10.011"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761337"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-019-00925-6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2018.8548327"},{"key":"ref4","year":"2019","journal-title":"GTSRB German Traffic Sign Dataset"},{"key":"ref3","year":"2019","journal-title":"Contagio Dataset"},{"key":"ref6","year":"2019","journal-title":"Microsoft Malware Kaggle Dataset"},{"key":"ref5","year":"2019","journal-title":"Malwr Dataset"},{"key":"ref8","year":"2019","journal-title":"NSL-KDD Dataset"},{"key":"ref7","year":"2019","journal-title":"MNIST Handwritten Digit Database"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2996758.2996767"},{"key":"ref9","year":"2019","journal-title":"Virusshare Dataset"},{"key":"ref46","article-title":"Adversarial deep learning against intrusion detection classifiers","author":"rigaki","year":"2017"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"ref48","article-title":"Feature squeezing: Detecting adversarial examples in deep neural networks","author":"xu","year":"2017","journal-title":"arXiv 1704 01155"},{"key":"ref47","article-title":"Regularizing deep networks using efficient layerwise adversarial training","author":"sankaranarayanan","year":"2017","journal-title":"arXiv 1705 07819"},{"key":"ref42","article-title":"Blocking transferability of adversarial examples in black-box learning systems","author":"hosseini","year":"2017","journal-title":"arXiv 1703 04318"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"ref44","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2017","journal-title":"arXiv 1706 06083"},{"key":"ref43","article-title":"Generating adversarial malware examples for black-box attacks based on GAN","author":"hu","year":"2017","journal-title":"arXiv 1702 05983"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09001114.pdf?arnumber=9001114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:51:43Z","timestamp":1639770703000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9001114\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":72,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2974752","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}