{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T06:43:05Z","timestamp":1771742585555,"version":"3.50.1"},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100002583","name":"Gyeongsang National University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002583","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2022R1G1A1005212)."],"award-info":[{"award-number":["NRF-2022R1G1A1005212)."]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2025.3650123","type":"journal-article","created":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T18:38:09Z","timestamp":1767292689000},"page":"2566-2575","source":"Crossref","is-referenced-by-count":1,"title":["A DeepSHAP-Based Adversarial Attack on Machine Learning-Based Network Intrusion Detection"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5543-6157","authenticated-orcid":false,"given":"Byung","family":"Chang Chung","sequence":"first","affiliation":[{"name":"Department of AI Information Engineering, Gyeongsang National University, Jinju, Republic of Korea"}]},{"given":"Gyu-Bum","family":"Han","sequence":"additional","affiliation":[{"name":"Core Algorithm Laboratory, AI Center, Samsung Electronics, Suwon, Republic of Korea"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"IBM Security X-Force Threat Intelligence Index 2023","year":"2023"},{"key":"ref2","first-page":"305","article-title":"Outside the closed world: On using machine learning for network intrusion detection","volume-title":"Proc. IEEE Symp. Secur. Privacy","author":"Sommer"},{"issue":"8","key":"ref3","doi-asserted-by":"crossref","first-page":"1707","DOI":"10.1109\/LWC.2021.3077946","article-title":"An efficient intrusion detection method based on dynamic autoencoder","volume":"10","author":"Zhao","year":"2021","journal-title":"IEEE Wireless Commun. Lett."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"81736","DOI":"10.1109\/ACCESS.2024.3410046","article-title":"Edge-federated learning-based intelligent intrusion detection system for heterogeneous Internet of Things","volume":"12","author":"Mahadik","year":"2024","journal-title":"IEEE Access"},{"issue":"13","key":"ref5","doi-asserted-by":"crossref","first-page":"10327","DOI":"10.1109\/JIOT.2020.3048038","article-title":"Adversarial attacks against network intrusion detection in IoT systems","volume":"8","author":"Qiu","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"ref6","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1109\/TNET.2021.3137084","article-title":"Adversarial attacks against deep learning-based network intrusion detection systems and defense mechanisms","volume":"30","author":"Zhang","year":"2022","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"issue":"5","key":"ref8","doi-asserted-by":"crossref","first-page":"3962","DOI":"10.1109\/JIOT.2021.3102056","article-title":"X-IIoTID: A connectivity-agnostic and device-agnostic intrusion data set for industrial Internet of Things","volume":"9","author":"Al-Hawawreh","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref9","article-title":"Poisoning attacks with generative adversarial nets","author":"Mu\u00f1oz-Gonz\u00e1lez","year":"2019","journal-title":"arXiv:1906.07773"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58607-2_11"},{"key":"ref11","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"111853","DOI":"10.1109\/ACCESS.2021.3103015","article-title":"Panop: Mimicry-resistant ANN-based distributed NIDS for IoT networks","volume":"9","author":"Kim","year":"2021","journal-title":"IEEE Access"},{"key":"ref13","first-page":"601","article-title":"Stealing machine learning models via prediction APIs","volume-title":"Proc. 25th USENIX Secur. Symp. (Usenix Secur.)","author":"Tram\u00e8r"},{"key":"ref14","first-page":"3","article-title":"Membership inference attacks against machine learning models","volume-title":"Proc. IEEE Symp. Secur. Privacy (SP)","author":"Shokri"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2025.findings-acl.580"},{"issue":"20","key":"ref16","doi-asserted-by":"crossref","first-page":"19706","DOI":"10.1109\/JIOT.2022.3167005","article-title":"Intrusion detection in the IoT under data and concept drifts: Online deep learning approach","volume":"9","author":"Wahab","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140444"},{"key":"ref18","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref19","first-page":"39","article-title":"Towards evaluating the robustness of neural networks","volume-title":"Proc. IEEE Symp. Secur. Privacy (SP)","author":"Carlini"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1515\/9781400881970-018"},{"key":"ref21","first-page":"4768","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst.","author":"Lundberg"},{"key":"ref22","first-page":"2574","article-title":"DeepFool: A simple and accurate method to fool deep neural networks","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Moosavi-Dezfooli"},{"key":"ref23","first-page":"372","article-title":"The limitations of deep learning in adversarial settings","volume-title":"Proc. IEEE Eur. Symp. Secur. Privacy (EuroS&P)","author":"Papernot"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11321242.pdf?arnumber=11321242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T22:02:41Z","timestamp":1768255361000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11321242\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3650123","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}