{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T21:26:13Z","timestamp":1772141173453,"version":"3.50.1"},"reference-count":98,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2026.3655822","type":"journal-article","created":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T20:55:44Z","timestamp":1768856144000},"page":"11064-11083","source":"Crossref","is-referenced-by-count":0,"title":["Adversarial Shadows in Digital Forensics: New Insights Into File Fragment Classification Vulnerabilities and Defenses"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-2856-857X","authenticated-orcid":false,"given":"Teena","family":"Mary","sequence":"first","affiliation":[{"name":"Department of Computer Science, CHRIST (Deemed to be University), Bengaluru, Karnataka, India"}]},{"given":"C. S.","family":"Sreeja","sequence":"additional","affiliation":[{"name":"Department of Computer Science, CHRIST (Deemed to be University), Bengaluru, Karnataka, India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3231884.3231889"},{"key":"ref2","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv:1312.6199"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/543"},{"key":"ref5","first-page":"1467","article-title":"Poisoning attacks against support vector machines","volume-title":"Proc. 29th Int. Conf. Mach. Learn. (ICML)","author":"Biggio"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2019.00044"},{"key":"ref8","article-title":"Adversarial machine learning at scale","author":"Kurakin","year":"2016","journal-title":"arXiv:1611.01236"},{"key":"ref9","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref10","article-title":"Towards deep learning models resistant to adversarial attacks","volume-title":"Proc. 6th Int. Conf. Learn. Represent. (ICLR)","author":"Madry"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2017.49"},{"key":"ref12","article-title":"Deceiving end-to-end deep learning malware detectors using adversarial examples","author":"Kreuk","year":"2018","journal-title":"arXiv:1802.04528"},{"key":"ref13","volume-title":"Evading Machine Learning Malware Detection","author":"Anderson","year":"2017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.05.004"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241142"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103988"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-8991-9_29"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2016.282"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3264418"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/eusipco.2018.8553214"},{"key":"ref24","article-title":"Learning to evade static PE machine learning malware models via reinforcement learning","author":"Anderson","year":"2018","journal-title":"arXiv:1801.08917"},{"key":"ref25","article-title":"Malware detection by eating a whole EXE","author":"Raff","year":"2017","journal-title":"arXiv:1710.09435"},{"key":"ref26","article-title":"ByteShield: Adversarially robust end-to-end malware detection through byte masking","author":"Gibert","year":"2025","journal-title":"arXiv:2512.09883"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.005"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ares.2010.100"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.30630\/joiv.6.4.1265"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.008"},{"key":"ref31","first-page":"549","article-title":"Near-optimal evasion of convex-inducing classifiers","volume-title":"Proc. 13th Int. Conf. Artif. Intell. Statist. (AISTATS)","volume":"9","author":"Nelson"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ai.100-2e2023"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2024.04.024"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-024-00519-z"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23115"},{"key":"ref36","article-title":"Poisoning attacks and defenses on artificial intelligence: A survey","author":"Ramirez","year":"2022","journal-title":"arXiv:2202.10276"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3551636"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/4907754"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/icapai61893.2024.10541282"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.54254\/2755-2721\/96\/20241306"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3345000"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.9734\/jerr\/2025\/v27i21413"},{"key":"ref43","article-title":"Adversarial attacks on LiDAR-based tracking across road users: Robustness evaluation and target-aware black-box method","author":"Tian","year":"2024","journal-title":"arXiv:2410.20893"},{"issue":"15","key":"ref44","first-page":"1","article-title":"Extending adversarial attacks to produce adversarial class probability distributions","volume":"24","author":"Vadillo","year":"2020","journal-title":"J. Mach. Learn. Res."},{"key":"ref45","article-title":"Revisiting DeepFool: Generalization and improvement","author":"Abdollahpoorrostam","year":"2023","journal-title":"arXiv:2303.12481"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.47857\/irjms.2024.v05i03.0828"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16195"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/host55342.2024.10545401"},{"key":"ref49","article-title":"Revisiting character-level adversarial attacks for language models","author":"Abad Rocamora","year":"2024","journal-title":"arXiv:2405.04346"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/icics63486.2024.10638315"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/globecom42002.2020.9322472"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/tmlcn.2024.3366161"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3147040"},{"key":"ref54","article-title":"Adversarial attacks and defenses in machine learning-powered networks: A contemporary survey","author":"Wang","year":"2023","journal-title":"arXiv:2303.06302"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.2021.2006781"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/acoit62457.2024.10941671"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3423323"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2023.3319492"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ojvt.2023.3265363"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/iccit-144147971.2020.9213818"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT58132.2023.10273945"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/sadfe.2009.21"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1142\/s2196888823500070"},{"key":"ref64","article-title":"A novel machine learning approach for file fragments classification","author":"Algurashi","year":"2022"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2020.3004266"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3486180"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3340441"},{"key":"ref68","first-page":"42","article-title":"Advanced file carving approaches for multimedia files","volume":"2","author":"Poisel","year":"2014","journal-title":"J. Wireless Mob. Netw. Ubiquitous Comput. Dependable Appl."},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1186\/s13104-020-05037-x"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1186\/s13104-024-07034-w"},{"key":"ref71","article-title":"Adversarial attacks on code models with discriminative graph patterns","author":"Nguyen","year":"2023","journal-title":"arXiv:2308.11161"},{"key":"ref72","article-title":"Adversarial attacks and dimensionality in text classifiers","author":"Chattopadhyay","year":"2024","journal-title":"arXiv:2404.02660"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2025.230419"},{"key":"ref74","article-title":"GenBFA: An evolutionary optimization approach to bit-flip attacks on LLMs","author":"Das","year":"2024","journal-title":"arXiv:2411.13757"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/dsn58367.2023.00023"},{"key":"ref76","article-title":"Rowhammer-based trojan injection: One bit flip is sufficient for backdooring DNNs","volume-title":"Proc. presented at the SENIX Security Symposium","author":"Li"},{"key":"ref77","first-page":"1163","article-title":"Adversarial training for raw-binary malware classifiers","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Lucas"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2021.3082330"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103103"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3488204"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102543"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.14722\/sdiotsec.2024.23066"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3706573"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/icccn61486.2024.10637577"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-96392-x"},{"key":"ref86","article-title":"Adversarial networks and machine learning for file classification","author":"Germain","year":"2023","journal-title":"arXiv:2301.11964"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.015452"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/iccv.2019.00348"},{"key":"ref89","article-title":"Attacking large language models with projected gradient descent","author":"Geisler","year":"2024","journal-title":"arXiv:2402.09154"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363257"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2018.00465"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100573"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103841"},{"key":"ref94","article-title":"Defenses in adversarial machine learning: A survey","author":"Wu","year":"2023","journal-title":"arXiv:2312.08890"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2025.240603"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/satml54575.2023.00031"},{"key":"ref97","article-title":"\u2019Adversarial attacks and defenses in malware classification: A survey","volume":"8","author":"Moisejevs","year":"2019","journal-title":"Int. J. Artif. Intell. Expert Syst."},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.3233\/faia200388"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11358892.pdf?arnumber=11358892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T20:45:48Z","timestamp":1772138748000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11358892\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":98,"URL":"https:\/\/doi.org\/10.1109\/access.2026.3655822","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}