{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:21:47Z","timestamp":1730204507495,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,8]]},"DOI":"10.1109\/ccwc60891.2024.10427598","type":"proceedings-article","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T18:35:29Z","timestamp":1707849329000},"page":"0534-0540","source":"Crossref","is-referenced-by-count":0,"title":["State of the art: Security Testing of Machine Learning Development Systems"],"prefix":"10.1109","author":[{"given":"Saikat","family":"Das","sequence":"first","affiliation":[{"name":"Utah Valley University,Dept. of Computer Science,Orem,USA"}]},{"given":"Bhargavi","family":"Krishnamurthy","sequence":"additional","affiliation":[{"name":"Siddaganga Institute of Technology,Dept. of Computer Science,Tumakuru,Karnataka,India"}]},{"given":"Raktim Ranjan","family":"Das","sequence":"additional","affiliation":[{"name":"Stamford University Bangladesh,Dept. of Computer Science,Dhaka,Bangladesh"}]},{"given":"Sajjan G","family":"Shiva","sequence":"additional","affiliation":[{"name":"University of Memphis,Dept. of Computer Science,Memphis,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2019.00090"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud-EdgeCom49738.2020.00019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2021.3138457"},{"volume-title":"Detection and Explanation of Distributed Denial of Service (DDoS) Attack Through Interpretable Machine Learning.","year":"2021","author":"Das","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON53756.2021.9623251"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON53757.2021.9666619"},{"journal-title":"Law and adversarial machine learning","year":"2018","author":"Kumar","key":"ref7"},{"key":"ref8","article-title":"Security risks of machine learning systems and taxonomy based on the failure mode approach","volume-title":"tech. rep.","author":"Kan","year":"2021"},{"key":"ref9","first-page":"9389","article-title":"Just how toxic is data poisoning? a unified benchmark for backdoor and data poisoning attacks","volume-title":"International Conference on Machine Learning","author":"Schwarzschild"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.09.130"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-021-00671-8"},{"journal-title":"Targeted backdoor attacks on deep learning systems using data poisoning","year":"2017","author":"Chen","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01360"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/647"},{"journal-title":"Covert channel attack to federated learning systems","year":"2021","author":"Costa","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560675"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243757"},{"journal-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models","year":"2017","author":"Brendel","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/BIBM55620.2022.9994898"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464809"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761422"},{"key":"ref24","article-title":"Attacks on machine learning: Lurking danger for accountability","author":"Auernhammer","year":"2019","journal-title":"SafeAI@ AAAI"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00038"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2790928"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/REW.2019.00050"},{"key":"ref28","article-title":"Certified defenses for data poisoning attacks","volume":"30","author":"Steinhardt","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363201"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08284-8"},{"key":"ref31","first-page":"3976","article-title":"Knowledge enhanced machine learning pipeline against diverse adversarial attacks","volume-title":"International Conference on Machine Learning","author":"G\u00fcrel"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140450"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3134599"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2962027"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3207677.3277988"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00368"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SPW50608.2020.00025"}],"event":{"name":"2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)","start":{"date-parts":[[2024,1,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2024,1,10]]}},"container-title":["2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10426790\/10427556\/10427598.pdf?arnumber=10427598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T09:28:50Z","timestamp":1709458130000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10427598\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,8]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/ccwc60891.2024.10427598","relation":{},"subject":[],"published":{"date-parts":[[2024,1,8]]}}}