{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T23:48:06Z","timestamp":1773791286995,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100009950","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100009950","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130161","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"146-152","source":"Crossref","is-referenced-by-count":0,"title":["Technological Framework for a Secure and Resilient Food Supply Chain"],"prefix":"10.1109","author":[{"given":"Marten","family":"Fischer","sequence":"first","affiliation":[{"name":"University of Applied Sciences,Osnabr&#x00FC;ck,Germany"}]},{"given":"Ralf","family":"T\u00f6njes","sequence":"additional","affiliation":[{"name":"University of Applied Sciences,Osnabr&#x00FC;ck,Germany"}]},{"given":"Rohit","family":"Bohara","sequence":"additional","affiliation":[{"name":"asvin GmbH,Germany"}]},{"given":"Mirko","family":"Ross","sequence":"additional","affiliation":[{"name":"asvin GmbH,Germany"}]},{"given":"Achyut","family":"Hegde","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology KASTEL,Security Research Labs"}]},{"given":"Christian","family":"Wressnegger","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology KASTEL,Security Research Labs"}]},{"given":"Matthias","family":"Brunner","sequence":"additional","affiliation":[{"name":"tsenso GmbH,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541883"},{"key":"ref2","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"Chen","year":"2017","journal-title":"CoRR, abs\/1712.05526"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07134-3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427264"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2019.8666557"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/9780470665121.ch7"},{"key":"ref7","first-page":"1","article-title":"Regulation (EC) No 178\/2002 of the European Parliament and of the Council of 28 January 2002 laying down the general principles and requirements of food law, establishing the European Food Safety Authority and laying down procedures in matters of food safety","journal-title":"2002. OJ L 31, 1.2.2002"},{"key":"ref8","first-page":"18","article-title":"Regulation (EU) No 1169\/2011 of the European Parliament and of the Council of 25 October 2011 on the provision of food information to consumers","author":"Union","year":"2011","journal-title":"OJ L 304, 22.11.2011"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20936-9_24"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3616391.3622764"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-85923-6_1"},{"key":"ref12","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. of the International Conference on Learning Representations (ICLR)","author":"Goodfellow"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767250"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC63791.2024.00081"},{"key":"ref16","article-title":"Backdoor defense via decoupling the training process","volume-title":"Proc. of the International Conference on Learning Representations (ICLR)","author":"Huang"},{"key":"ref17","first-page":"79","article-title":"A performance study of crypto-hardware in the low-end IoT","volume-title":"Proceedings of the 2021 International Conference on Embedded Wireless Systems and Networks, EWSN \u201821","author":"Kietzmann"},{"key":"ref18","article-title":"Anti-backdoor learning: Training clean models on poisoned data","volume-title":"Proc. of the Annual Conference on Neural Information Processing Systems (NeurIPS)","author":"Li"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179308"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00021"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761062"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453108"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1301-5_13"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3066457"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2852563"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23087"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.06.003"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2014.58"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3689932.3694763"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i21.34441"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"Chania, Crete, Greece","start":{"date-parts":[[2025,8,4]]},"end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130161.pdf?arnumber=11130161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T20:16:17Z","timestamp":1773778577000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130161\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130161","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}