{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T07:57:44Z","timestamp":1770537464929,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,12]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9927842","type":"proceedings-article","created":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T19:43:02Z","timestamp":1670960582000},"page":"1-8","source":"Crossref","is-referenced-by-count":13,"title":["An XAI-based adversarial training approach for cyber-threat detection"],"prefix":"10.1109","author":[{"given":"Malik","family":"AL-Essa","sequence":"first","affiliation":[{"name":"University of Bari \"Aldo Moro\",Department of Computer Science,Bari,Italy"}]},{"given":"Giuseppina","family":"Andresini","sequence":"additional","affiliation":[{"name":"University of Bari \"Aldo Moro\",Department of Computer Science,Bari,Italy"}]},{"given":"Annalisa","family":"Appice","sequence":"additional","affiliation":[{"name":"University of Bari \"Aldo Moro\",Department of Computer Science,Bari,Italy"}]},{"given":"Donato","family":"Malerba","sequence":"additional","affiliation":[{"name":"University of Bari \"Aldo Moro\",Department of Computer Science,Bari,Italy"}]}],"member":"263","reference":[{"key":"ref10","first-page":"48","article-title":"A survey of transfer learning","volume":"3","author":"weiss","year":"2021","journal-title":"Journal Of Big Data"},{"key":"ref11","volume":"30","author":"lundberg","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/591"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.04.017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/sym13061081"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC49221.2020.9297344"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117144"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88942-5_30"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3474369.3486864"},{"key":"ref19","first-page":"1","article-title":"Achieving explainability of intrusion detection system by hybrid oracle-explainer approach","author":"szczepa?ski","year":"2020","journal-title":"2020 IJCNN"},{"key":"ref4","first-page":"105","volume":"919","author":"andresini","year":"2021","journal-title":"Improving Cyber-Threat Detection by Moving the Boundary Around the Normal Samples ser Studies in Computational Intelligence"},{"key":"ref3","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2018","journal-title":"ICLR 2018 Vancouver Conference Track Proceedings"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcmds.2022.100036"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/info10040122"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28954-6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.02.007"},{"key":"ref2","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"ICLR 2015 - Conference Track Proceedings"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00018"},{"key":"ref1","article-title":"Fast is better than free: Revisiting adversarial training","author":"wong","year":"2020","journal-title":"ICLR Conference Track Proceedings"},{"key":"ref20","article-title":"An explainable machine learning-based network intrusion detection system for enabling generalisability in securing iot networks","author":"sarhan","year":"2021","journal-title":"CoRR"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3117075"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/s22031154"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00009"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-021-09634-4"}],"event":{"name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","location":"Falerna, Italy","start":{"date-parts":[[2022,9,12]]},"end":{"date-parts":[[2022,9,15]]}},"container-title":["2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9927523\/9927699\/09927842.pdf?arnumber=9927842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T20:12:53Z","timestamp":1674504773000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9927842\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9927842","relation":{},"subject":[],"published":{"date-parts":[[2022,9,12]]}}}