{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:11:28Z","timestamp":1764785488969,"version":"3.28.2"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/fmec62297.2024.10710314","type":"proceedings-article","created":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T17:22:38Z","timestamp":1728926558000},"page":"90-98","source":"Crossref","is-referenced-by-count":1,"title":["AutoML in the Face of Adversity: Securing Mobility Predictions in NWDAF"],"prefix":"10.1109","author":[{"given":"Syafiq Al","family":"Atiiq","sequence":"first","affiliation":[{"name":"Lund University,Lund,Sweden"}]},{"given":"Christian","family":"Gehrmann","sequence":"additional","affiliation":[{"name":"Lund University,Lund,Sweden"}]},{"given":"Yachao","family":"Yuan","sequence":"additional","affiliation":[{"name":"Lund University,Lund,Sweden"}]},{"given":"Jakob","family":"Sternby","sequence":"additional","affiliation":[{"name":"Ericsson Research,Lund,Sweden"}]}],"member":"263","reference":[{"article-title":"Architecture enhancements for 5G System (5GS) to support network data analytics services","volume-title":"3rd Generation Partnership Project, Technical Specification (TS) 23.288","year":"2022","key":"ref1"},{"article-title":"5G System; Network Data Analytics Services; Stage 3","volume-title":"3rd Generation Partnership Project (3GPP), Technical Specification (TS) 29.520","year":"2022","key":"ref2"},{"journal-title":"Capgemini and Intel","article-title":"Project bose - a smart way to enable sustainable 5 g networks","year":"2022","key":"ref3"},{"journal-title":"Oracle","article-title":"Oracle communications network data analytics function (ocnwdaf)","year":"2022","key":"ref4"},{"article-title":"Accelerating the adoption of ai in programmable 5 g networks","year":"2023","author":"Manocha","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom60117.2023.00205"},{"issue":"2","key":"ref7","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1080\/15228053.2022.2074585","article-title":"Automated machine learning (automl): an overview of opportunities for application and research","volume":"24","author":"Singh","year":"2022","journal-title":"Journal of Information Technology Case and Application Research"},{"article-title":"Closing the ai skills gap","year":"2021","author":"Times","key":"ref8"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"106622","DOI":"10.1016\/j.knosys.2020.106622","article-title":"Automl: A survey of the state-of-the-art","volume":"212","author":"He","year":"2021","journal-title":"Knowledge-Based Systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3470918"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93025-1_4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2494218"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17239"},{"article-title":"Amlb: an automl benchmark","year":"2022","author":"Gijsbers","key":"ref14"},{"issue":"1","key":"ref15","first-page":"11936","article-title":"Auto-sklearn 2.0: Hands-free automl via meta-learning","volume":"23","author":"Feurer","year":"2022","journal-title":"The Journal of Machine Learning Research"},{"key":"ref16","article-title":"Autogluon-tabular: Robust and accurate automl for structured data","author":"Erickson","year":"2020","journal-title":"arXiv preprint arXiv:2003.06505"},{"key":"ref17","first-page":"434","article-title":"Flaml: A fast and lightweight automl library","volume-title":"Proceedings of Machine Learning and Systems","volume":"3","author":"Wang","year":"2021"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DSMP.2018.8478522"},{"key":"ref19","article-title":"Multi-fidelity methods for optimization: A survey","author":"Li","year":"2024","journal-title":"arXiv preprint arXiv:2402.09638"},{"key":"ref20","article-title":"Mortal multi-armed bandits","volume-title":"Advances in Neural Information Processing Systems","volume":"21","author":"Chakrabarti","year":"2008"},{"issue":"55","key":"ref21","first-page":"1","article-title":"Neural architecture search: A survey","volume":"20","author":"Elsken","year":"2019","journal-title":"Journal of Machine Learning Research"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2018.8369028"},{"key":"ref23","article-title":"Mobility prediction in wireless ad hoc networks using neural networks","author":"Kaaniche","year":"2010","journal-title":"arXiv preprint arXiv:1004.4610"},{"key":"ref24","article-title":"Mobility prediction using fully-complex extreme learning machines","author":"Ghouti","year":"2014","journal-title":"ESANN"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65726-0_25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.01.031"},{"issue":"1","key":"ref27","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","article-title":"Extreme learning machine: Theory and applications","volume":"70","author":"Huang","year":"2006","journal-title":"Neurocomputing"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.AI.100-2e2023.ipd"},{"key":"ref29","first-page":"1467","article-title":"Poisoning attacks against support vector machines","volume-title":"Proceedings of the 29th International Coference on International Conference on Machine Learning, ser. ICML\u201912. Madison","volume":"2012","author":"Biggio"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"ref33","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv preprint arXiv:1412.6572"},{"key":"ref34","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv preprint arXiv:1312.6199"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773173"},{"key":"ref37","article-title":"Continual learning in practice","author":"Diethe","year":"2018","journal-title":"NeurIPS 2018"},{"key":"ref38","first-page":"1189","article-title":"Practical automated machine learning for the automl challenge 2018","volume-title":"International Workshop on Automatic Machine Learning at ICML","author":"Feurer","year":"2018"},{"key":"ref39","article-title":"Cloning 3g\/4g sim cards with a pc and an oscilloscope: lessons learned in physical security","author":"Liu","year":"2015","journal-title":"BlackHat USA"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24174-6_24"},{"article-title":"Principles of the gdpr","year":"2023","author":"Commission","key":"ref41"},{"article-title":"A framework for simulating mobility patterns in lte","volume-title":"Gitlab","year":"2020","key":"ref42"},{"journal-title":"Airtel","article-title":"Airtel\u2019s open network","year":"2016","key":"ref43"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2939203"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1374688.1374695"},{"article-title":"India walks to work: Census","year":"2016","author":"Rukmini","key":"ref46"}],"event":{"name":"2024 9th International Conference on Fog and Mobile Edge Computing (FMEC)","start":{"date-parts":[[2024,9,2]]},"location":"Malm\u00f6, Sweden","end":{"date-parts":[[2024,9,5]]}},"container-title":["2024 9th International Conference on Fog and Mobile Edge Computing (FMEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10710134\/10710180\/10710314.pdf?arnumber=10710314","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:54:53Z","timestamp":1732668893000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10710314\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/fmec62297.2024.10710314","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}