{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:33:29Z","timestamp":1774539209376,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icc.2018.8422328","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T18:51:41Z","timestamp":1534791101000},"page":"1-7","source":"Crossref","is-referenced-by-count":15,"title":["Chronic Poisoning against Machine Learning Based IDSs Using Edge Pattern Detection"],"prefix":"10.1109","author":[{"given":"Pan","family":"Li","sequence":"first","affiliation":[]},{"given":"Qiang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wentao","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Dongxu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Siqi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref11","first-page":"2574","article-title":"Deepfool: A simple and accurate method to fool deep neural networks","author":"moosavidezfooli","year":"2016","journal-title":"Proceedings of CVPR'16"},{"key":"ref12","first-page":"1467","article-title":"Poisoning attacks against support vector machines","author":"biggio","year":"2012","journal-title":"Proceedings of ICMLA '12"},{"key":"ref13","author":"yang","year":"2017","journal-title":"Generative poisoning attack method against neural networks"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/551"},{"key":"ref15","author":"rosenberg","year":"2017","journal-title":"Generic black-box end-to-end attack against rnns and other api calls based malware classifiers"},{"key":"ref16","article-title":"Stealing machine learning models via prediction apis","author":"tram\u00e8r","year":"2016","journal-title":"ArXiv org"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1189","DOI":"10.1109\/TPAMI.2010.188","article-title":"Selecting critical patterns based on local geometrical and statistical informstion","volume":"33","author":"li","year":"2011","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2707463"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.57"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2666652.2666666"},{"key":"ref3","author":"nelson","year":"2009","journal-title":"Misleading Learners Co-opting Your Spam Filter ser Machine Learning in Cyber Trust"},{"key":"ref6","first-page":"405","article-title":"Online anomaly detection under adversarial impact","author":"kloft","year":"2010","journal-title":"Proc AISTATS'10"},{"key":"ref5","author":"hu","year":"2017","journal-title":"Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644895"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2011.70"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2519914"},{"key":"ref9","first-page":"1","article-title":"Automatically evading classifiers: A case study on pdf malware classifiers","author":"xu","year":"2016","journal-title":"Proc of the NDSS'16"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978676"}],"event":{"name":"2018 IEEE International Conference on Communications (ICC 2018)","location":"Kansas City, MO","start":{"date-parts":[[2018,5,20]]},"end":{"date-parts":[[2018,5,24]]}},"container-title":["2018 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8411665\/8422068\/08422328.pdf?arnumber=8422328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T01:58:39Z","timestamp":1598234319000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8422328\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icc.2018.8422328","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}