{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:40:26Z","timestamp":1730248826167,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,3,10]],"date-time":"2021-03-10T00:00:00Z","timestamp":1615334400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,3,10]],"date-time":"2021-03-10T00:00:00Z","timestamp":1615334400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,3,10]]},"DOI":"10.1109\/icit46573.2021.9453513","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T16:23:57Z","timestamp":1624033437000},"page":"913-918","source":"Crossref","is-referenced-by-count":2,"title":["Performance Evaluation of Adversarial Learning for Anomaly Detection using Mixture Models"],"prefix":"10.1109","author":[{"given":"Yogesh","family":"Pawar","sequence":"first","affiliation":[{"name":"Concordia University,Concordia Institute for Information Systems Engineering (CIISE),Montreal,QC,Canada"}]},{"given":"Manar","family":"Amayri","sequence":"additional","affiliation":[{"name":"Concordia University,Concordia Institute for Information Systems Engineering (CIISE),Montreal,QC,Canada"}]},{"given":"Nizar","family":"Bouguila","sequence":"additional","affiliation":[{"name":"Concordia University,Concordia Institute for Information Systems Engineering (CIISE),Montreal,QC,Canada"}]}],"member":"263","reference":[{"key":"ref33","first-page":"119","author":"tirdad","year":"2015","journal-title":"Variational Learning of Finite Inverted Dirichlet Mixture Models and Applications"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511761546"},{"key":"ref31","first-page":"416","article-title":"Approximating posterior distributions in belief networks using mixtures","volume":"10","author":"bishop","year":"1997","journal-title":"Advances in neural information processing systems"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2715166"},{"key":"ref34","article-title":"Performance evaluation and analysis of geometric area analysis technique for anomaly detection using trapezoidal area estimation based on mixture models","author":"pawar","year":"2020","journal-title":"IEEE International Symposium on Networks Computers and Communications"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.02.024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.834664"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11551188_19"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11510888_5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.08.063"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-012-1094-z"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2004.1334107"},{"year":"0","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.01.007"},{"key":"ref19","article-title":"Learning finite beta-liouville mixture models via variational bayes for proportional data clustering","author":"fan","year":"2013","journal-title":"Twenty-Third International Joint Conference on Artificial Intelligence"},{"key":"ref28","volume":"382","author":"mclachlan","year":"2007","journal-title":"The EM Algorithm and Extensions"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.016"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.02.004"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.12.025"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2012.2190298"},{"article-title":"Towards federated learning at scale: System design","year":"2019","author":"bonawitz","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"ref7","first-page":"321","article-title":"Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks","author":"demontis","year":"2019","journal-title":"28th USENIX Security Symposium ( USENIX Security 19)"},{"key":"ref2","first-page":"67","article-title":"Intrusion detection system for cloud computing","volume":"1","author":"shelke","year":"2012","journal-title":"International Journal of Scientific & Technology Research"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2890808"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987464"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.12.066"},{"article-title":"Adversarial machine learning at scale","year":"2016","author":"kurakin","key":"ref22"},{"key":"ref21","first-page":"619","article-title":"A novel model-based approach for medical image segmentation using spatially constrained inverted dirichlet mixture models","volume":"47","author":"fan","year":"2018","journal-title":"Neural Process Lett"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2018.8560681"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.493"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480828"}],"event":{"name":"2021 22nd IEEE International Conference on Industrial Technology (ICIT)","start":{"date-parts":[[2021,3,10]]},"location":"Valencia, Spain","end":{"date-parts":[[2021,3,12]]}},"container-title":["2021 22nd IEEE International Conference on Industrial Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9453462\/9453463\/09453513.pdf?arnumber=9453513","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T19:32:09Z","timestamp":1659468729000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9453513\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,10]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/icit46573.2021.9453513","relation":{},"subject":[],"published":{"date-parts":[[2021,3,10]]}}}