{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T12:26:50Z","timestamp":1769171210995,"version":"3.49.0"},"reference-count":76,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/iisr.2018.8535799","type":"proceedings-article","created":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T02:18:10Z","timestamp":1542334690000},"page":"158-165","source":"Crossref","is-referenced-by-count":25,"title":["When Machine Learning meets Security Issues: A survey"],"prefix":"10.1109","author":[{"given":"Zhenyu","family":"Guan","sequence":"first","affiliation":[]},{"given":"Liangxu","family":"Bian","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/AIACT.2017.8020076"},{"key":"ref72","article-title":"Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices","author":"spreitzer","year":"2017","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/IIAI-AAI.2016.237"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058358"},{"key":"ref76","article-title":"Proactive Threat Detection for Connected Cars Using Recursive Bayesian Estimation","author":"al-khateeb","year":"2017","journal-title":"IEEE Sensors Journal"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.23919\/IConAC.2017.8082057"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140450"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2968215"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140447"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140455"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140449"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140451"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140445"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140443"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140441"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140456"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2007.368148"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref61","first-page":"197","article-title":"Practical evasion of a learning-based classifier: A case study","author":"laskov","year":"2014","journal-title":"Security and Privacy (SP) 2014 IEEE Symposium on"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LATINCOM.2016.7811562"},{"key":"ref64","author":"gu","year":"2014","journal-title":"Towards deep neural network architectures robust to adversarial examples"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CDAN.2016.7570872"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref66","author":"carlini","year":"2016","journal-title":"Defensive distillation is not robust to adversarial examples"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140444"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2016.32"},{"key":"ref69","article-title":"Multiparty computation from somewhat homomorphic encryption","author":"pastro","year":"2012","journal-title":"Advances in Cryptology-CRYPTO"},{"key":"ref2","first-page":"949","article-title":"Mal-id: Automatic malware detection using common segment analysis and meta-features","volume":"13","author":"tahan","year":"2012","journal-title":"Journal of Machine Learning Research"},{"key":"ref1","first-page":"395","article-title":"Automatic Behaviour-based Analysis and Classification System for Malware Detection","volume":"2","author":"devesa","year":"2010","journal-title":"ICEIS"},{"key":"ref20","article-title":"Designing an Approach for Network Traffic Anomaly Detection","volume":"37","author":"anisheh","year":"2012","journal-title":"International Journal of Computer Applications"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/BSBT.2015.12"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0087"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2011.6014078"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICISSEC.2016.7885853"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.0-120"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/978-3-642-34166-3_46","article-title":"Poisoning adaptive biometric systems","author":"biggio","year":"2012","journal-title":"Joint IAPR International Workshops on Statistical Techniques in Pattern Recognition (SPR) and Structural and Syntactic Pattern Recognition (SSPR)"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001414600027"},{"key":"ref59","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2016.23115","article-title":"Automatically evading classifiers","author":"xu","year":"2016","journal-title":"Proceedings of the 2016 Network and Distributed Systems Symposium"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484327"},{"key":"ref57","author":"itkina","year":"0","journal-title":"Adversarial Attacks on Image Recognition"},{"key":"ref56","first-page":"1","article-title":"Detection of malicious pdf files based on hierarchical document structure","author":"\u0161rndic","year":"2013","journal-title":"Proc 20th Annu Netw Distrib Syst Security Symp"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-88735-7_2"},{"key":"ref54","article-title":"On Attacking Statistical Spam Filters","author":"wittel","year":"2004","journal-title":"CEAS"},{"key":"ref53","first-page":"3681","article-title":"Security analysis of online centroid anomaly detection","volume":"13","author":"kloft","year":"2012","journal-title":"Journal of Machine Learning Research"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2012.11.006"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0334-z"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.030713.00020"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140442"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICOS.2017.8280269"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2875475.2875484"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3102304.3102331"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2015.7275911"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2016.7792480"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511197"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452539"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2012.6193518"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1456377.1456393"},{"key":"ref3","author":"sahoo","year":"2017","journal-title":"Malicious URL detection using machine learning A survey"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140446"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176335"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET.2017.8300169"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613006"},{"key":"ref9","first-page":"373","article-title":"Hybrid solution to detect and filter zero-day phishing attacks","author":"mishra","year":"2014","journal-title":"proceedings of the second international conference on emerging research in computing information communication and applications"},{"key":"ref46","first-page":"91","article-title":"Early assessment of classification performance","volume":"32","author":"brumen","year":"2004","journal-title":"Proceedings of the second workshop on Australasian information security Data Mining and Web Intelligence and Software Internationalisation"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3171592.3171597"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805680"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.03.022"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2666652.2666661"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357672"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702603"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2229012.2229065"}],"event":{"name":"2018 IEEE International Conference on Intelligence and Safety for Robotics (ISR)","location":"Shenyang","start":{"date-parts":[[2018,8,24]]},"end":{"date-parts":[[2018,8,27]]}},"container-title":["2018 IEEE International Conference on Intelligence and Safety for Robotics (ISR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8517202\/8535604\/08535799.pdf?arnumber=8535799","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T20:18:36Z","timestamp":1643228316000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8535799\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":76,"URL":"https:\/\/doi.org\/10.1109\/iisr.2018.8535799","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}