{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:46:33Z","timestamp":1750747593969,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/infocomwkshps50562.2020.9162699","type":"proceedings-article","created":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T21:55:09Z","timestamp":1597096509000},"page":"68-73","source":"Crossref","is-referenced-by-count":8,"title":["U-ASG: A Universal Method to Perform Adversarial Attack on Autoencoder based Network Anomaly Detection Systems"],"prefix":"10.1109","author":[{"given":"Chenming","family":"Yang","sequence":"first","affiliation":[]},{"given":"Liang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Adversarial images for variational autoencoders","year":"2016","author":"tabacof","key":"ref10"},{"key":"ref11","article-title":"Auto-encoding variational bayes","author":"kingma","year":"0","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/279232.279236"},{"journal-title":"UCI Machine Learning Repository","year":"2017","author":"dua","key":"ref13"},{"key":"ref14","article-title":"Deep autoencoding gaussian mixture model for unsupervised anomaly detection","author":"zong","year":"0","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2689746.2689747"},{"key":"ref16","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"0","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref17","article-title":"Adversarial examples in the physical world","author":"kurakin","year":"0","journal-title":"International Conference on Learning Representations (ICLR) Workshop Track"},{"key":"ref18","first-page":"3371","article-title":"Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion","volume":"11","author":"vincent","year":"2010","journal-title":"Journal of Machine Learning Research"},{"key":"ref19","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"0","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1921206.1921217"},{"key":"ref8","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"0","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref7","article-title":"Variational autoencoder based anomaly detection using reconstruction probability","volume":"2","author":"an","year":"2015","journal-title":"Special lecture"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"journal-title":"Adversarial attacks on variational autoencoders","year":"2018","author":"gondim-ribeiro","key":"ref9"}],"event":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","start":{"date-parts":[[2020,7,6]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2020,7,9]]}},"container-title":["IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9146478\/9162584\/09162699.pdf?arnumber=9162699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:51:49Z","timestamp":1656453109000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9162699\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/infocomwkshps50562.2020.9162699","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}