{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:25:09Z","timestamp":1763810709432,"version":"3.37.3"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,5]],"date-time":"2021-09-05T00:00:00Z","timestamp":1630800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,5]],"date-time":"2021-09-05T00:00:00Z","timestamp":1630800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,5]],"date-time":"2021-09-05T00:00:00Z","timestamp":1630800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada (NSERC)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,5]]},"DOI":"10.1109\/iscc53001.2021.9631407","type":"proceedings-article","created":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T20:46:50Z","timestamp":1639601210000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Evaluating Resilience of Encrypted Traffic Classification against Adversarial Evasion Attacks"],"prefix":"10.1109","author":[{"given":"Ramy","family":"Maarouf","sequence":"first","affiliation":[]},{"given":"Danish","family":"Sattar","sequence":"additional","affiliation":[]},{"given":"Ashraf","family":"Matrawy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CHINACOM.2007.4469372"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-013-1368-0"},{"journal-title":"Adversarial robustness toolbox v0 2 2","year":"2018","author":"nicolae","key":"ref33"},{"journal-title":"Spyder-documentation","year":"2009","author":"raybaut","key":"ref32"},{"key":"ref31","article-title":"Deep learning (DL) with Python: develop DL models on Theano and TensorFlow using Keras","author":"brownlee","year":"2016","journal-title":"Machine Learning Mastery"},{"key":"ref30","article-title":"Gradientless descent: High-dimensional zeroth-order optimization","author":"golovin","year":"2020","journal-title":"International Conference on Learning Representations"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.066138"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.11.024"},{"journal-title":"How to index slice and reshape numpy arrays for machine learning","year":"0","author":"brownlee","key":"ref35"},{"key":"ref34","first-page":"100","article-title":"Machine learning mastery with python","volume":"527","author":"brownlee","year":"2016","journal-title":"Machine Learning Mastery Pty Ltd"},{"key":"ref10","first-page":"2574","article-title":"Deepfool: a simple and accurate method to fool deep neural networks","author":"moosavi-dezfooli","year":"2016","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICREST.2019.8644161"},{"key":"ref40","first-page":"325","article-title":"Robustness may be at odds with fairness: An empirical study on class-wise accuracy","author":"benz","year":"2021","journal-title":"NeurIPS 2020 Workshop on Preregistration in Machine Learning PMLR"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-019-1211-x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854599"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref17","first-page":"1310","article-title":"A review of supervised machine learning algorithms","author":"singh","year":"2016","journal-title":"3rd International Conference on Computing for Sustainable Global Development"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"2094","DOI":"10.21275\/v5i4.NOV162954","article-title":"A survey on decision tree algorithms of classification in data mining","volume":"5","author":"sharma","year":"2016","journal-title":"International Journal of Science and Research (IJSR)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2007.552"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"ref28","article-title":"Adversarial examples in the physical world","author":"kurakin","year":"2017","journal-title":"ICLR Workshop"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2018.8494096"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2010-343"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2008.15"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.12.002"},{"key":"ref29","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"International Conference on Learning Representations"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2007.4414006"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.8.4.240-248"},{"key":"ref9","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2018","journal-title":"International Conference on Learning Representations"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6135854"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2019.1662133"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2017.8397411"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0197-0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.1995.483329"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126198"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09825-6"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"12016","DOI":"10.1088\/1742-6596\/892\/1\/012016","article-title":"Handling a small dataset problem in prediction model by employ artificial data generation approach: A review","volume":"892","author":"lateh","year":"2017","journal-title":"Journal of Physics Conference Series"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2018.e00938"}],"event":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2021,9,5]]},"location":"Athens, Greece","end":{"date-parts":[[2021,9,8]]}},"container-title":["2021 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9631377\/9631248\/09631407.pdf?arnumber=9631407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:54:26Z","timestamp":1652201666000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9631407\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,5]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/iscc53001.2021.9631407","relation":{},"subject":[],"published":{"date-parts":[[2021,9,5]]}}}