{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:34:57Z","timestamp":1763811297168,"version":"build-2065373602"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:00:00Z","timestamp":1698019200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:00:00Z","timestamp":1698019200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,23]]},"DOI":"10.1109\/isncc58260.2023.10323872","type":"proceedings-article","created":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T14:36:01Z","timestamp":1701095761000},"page":"1-7","source":"Crossref","is-referenced-by-count":6,"title":["Detecting Conventional and Adversarial Attacks Using Deep Learning Techniques: A Systematic Review"],"prefix":"10.1109","author":[{"given":"Tarek","family":"Ali","sequence":"first","affiliation":[{"name":"Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,United Kingdom"}]},{"given":"Amna","family":"Eleyan","sequence":"additional","affiliation":[{"name":"Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,United Kingdom"}]},{"given":"Tarek","family":"Bejaoui","sequence":"additional","affiliation":[{"name":"University of Carthage,Computer Engineering Department,Tunisia"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"An Enhanced Phishing Detection Tool Using Deep Learning From URL","volume-title":"2022 International Conference on Smart Applications, Communications and Networking (SmartNets)","author":"Dawabsheh"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2181\/1\/012029"},{"issue":"6","key":"ref3","first-page":"1","volume":"5","author":"Arul","journal-title":"The Authenticity of Information on Social Media"},{"key":"ref4","first-page":"72","volume":"10","author":"Fayyomi","journal-title":"A Survey Paper On Credit Card Fraud Detection Techniques"},{"volume-title":"Evasion Attacks against Machine Learning at Test Time","author":"Biggio","key":"ref5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"issue":"18","key":"ref8","first-page":"5265","volume":"20","author":"Jeong","journal-title":"Malware Detection of Hangul Word Processor Files Using Spatial Pyramid Average Pooling"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.10.052"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-05926-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT45670.2019.8944462"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140450"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/AIPR57179.2022.10092221"},{"issue":"2","key":"ref14","first-page":"190","volume":"12","author":"Ghafoor","journal-title":"Cyber-Malware Defense for Smart Grids Using Machine Learning"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/AIIoT52608.2021.9454214"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3209-9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PAINE49178.2020.9337729"},{"key":"ref18","first-page":"e475","volume":"7","author":"Bilen","journal-title":"Cyber-attack method and perpetrator prediction using machine learning algorithms"},{"key":"ref19","first-page":"31","volume":"10","author":"Das","journal-title":"A Novel Ensemble Model Using Learning Classifiers to Enhance Malware Detection for Cyber Security Systems"},{"issue":"1","key":"ref20","first-page":"71","volume":"66","author":"Mishra","journal-title":"Multilayer Self-defense System to Protect Enterprise Cloud"},{"issue":"01","key":"ref21","first-page":"108","volume":"17","author":"Gamboa-Cruzado","journal-title":"A Comprehensive Systematic Review of Neural Networks and Their Impact on the Detection of Malicious Websites in Network Users"},{"key":"ref22","first-page":"157","article-title":"Forensic Process as a Service (FPaaS) for Cloud Computing","volume-title":"2015 European Intelligence and Security Informatics Conference","author":"Eleyan"},{"volume-title":"The Significance of Machine Learning and Deep Learning Techniques in Cybersecurity: A Comprehensive Review","key":"ref23","first-page":"87"},{"volume-title":"The Threat of Adversarial Attacks on Machine Learning in Network Security - A Survey","author":"Ibitoye","key":"ref24"},{"volume-title":"The Threat of Adversarial Attacks on Machine Learning in Network Security-A Survey","author":"Ibitoye","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00124"},{"volume-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7403-6_11"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.17148\/IJARCCE.2017.64102"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.02.028"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/sym14010161"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1125974"},{"issue":"3","key":"ref35","first-page":"41","volume":"11","author":"Alavizadeh","journal-title":"Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection"},{"volume-title":"Towards evaluating the robustness of neural networks learned by transduction","author":"Chen","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32245-8_34"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2020.2984868"},{"volume-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models","author":"Brendel","key":"ref39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM41954.2020.9281719"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715141"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58568-6_2"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102717"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322472"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371789"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3390\/computers9030058"},{"volume-title":"A survey of black-box adversarial attacks on computer vision models","author":"Bhambri","key":"ref47"},{"volume-title":"Corrattack: Black-box adversarial attack with structured search","author":"Huang","key":"ref48"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00790"}],"event":{"name":"2023 International Symposium on Networks, Computers and Communications (ISNCC)","start":{"date-parts":[[2023,10,23]]},"location":"Doha, Qatar","end":{"date-parts":[[2023,10,26]]}},"container-title":["2023 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10323591\/10323546\/10323872.pdf?arnumber=10323872","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T17:50:24Z","timestamp":1761587424000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10323872\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,23]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/isncc58260.2023.10323872","relation":{},"subject":[],"published":{"date-parts":[[2023,10,23]]}}}