{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:29:22Z","timestamp":1777656562971,"version":"3.51.4"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/milcom.2018.8599759","type":"proceedings-article","created":{"date-parts":[[2019,1,3]],"date-time":"2019-01-03T23:10:39Z","timestamp":1546557039000},"page":"559-564","source":"Crossref","is-referenced-by-count":87,"title":["Adversarial Examples Against the Deep Learning Based Network Intrusion Detection Systems"],"prefix":"10.1109","author":[{"given":"Kaichen","family":"Yang","sequence":"first","affiliation":[]},{"given":"Jianqing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuguang","family":"Fang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Adversarial examples for malware detection","author":"grosse","year":"2017","journal-title":"Proceedings of the European Symposium on Research in Computer Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0410"},{"key":"ref12","author":"rigaki","year":"0","journal-title":"Adversarial deep learning against intrusion detection classifiers"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854599"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90029-5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1989.118638"},{"key":"ref16","author":"kingma","year":"2014","journal-title":"Adam A method for stochastic optimization"},{"key":"ref17","author":"tramer","year":"2017","journal-title":"The space of transferable adversarial examples"},{"key":"ref18","author":"grosse","year":"2017","journal-title":"On the (statistical) detection of adversarial examples"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref28","year":"2017","journal-title":"cleverhans v2 0 0 an adversarial machine learning library"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.04.019"},{"key":"ref27","author":"abadi","year":"2016","journal-title":"Tensorflow Large-scale machine learning on heterogeneous distributed systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2014.41"},{"key":"ref6","author":"goodfellow","year":"2014","journal-title":"Explaining and Harnessing Adversarial Examples"},{"key":"ref5","author":"szegedy","year":"2013","journal-title":"Intriguing properties of neural networks"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref20","author":"yuan","year":"2017","journal-title":"Adversarial examples Attacks and defenses for deep learning"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref21","author":"kurakin","year":"2016","journal-title":"Adversarial machine learning at scale"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/BF01788562"},{"key":"ref26","article-title":"Wasserstein generative adversarial networks","author":"arjovsky","year":"2017","journal-title":"Proceedings of the International Conference on Machine Learning"},{"key":"ref25","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Proceedings of the Advances in Neural Information Processing Systems"}],"event":{"name":"MILCOM 2018 - IEEE Military Communications Conference","location":"Los Angeles, CA","start":{"date-parts":[[2018,10,29]]},"end":{"date-parts":[[2018,10,31]]}},"container-title":["MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8580348\/8599678\/08599759.pdf?arnumber=8599759","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T00:41:32Z","timestamp":1643157692000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8599759\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/milcom.2018.8599759","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}