{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T11:02:22Z","timestamp":1775041342098,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T00:00:00Z","timestamp":1669593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T00:00:00Z","timestamp":1669593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,28]]},"DOI":"10.1109\/milcom55135.2022.10017768","type":"proceedings-article","created":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T14:14:24Z","timestamp":1674569664000},"page":"993-998","source":"Crossref","is-referenced-by-count":7,"title":["Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems"],"prefix":"10.1109","author":[{"given":"Samson","family":"Ho","sequence":"first","affiliation":[{"name":"Peraton Labs Inc,Basking Ridge,NJ,USA"}]},{"given":"Achyut","family":"Reddy","sequence":"additional","affiliation":[{"name":"Peraton Labs Inc,Basking Ridge,NJ,USA"}]},{"given":"Sridhar","family":"Venkatesan","sequence":"additional","affiliation":[{"name":"Peraton Labs Inc,Basking Ridge,NJ,USA"}]},{"given":"Rauf","family":"Izmailov","sequence":"additional","affiliation":[{"name":"Peraton Labs Inc,Basking Ridge,NJ,USA"}]},{"given":"Ritu","family":"Chadha","sequence":"additional","affiliation":[{"name":"Peraton Labs Inc,Basking Ridge,NJ,USA"}]},{"given":"Alina","family":"Oprea","sequence":"additional","affiliation":[{"name":"Northeastern University,Boston,MA,USA"}]}],"member":"263","reference":[{"key":"ref10","author":"gu","year":"2017","journal-title":"BadNets Identifying vulnerabilities in the machine learning model supply chain"},{"key":"ref11","article-title":"Subpopulation data poisoning attacks","volume":"abs 2006 14026","author":"jagielski","year":"2020","journal-title":"ArXiv"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.26"},{"key":"ref14","article-title":"Exploiting machine learning to subvert your spam filter","author":"nelson","year":"0","journal-title":"Proc First USENIX Workshop on Large-Scale Exploits and Emergent Threats ser LEET"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644895"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2666652.2666666"},{"key":"ref17","first-page":"1487","article-title":"{Explanation-Guided} backdoor poisoning attacks against malware classifiers","author":"severi","year":"0","journal-title":"30th USENIX Security Symposium (USENIX Security 21)"},{"key":"ref18","article-title":"Lightgbm: A highly efficient gradient boosting decision tree","volume":"30","author":"ke","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref19","article-title":"Ember: an open dataset for training static pe malware machine learning models","author":"anderson","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref4","article-title":"Navigating the solarwinds supply chain attack","volume":"56","author":"wolff","year":"2021","journal-title":"The Procurement Lawyer"},{"key":"ref3","first-page":"69","article-title":"Adversarial machine learning-industry perspectives","author":"kumar","year":"0","journal-title":"2020 IEEE Security and Privacy Workshops (SPW)"},{"key":"ref6","first-page":"1467","article-title":"Poisoning attacks against support vector machines","author":"biggio","year":"2012","journal-title":"Proceedings of the 29th International Coference on International Conference on Machine Learning ser ICML'12"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450066"},{"key":"ref8","article-title":"Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks","author":"shafahi","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref1","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"0","journal-title":"International Conference on Learning Representations"},{"key":"ref9","article-title":"Witches' Brew: Industrial scale data poisoning via gradient matching","author":"geiping","year":"0","journal-title":"9th International Conference on Learning Representations ICLR 2021"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9652916"},{"key":"ref22","article-title":"A unified approach to interpreting model predictions","volume":"30","author":"lundberg","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref21","author":"sistemas","year":"0","journal-title":"VirusTotal"}],"event":{"name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","location":"Rockville, MD, USA","start":{"date-parts":[[2022,11,28]]},"end":{"date-parts":[[2022,12,2]]}},"container-title":["MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10017432\/10017302\/10017768.pdf?arnumber=10017768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T16:59:37Z","timestamp":1676912377000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10017768\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,28]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/milcom55135.2022.10017768","relation":{},"subject":[],"published":{"date-parts":[[2022,11,28]]}}}