{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T18:12:21Z","timestamp":1769796741037,"version":"3.49.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,10]]},"DOI":"10.1109\/nfv-sdn66355.2025.11349410","type":"proceedings-article","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:18:47Z","timestamp":1769721527000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Cloud-based Platform-agnostic Adversarial AI Defence framework"],"prefix":"10.1109","author":[{"given":"George","family":"Petihakis","sequence":"first","affiliation":[{"name":"University of Piraeus,Greece"}]},{"given":"Aristeidis","family":"Farao","sequence":"additional","affiliation":[{"name":"InQbit Innovations SRL.,Romania"}]},{"given":"Vaios","family":"Bolgouras","sequence":"additional","affiliation":[{"name":"Unisystems Luxembourg S&#x00E1;rl,Luxembourg"}]},{"given":"Panagiotis","family":"Bountakas","sequence":"additional","affiliation":[{"name":"University of Piraeus,Greece"}]},{"given":"Aggeliki","family":"Panou","sequence":"additional","affiliation":[{"name":"University of Piraeus,Greece"}]},{"given":"Evangelos","family":"Floros","sequence":"additional","affiliation":[{"name":"Panepistimiako Geniko Nosokomeio Irakleiou,Greece"}]},{"given":"John C.","family":"Polley","sequence":"additional","affiliation":[{"name":"University of South California,USA"}]},{"given":"Christos","family":"Xenakis","sequence":"additional","affiliation":[{"name":"University of Piraeus,Greece"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3544431"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3605086"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref4","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378460"},{"key":"ref8","first-page":"1964","article-title":"Label-only membership inference attacks","volume-title":"International conference on machine learning","author":"Choquette-Choo"},{"key":"ref9","article-title":"Chatgpt is not all you need. a state of the art review of large generative ai models","author":"Gozalo-Brizuela","year":"2023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103054"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/app13127106"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3300381"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00029"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.04.013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/FG57933.2023.10042617"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-38991-8_39"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/int.22510"},{"key":"ref18","article-title":"Adversarial Robustness Toolbox: A Python library for ML Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-023-01723-z"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121220"},{"key":"ref21","first-page":"4525","article-title":"{ML-Doctor}: Holistic risk assessment of inference attacks against machine learning models","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Liu"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3559104"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2021.2008644"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2018.03.242"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2021.103508"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2016.7423520"},{"key":"ref27","first-page":"379","article-title":"Using context-aware workflows for failure management in a smart factory","volume-title":"Proceedings of Fourth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies UBICOMM","author":"Wieland"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3664476.3669919"},{"key":"ref29","article-title":"Introducing Attack Range v3.0","year":"2023"},{"key":"ref30","article-title":"By Microsoft Corporation"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.34190\/iccws.17.1.18"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00741-8"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3664476.3669921"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/s21082686"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-76459-2_32"}],"event":{"name":"2025 IEEE Conference on Network Function Virtualization and Software-Defined Networking (NFV-SDN)","location":"Athens, Greece","start":{"date-parts":[[2025,11,10]]},"end":{"date-parts":[[2025,11,12]]}},"container-title":["2025 IEEE Conference on Network Function Virtualization and Software-Defined Networking (NFV-SDN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11349354\/11349357\/11349410.pdf?arnumber=11349410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T07:26:45Z","timestamp":1769758005000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11349410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,10]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/nfv-sdn66355.2025.11349410","relation":{},"subject":[],"published":{"date-parts":[[2025,11,10]]}}}