{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:09:53Z","timestamp":1765544993269,"version":"3.41.2"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2019","62272372","62272379"],"award-info":[{"award-number":["U22B2019","62272372","62272379"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/tdsc.2025.3528993","type":"journal-article","created":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T15:22:34Z","timestamp":1736868154000},"page":"3275-3288","source":"Crossref","is-referenced-by-count":4,"title":["Poisoning Attacks and Defenses to Learned Bloom Filters for Malicious URL Detection"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1846-4236","authenticated-orcid":false,"given":"Fangming","family":"Dong","sequence":"first","affiliation":[{"name":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5779-6108","authenticated-orcid":false,"given":"Pinghui","family":"Wang","sequence":"additional","affiliation":[{"name":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0354-9536","authenticated-orcid":false,"given":"Rundong","family":"Li","sequence":"additional","affiliation":[{"name":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"given":"Xueyao","family":"Cui","sequence":"additional","affiliation":[{"name":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3476-8248","authenticated-orcid":false,"given":"Junzhou","family":"Zhao","sequence":"additional","affiliation":[{"name":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"given":"Jing","family":"Tao","sequence":"additional","affiliation":[{"name":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8706-1372","authenticated-orcid":false,"given":"Chen","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhejiang CreateLink Technology Company Ltd, Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8826-0362","authenticated-orcid":false,"given":"Xiaohong","family":"Guan","sequence":"additional","affiliation":[{"name":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/90.851975"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383060"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2007.012824"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(92)90207-8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129096"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196909"},{"article-title":"Optimizing learned bloom filters by sandwiching","year":"2018","author":"Mitzenmacher","key":"ref8"},{"article-title":"Adaptive learned bloom filter (Ada-BF): Efficient utilization of the classifier with application to real-time information filtering on the web","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Dai","key":"ref9"},{"article-title":"Partitioned learned bloom filters","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Vaidya","key":"ref10"},{"key":"ref11","first-page":"1467","article-title":"Poisoning attacks against support vector machines","volume-title":"Proc. 29th Int. Conf. Mach. Learn.","author":"Biggio"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"ref13","first-page":"201","article-title":"Online data poisoning attacks","volume-title":"Proc. 2nd Conf. Learn. Dyn. Control","author":"Zhang"},{"key":"ref14","first-page":"3520","article-title":"Certified defenses for data poisoning attacks","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst.","author":"Steinhardt"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.26"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3276980"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR52026.2021.9481857"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142477"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407830"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-020-00124-2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2800740"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241142"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00100"},{"article-title":"On the effectiveness of mitigating data poisoning attacks with gradient shaping","year":"2020","author":"Hong","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2022.3156019"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.13"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485368"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.373"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511996"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/2.933515"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3373017.3373020"},{"year":"2022","key":"ref37","article-title":"Safe browsing"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674994"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-020-00149-7"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.06.100344"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972863.4"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261978"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.21"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354235"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269076"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM52442.2021.9615566"},{"key":"ref47","first-page":"5271","article-title":"Meta-learning neural bloom filters","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Rae"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3371158.3371171"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11077775\/10840297.pdf?arnumber=10840297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T22:48:47Z","timestamp":1752274127000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10840297\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":44,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3528993","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}