{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T18:25:26Z","timestamp":1771525526722,"version":"3.50.1"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000181","name":"AFOSR","doi-asserted-by":"publisher","award":["FA9550-09-1-0049"],"award-info":[{"award-number":["FA9550-09-1-0049"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-0910711"],"award-info":[{"award-number":["CNS-0910711"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-0953884"],"award-info":[{"award-number":["CNS-0953884"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005156","name":"Alexander von Humboldt Foundation","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100005156","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/tifs.2017.2718494","type":"journal-article","created":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T18:36:37Z","timestamp":1498070197000},"page":"3094-3109","source":"Crossref","is-referenced-by-count":39,"title":["A Game-Theoretic Analysis of Adversarial Classification"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5547-667X","authenticated-orcid":false,"given":"Lemonia","family":"Dritsoula","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Loiseau","sequence":"additional","affiliation":[]},{"given":"John","family":"Musacchio","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1111\/1467-937X.00249"},{"key":"ref38","first-page":"549","article-title":"Near-optimal evasion of convex-inducing classifiers","author":"nelson","year":"2010","journal-title":"Proc AISTATS"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0060-x"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90029-5"},{"key":"ref31","author":"luenberger","year":"2003","journal-title":"Linear and Nonlinear Programming"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081950"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-88735-7_2"},{"key":"ref36","article-title":"Non-cooperative games","author":"nash","year":"1950"},{"key":"ref35","article-title":"A price leadership method for solving the inspector&#x2019;s non-constant sum game","author":"maschler","year":"1966"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480742"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44851-9_16"},{"key":"ref27","first-page":"1","article-title":"Scalable optimization of randomized operational decisions in adversarial classification settings","author":"li","year":"2015","journal-title":"Proc AISTATS"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1190195.1190198"},{"key":"ref2","author":"alpcan","year":"2010","journal-title":"Network Security A Decision and Game-Theoretic Approach"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2003.1273013"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S1574-0005(05)80009-8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143889"},{"key":"ref21","author":"fudenberg","year":"1991","journal-title":"Game Theory"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301325"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"ref26","first-page":"297","article-title":"Stackelberg vs. nash in security games: An extended investigation of interchangeability, equivalence, and uniqueness","volume":"41","author":"korzhyk","year":"2011","journal-title":"J Artif Int Res"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/800057.808695"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.0030116"},{"key":"ref51","first-page":"195","article-title":"Trafficking fraudulent accounts: The role of the underground market in Twitter spam and abuse","author":"thomas","year":"2013","journal-title":"Proc USENIX Security07"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339697"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973440.106"},{"key":"ref55","first-page":"239","article-title":"Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers","author":"wang","year":"2014","journal-title":"Proc USENIX Security07"},{"key":"ref54","first-page":"485","article-title":"Optimal randomized classification in adversarial settings","author":"vorobeychik","year":"2014","journal-title":"Proc AAMAS"},{"key":"ref53","author":"tsai","year":"2009","journal-title":"Machine Learning in Cyber Trust Security Privacy and Reliability"},{"key":"ref52","author":"tirole","year":"1988","journal-title":"The Theory of Industrial Organization"},{"key":"ref10","first-page":"171","article-title":"Nash equilibria of static prediction games","author":"br\u00fcckner","year":"2009","journal-title":"Proc NIPS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020495"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/BF01763252"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2019154"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1516512.1516516"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25280-8_2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014066"},{"key":"ref16","article-title":"A sampling inspection problem in arms control agreements: A game-theoretic analysis","author":"dresher","year":"1962"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6426808"},{"key":"ref18","first-page":"78","article-title":"Computing the Nash equilibria of intruder classification games","author":"dritsoula","year":"2012","journal-title":"Proc GameSec"},{"key":"ref19","author":"dritsoula","year":"2017","journal-title":"A gametheoretic analysis of adversarial classification"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511804779","author":"barber","year":"2012","journal-title":"Bayesian Reasoning and Machine Learning"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S1574-0005(02)03014-X"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2325571"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2237397"},{"key":"ref8","author":"bradley","year":"1977","journal-title":"Applied Mathematical Programming"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031"},{"key":"ref9","first-page":"2617","article-title":"Static prediction games for adversarial learning problems","volume":"13","author":"br\u00fcckner","year":"2012","journal-title":"J Mach Learn Res"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref45","author":"sierksma","year":"2002","journal-title":"Linear and Integer Programming Theory and Practice"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504731"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288237"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.2307\/2938166"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.35"},{"key":"ref44","author":"sebe","year":"2005","journal-title":"Machine Learning in Computer Vision"},{"key":"ref43","article-title":"Game theoretic optimization of detecting malicious behavior","author":"samusevich","year":"2016"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/10206\/8017695\/7954621-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8017695\/07954621.pdf?arnumber=7954621","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T22:59:28Z","timestamp":1659135568000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7954621\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":57,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2017.2718494","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12]]}}}