{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T05:26:32Z","timestamp":1772083592817,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"European Union\u2019s Horizon 2020 Research and Innovation program","award":["830927"],"award-info":[{"award-number":["830927"]}]},{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","award":["NRF2018NCR-NCR005-0001"],"award-info":[{"award-number":["NRF2018NCR-NCR005-0001"]}],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","award":["AISG2-RP-2020-019"],"award-info":[{"award-number":["AISG2-RP-2020-019"]}],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","award":["NRFI06-2020-0022-0001"],"award-info":[{"award-number":["NRFI06-2020-0022-0001"]}],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","award":["NRF2018NCR-NSOE003-0001"],"award-info":[{"award-number":["NRF2018NCR-NSOE003-0001"]}],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tifs.2022.3201377","type":"journal-article","created":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T19:26:21Z","timestamp":1661369181000},"page":"3225-3237","source":"Crossref","is-referenced-by-count":41,"title":["TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack"],"prefix":"10.1109","volume":"17","author":[{"given":"Yam","family":"Sharon","sequence":"first","affiliation":[{"name":"Software and Information Systems Engineering, Ben-Gurion University of the Negev, Be&#x2019;er Sheva, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6428-5234","authenticated-orcid":false,"given":"David","family":"Berend","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Jurong West, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7300-9215","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Jurong West, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0630-4059","authenticated-orcid":false,"given":"Asaf","family":"Shabtai","sequence":"additional","affiliation":[{"name":"Software and Information Systems Engineering, Ben-Gurion University of the Negev, Be&#x2019;er Sheva, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9641-128X","authenticated-orcid":false,"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[{"name":"Software and Information Systems Engineering, Ben-Gurion University of the Negev, Be&#x2019;er Sheva, Israel"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Symantec","year":"2019"},{"key":"ref2","article-title":"Deep learning for anomaly detection: A survey","volume-title":"arXiv:1901.03407","author":"Chalapathy","year":"2019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2912896"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICETET.2008.252"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2021.3087242"},{"key":"ref6","article-title":"Rallying adversarial techniques against deep learning for network security","volume-title":"arXiv:1903.11688","author":"Clements","year":"2019"},{"key":"ref7","article-title":"Adversarial deep learning against intrusion detection classifiers","author":"Rigaki","year":"2017"},{"key":"ref8","article-title":"IDSGAN: Generative adversarial networks for attack generation against intrusion detection","volume-title":"arXiv:1809.02077","author":"Lin","year":"2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INISTA.2018.8466271"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854599"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599759"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1117-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00073"},{"key":"ref15","article-title":"Intriguing properties of neural networks","volume-title":"arXiv:1312.6199","author":"Szegedy","year":"2013"},{"key":"ref16","article-title":"Explaining and harnessing adversarial examples","volume-title":"arXiv:1412.6572","author":"Goodfellow","year":"2014"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11302"},{"key":"ref20","first-page":"237","article-title":"Traffic Morphing: An efficient defense against statistical traffic analysis","volume-title":"Proc. NDSS","author":"Wright"},{"issue":"4","key":"ref21","first-page":"1754","article-title":"Predicting stock prices using LSTM","volume":"6","author":"Roondiwala","year":"2017","journal-title":"Int. J. Sci. Res. (IJSR)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2018.11.061"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3425780"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207034"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133363"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264890"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3182\/20130902-3-cn-3020.00044"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2017.09.021"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref33","volume-title":"Keras","author":"Chollet","year":"2015"},{"key":"ref34","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2016.1257680"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC48688.2020.0-162"},{"key":"ref37","volume-title":"Understanding LSTM networks","author":"Olah","year":"2015"},{"key":"ref38","volume-title":"Scapy documentation","author":"Biondi","year":"2014"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00019"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00020"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9652463\/09865980.pdf?arnumber=9865980","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T03:26:00Z","timestamp":1710386760000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9865980\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/tifs.2022.3201377","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}