{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T16:33:25Z","timestamp":1758818005356},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T00:00:00Z","timestamp":1702512000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T00:00:00Z","timestamp":1702512000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,14]]},"DOI":"10.1109\/wetice57085.2023.10477844","type":"proceedings-article","created":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T18:43:21Z","timestamp":1711651401000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Study on Poisoning Attacks: Application Through an IoT Temperature Dataset"],"prefix":"10.1109","author":[{"given":"Floribert Katembo","family":"Vuseghesa","sequence":"first","affiliation":[{"name":"Univ Lyon, Univ Lyon 2, ERIC,ERIC Laboratory,Bron,France"}]},{"given":"Mohamed-Lamine","family":"Messai","sequence":"additional","affiliation":[{"name":"Univ Lyon, Univ Lyon 2, ERIC,ERIC Laboratory,Bron,France"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Taxonomie des attaques sur les m\u00e9thodes dapprentissage automatique","author":"Djaaleb","year":"2022","journal-title":"Revue des Nouvelles Technologies de lInformation"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118101"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI51031.2022.10022015"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.05.005"},{"key":"ref7","article-title":"A survey on poisoning attacks against supervised machine learning","author":"Qiu","year":"2022","journal-title":"arXiv preprint"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.03.038"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1142\/S1793351X21400043"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10684-2_3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3591197.3591307"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3551636"},{"journal-title":"Openml temperature-readings-iot-devices","year":"2021","author":"Anand","key":"ref13"},{"journal-title":"Openml, iot temperature forecasting, temperature readings: Iot devices","year":"2022","author":"Kohei-Mu","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00477-018-1560-y"},{"volume-title":"Study on Poisoning Attacks: Application through an IoT Temperature Dataset","year":"2023","author":"Vuseghesa","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3374217"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-00123-9_30"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6871"},{"key":"ref20","article-title":"Energy-latency attacks via sponge poisoning","author":"Cina","year":"2022","journal-title":"arXiv preprint"},{"volume-title":"Security and availability of data stored in clouds","year":"2016","author":"Relaza","key":"ref21"},{"volume-title":"Tout sur la s\u00e9curit\u00e9 informatique","year":"2020","author":"Pillou","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10684-2_3"}],"event":{"name":"2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","start":{"date-parts":[[2023,12,14]]},"location":"Paris, France","end":{"date-parts":[[2023,12,16]]}},"container-title":["2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10477677\/10477776\/10477844.pdf?arnumber=10477844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T15:25:36Z","timestamp":1711985136000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10477844\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,14]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/wetice57085.2023.10477844","relation":{},"subject":[],"published":{"date-parts":[[2023,12,14]]}}}