{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T01:52:48Z","timestamp":1761789168552},"reference-count":35,"publisher":"World Scientific Pub Co Pte Lt","issue":"07","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Patt. Recogn. Artif. Intell."],"published-print":{"date-parts":[[2014,11]]},"abstract":"<jats:p> We analyze the problem of designing pattern recognition systems in adversarial settings, under an engineering viewpoint, motivated by their increasing exploitation in security-sensitive applications like spam and malware detection, despite their vulnerability to potential attacks has not yet been deeply understood. We first review previous work and report examples of how a complex system may be evaded either by leveraging on trivial vulnerabilities of its untrained components, e.g. parsing errors in the pre-processing steps, or by exploiting more subtle vulnerabilities of learning algorithms. We then discuss the need of exploiting both reactive and proactive security paradigms complementarily to improve the security by design. Our ultimate goal is to provide some useful guidelines for improving the security of pattern recognition in adversarial settings, and to suggest related open issues to foster research in this area. <\/jats:p>","DOI":"10.1142\/s0218001414600027","type":"journal-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T21:53:49Z","timestamp":1406584429000},"page":"1460002","source":"Crossref","is-referenced-by-count":59,"title":["PATTERN RECOGNITION SYSTEMS UNDER ATTACK: DESIGN ISSUES AND RESEARCH CHALLENGES"],"prefix":"10.1142","volume":"28","author":[{"given":"BATTISTA","family":"BIGGIO","sequence":"first","affiliation":[{"name":"Department of Electrical and Electronic Engineering, University of Cagliari, Piazza d'Armi, 09123 Cagliari, Italy"}]},{"given":"GIORGIO","family":"FUMERA","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, University of Cagliari, Piazza d'Armi, 09123 Cagliari, Italy"}]},{"given":"FABIO","family":"ROLI","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, University of Cagliari, Piazza d'Armi, 09123 Cagliari, Italy"}]}],"member":"219","published-online":{"date-parts":[[2014,10,14]]},"reference":[{"key":"rf3","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193216"},{"key":"rf4","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-011-9280-4"},{"key":"rf7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.42"},{"key":"rf8","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2011.0012"},{"key":"rf11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02300-7_4"},{"key":"rf13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2011.03.022"},{"key":"rf15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03999-7_2"},{"key":"rf17","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-010-0007-7"},{"key":"rf20","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.57"},{"key":"rf21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34166-3_46"},{"key":"rf24","first-page":"2617","volume":"13","author":"Br\u00fcckner M.","year":"2012","journal-title":"J. Mach. Learn. Res."},{"key":"rf25","unstructured":"M.\u00a0Br\u00fcckner and T.\u00a0Scheffer, Advances in Neural Information Processing Systems\u00a022, eds. Y.\u00a0Bengio (MIT Press, 2009)\u00a0pp. 171\u2013179."},{"key":"rf27","first-page":"1007","volume":"5","author":"Christmann A.","year":"2004","journal-title":"J. Mach. Learn. Res."},{"key":"rf29","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemolab.2007.01.004"},{"key":"rf30","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.75"},{"key":"rf32","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-009-5124-8"},{"key":"rf33","volume-title":"Pattern Classification","author":"Duda R. O.","year":"2000"},{"key":"rf36","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.08.022"},{"key":"rf40","series-title":"Probability and Mathematical Statistics","volume-title":"Robust Statistics: The Approach Based on Influence Functions","author":"Hampel F. R.","year":"1986"},{"key":"rf42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"rf44","first-page":"1","volume":"3","author":"Joseph A. D.","year":"2013","journal-title":"Dagstuhl Manifestos"},{"key":"rf45","first-page":"1","author":"Kantarcioglu M.","year":"2010","journal-title":"Data Mining Knowl. Discov."},{"key":"rf49","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5199-2"},{"key":"rf53","doi-asserted-by":"publisher","DOI":"10.1002\/0470010940"},{"key":"rf54","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2011.04.005"},{"key":"rf57","first-page":"1293","volume":"13","author":"Nelson B.","year":"2012","journal-title":"J. Mach. Learn. Res."},{"key":"rf60","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.11.006"},{"key":"rf61","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.06.022"},{"key":"rf63","doi-asserted-by":"crossref","first-page":"639","DOI":"10.3233\/JCS-2010-0410","volume":"19","author":"Rieck K.","year":"2011","journal-title":"J. Comput. Secur."},{"key":"rf64","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2009.01.010"},{"key":"rf65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41822-8_1"},{"key":"rf67","first-page":"65","volume":"4","author":"Rubinstein B. I. P.","year":"2012","journal-title":"J. Privacy Confidentiality"},{"key":"rf68","unstructured":"C. H.\u00a0Teo, Advances in Neural Information Processing Systems, eds. J.\u00a0Platt (MIT Press, Cambridge, MA, 2008)\u00a0pp. 1489\u20131496."},{"key":"rf71","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2012.108"},{"key":"rf72","first-page":"1485","volume":"10","author":"Xu H.","year":"2009","journal-title":"J. Mach. Learn. Res."}],"container-title":["International Journal of Pattern Recognition and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218001414600027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T11:43:54Z","timestamp":1565091834000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218001414600027"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,14]]},"references-count":35,"journal-issue":{"issue":"07","published-online":{"date-parts":[[2014,10,14]]},"published-print":{"date-parts":[[2014,11]]}},"alternative-id":["10.1142\/S0218001414600027"],"URL":"https:\/\/doi.org\/10.1142\/s0218001414600027","relation":{},"ISSN":["0218-0014","1793-6381"],"issn-type":[{"value":"0218-0014","type":"print"},{"value":"1793-6381","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,14]]}}}