{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:33:37Z","timestamp":1774539217202,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,4]],"date-time":"2009-11-04T00:00:00Z","timestamp":1257292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,4]]},"DOI":"10.1145\/1644893.1644895","type":"proceedings-article","created":{"date-parts":[[2009,11,4]],"date-time":"2009-11-04T18:29:35Z","timestamp":1257359375000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":206,"title":["ANTIDOTE"],"prefix":"10.1145","author":[{"given":"Benjamin I.P.","family":"Rubinstein","sequence":"first","affiliation":[{"name":"University of California - Berkeley, Berkeley, CA, USA"}]},{"given":"Blaine","family":"Nelson","sequence":"additional","affiliation":[{"name":"University of California - Berkeley, Berkeley, CA, USA"}]},{"given":"Ling","family":"Huang","sequence":"additional","affiliation":[{"name":"Intel Labs Berkeley, Berkeley, CA, USA"}]},{"given":"Anthony D.","family":"Joseph","sequence":"additional","affiliation":[{"name":"University of California - Berkeley, and Intel Labs Berkeley, Berkeley, CA, USA"}]},{"given":"Shing-hon","family":"Lau","sequence":"additional","affiliation":[{"name":"University of California - Berkeley, Berkeley, CA, USA"}]},{"given":"Satish","family":"Rao","sequence":"additional","affiliation":[{"name":"University of California - Berkeley, Berkeley, CA, USA"}]},{"given":"Nina","family":"Taft","sequence":"additional","affiliation":[{"name":"Intel Labs Berkeley, Berkeley, CA, USA"}]},{"given":"J. D.","family":"Tygar","sequence":"additional","affiliation":[{"name":"University of California - Berkeley, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282383"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062248"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1137817"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282384"},{"key":"e_1_3_2_1_6_1","volume-title":"Algorithms for projection-pursuit robust principal component analysis. Chemometrics and Intelligent Laboratory Systems, 87(2)","author":"Croux C.","year":"2007","unstructured":"C. Croux , P. Filzmoser , and M. R. Oliveira . Algorithms for projection-pursuit robust principal component analysis. Chemometrics and Intelligent Laboratory Systems, 87(2) , 2007 . C. Croux, P. Filzmoser, and M. R. Oliveira. Algorithms for projection-pursuit robust principal component analysis. Chemometrics and Intelligent Laboratory Systems, 87(2), 2007."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmva.2004.08.002"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014066"},{"key":"e_1_3_2_1_9_1","first-page":"76","author":"Devlin S. J.","year":"1981","unstructured":"S. J. Devlin , R. Gnanadesikan , and J. R. Kettenring . Robust estimation of dispersion matrices and principal components. J. American Statistical Association , 76 , 1981 . S. J. Devlin, R. Gnanadesikan, and J. R. Kettenring. Robust estimation of dispersion matrices and principal components. J. American Statistical Association, 76, 1981.","journal-title":"Robust estimation of dispersion matrices and principal components. J. American Statistical Association"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180414"},{"key":"e_1_3_2_1_11_1","first-page":"4","author":"H\u00f6ssjer O.","year":"1995","unstructured":"O. H\u00f6ssjer and C. Croux . Generalizing univariate signed rank statistics for testing and estimating a multivariate location parameter. J. Nonparametric Statistics , 4 , 1995 . O. H\u00f6ssjer and C. Croux. Generalizing univariate signed rank statistics for testing and estimating a multivariate location parameter. J. Nonparametric Statistics, 4, 1995.","journal-title":"J. Nonparametric Statistics"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. NIPS '06","author":"Huang L.","year":"2007","unstructured":"L. Huang , X. Nguyen , M. Garofalakis , M. Jordan , A. Joseph , and N. Taft . In-network PCA and anomaly detection . In Proc. NIPS '06 , 2007 . L. Huang, X. Nguyen, M. Garofalakis, M. Jordan, A. Joseph, and N. Taft. In-network PCA and anomaly detection. In Proc. NIPS '06, 2007."},{"key":"e_1_3_2_1_13_1","volume-title":"Control procedures for residuals associated with principal component analysis. Technometrics, 21(3)","author":"Jackson J. E.","year":"1979","unstructured":"J. E. Jackson and G. S. Mudholkar . Control procedures for residuals associated with principal component analysis. Technometrics, 21(3) , 1979 . J. E. Jackson and G. S. Mudholkar. Control procedures for residuals associated with principal component analysis. Technometrics, 21(3), 1979."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402970"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028813"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015492"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. FloCon 2005 Analysis Workshop","author":"Lakhina A.","year":"2005","unstructured":"A. Lakhina , M. Crovella , and C. Diot . Detecting distributed attacks using network-wide flow traffic . In Proc. FloCon 2005 Analysis Workshop , 2005 . A. Lakhina, M. Crovella, and C. Diot. Detecting distributed attacks using network-wide flow traffic. In Proc. FloCon 2005 Analysis Workshop, 2005."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080118"},{"key":"e_1_3_2_1_19_1","first-page":"80","author":"Li G.","year":"1985","unstructured":"G. Li and Z. Chen . Projection-pursuit approach to robust dispersion matrices and principal components: primary theory and Monte Carlo. J. American Statistical Association , 80 , 1985 . G. Li and Z. Chen. Projection-pursuit approach to robust dispersion matrices and principal components: primary theory and Monte Carlo. J. American Statistical Association, 80, 1985.","journal-title":"J. American Statistical Association"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177099"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. INFOCOM","author":"Li X.","year":"2006","unstructured":"X. Li , F. Bian , H. Zhang , C. Diot , R. Govindan , W. Hong , and C. Iannaccone . MIND: A distributed multidimensional indexing for network diagnosis . In Proc. INFOCOM , 2006 . X. Li, F. Bian, H. Zhang, C. Diot, R. Govindan, W. Hong, and C. Iannaccone. MIND: A distributed multidimensional indexing for network diagnosis. In Proc. INFOCOM, 2006."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081950"},{"key":"e_1_3_2_1_23_1","volume-title":"Principal components and orthogonal regression based on robust scales. Technometrics, 47(3)","author":"Maronna R.","year":"2005","unstructured":"R. Maronna . Principal components and orthogonal regression based on robust scales. Technometrics, 47(3) , 2005 . R. Maronna. Principal components and orthogonal regression based on robust scales. Technometrics, 47(3), 2005."},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. LEET","author":"Nelson B.","year":"2008","unstructured":"B. Nelson , M. Barreno , F. J. Chi , A. D. Joseph , B. I. P. Rubinstein , U. Saini , C. Sutton , J. D. Tygar , and K. Xia . Exploiting machine learning to subvert your spam filter . In Proc. LEET , 2008 . B. Nelson, M. Barreno, F. J. Chi, A. D. Joseph, B. I. P. Rubinstein, U. Saini, C. Sutton, J. D. Tygar, and K. Xia. Exploiting machine learning to subvert your spam filter. In Proc. LEET, 2008."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.15"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_5"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315288"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254882.1254895"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639562.1639592"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251117"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. NDSS","author":"Venkataraman S.","year":"2008","unstructured":"S. Venkataraman , A. Blum , and D. Song . Limits of learning-based signature generation with adversaries . In Proc. NDSS , 2008 . S. Venkataraman, A. Blum, and D. Song. Limits of learning-based signature generation with adversaries. In Proc. NDSS, 2008."},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. CEAS","author":"Wittel G. L.","year":"2004","unstructured":"G. L. Wittel and S. F. Wu . On attacking statistical spam filters . In Proc. CEAS , 2004 . G. L. Wittel and S. F. Wu. On attacking statistical spam filters. In Proc. CEAS, 2004."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251116"}],"event":{"name":"IMC '09: Internet Measurement Conference","location":"Chicago Illinois USA","acronym":"IMC '09","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Proceedings of the 9th ACM SIGCOMM conference on Internet measurement"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1644893.1644895","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1644893.1644895","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:18Z","timestamp":1750250478000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1644893.1644895"}},"subtitle":["understanding and defending against poisoning of anomaly detectors"],"short-title":[],"issued":{"date-parts":[[2009,11,4]]},"references-count":33,"alternative-id":["10.1145\/1644893.1644895","10.1145\/1644893"],"URL":"https:\/\/doi.org\/10.1145\/1644893.1644895","relation":{},"subject":[],"published":{"date-parts":[[2009,11,4]]},"assertion":[{"value":"2009-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}