{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T05:45:27Z","timestamp":1773467127204,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,22]],"date-time":"2021-03-22T00:00:00Z","timestamp":1616371200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Horizon 2020 research and innovation programme","award":["830927"],"award-info":[{"award-number":["830927"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,22]]},"DOI":"10.1145\/3412841.3441892","type":"proceedings-article","created":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T05:09:16Z","timestamp":1619154556000},"page":"116-125","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Poisoning attacks on cyber attack detectors for industrial control systems"],"prefix":"10.1145","author":[{"given":"Moshe","family":"Kravchik","sequence":"first","affiliation":[{"name":"Ben-Gurion University of the Negev"}]},{"given":"Battista","family":"Biggio","sequence":"additional","affiliation":[{"name":"University of Cagliari"}]},{"given":"Asaf","family":"Shabtai","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev"}]}],"member":"320","published-online":{"date-parts":[[2021,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274748"},{"key":"e_1_3_2_1_2_1","volume-title":"Real-time evasion attacks with physical constraints on deep learning-based anomaly detectors in industrial control systems. arXiv preprint arXiv:1907.07487","author":"Erba Alessandro","year":"2019","unstructured":"Alessandro Erba, Riccardo Taormina, Stefano Galelli, Marcello Pogliani, Michele Carminati, Stefano Zanero, and Nils Ole Tippenhauer. 2019. Real-time evasion attacks with physical constraints on deep learning-based anomaly detectors in industrial control systems. arXiv preprint arXiv:1907.07487 (2019)."},{"key":"e_1_3_2_1_3_1","volume-title":"A deep learning-based framework for conducting stealthy attacks in industrial control systems. arXiv preprint arXiv:1709.06397","author":"Feng Cheng","year":"2017","unstructured":"Cheng Feng, Tingting Li, Zhanxing Zhu, and Deeph Chana. 2017. A deep learning-based framework for conducting stealthy attacks in industrial control systems. arXiv preprint arXiv:1709.06397 (2017)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/524"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2709310"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3203245"},{"key":"e_1_3_2_1_7_1","volume-title":"Khurum Nazir Junejo, and Aditya Mathur","author":"Goh Jonathan","year":"2016","unstructured":"Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, and Aditya Mathur. 2016. A dataset to support research in the design of secure water treatment systems. In Int'l Conference on Critical Information Infrastructures Security. Springer, 88--99."},{"key":"e_1_3_2_1_8_1","volume-title":"18th Int'l Symp. High Assurance Systems Engineering (HASE)","author":"Goh Jonathan","unstructured":"Jonathan Goh, Sridhar Adepu, Marcus Tan, and Zi Shan Lee. 2017. Anomaly detection in cyber physical systems using recurrent neural networks. In 18th Int'l Symp. High Assurance Systems Engineering (HASE). IEEE, 140--145."},{"key":"e_1_3_2_1_9_1","volume-title":"Deep learning","author":"Goodfellow Ian","unstructured":"Ian Goodfellow, Yoshua Bengio, Aaron Courville, and Yoshua Bengio. 2016. Deep learning. Vol. 1. MIT press Cambridge."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359794"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"e_1_3_2_1_12_1","volume-title":"Data Mining Workshops. IEEE, 1058--1065","author":"Inoue Jun","year":"2017","unstructured":"Jun Inoue, Yoriyuki Yamagata, Yuqi Chen, Christopher M Poskitt, and Jun Sun. 2017. Anomaly detection for a water treatment system using unsupervised machine learning. In Int'l Conf. Data Mining Workshops. IEEE, 1058--1065."},{"key":"e_1_3_2_1_13_1","volume-title":"Computer Security","author":"Kim Jonguk","unstructured":"Jonguk Kim, Jeong-Han Yun, and Hyoung Chun Kim. 2019. Anomaly detection for industrial control systems using sequence-to-sequence neural networks. In Computer Security. Springer, 3--18."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264896"},{"key":"e_1_3_2_1_15_1","volume-title":"Efficient cyber attacks detection in industrial control systems using lightweight neural networks. arXiv preprint arXiv:1907.01216","author":"Kravchik Moshe","year":"2019","unstructured":"Moshe Kravchik and Asaf Shabtai. 2019. Efficient cyber attacks detection in industrial control systems using lightweight neural networks. arXiv preprint arXiv:1907.01216 (2019)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196546"},{"key":"e_1_3_2_1_17_1","unstructured":"Dougal Maclaurin David Duvenaud and Ryan Adams. 2015. Gradient-based hyperparameter optimization through reversible learning. In Int'l Conference on Machine Learning. 2113--2122."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190619.3190637"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140451"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809400.1809423"},{"key":"e_1_3_2_1_22_1","volume-title":"Hao Chi Wong, and Antonio Alfredo Ferreira Loureiro.","author":"Pires Waldir Ribeiro","year":"2004","unstructured":"Waldir Ribeiro Pires, Thiago H de Paula Figueiredo, Hao Chi Wong, and Antonio Alfredo Ferreira Loureiro. 2004. Malicious node detection in wireless sensor networks. In 18th Int'l Parallel and Distributed Processing Symp. IEEE, 24."},{"key":"e_1_3_2_1_23_1","volume-title":"Next-Generation CPS Testbed-based Grid Exercise-Synthetic Grid, Attack, and Defense Modeling. In 2020 Resilience Week (RWS)","author":"Ravikumar Gelli","unstructured":"Gelli Ravikumar, Burhan Hyder, and Manimaran Govindarasu. 2020. Next-Generation CPS Testbed-based Grid Exercise-Synthetic Grid, Attack, and Defense Modeling. In 2020 Resilience Week (RWS). IEEE, 92--98."},{"key":"e_1_3_2_1_24_1","volume-title":"Int'l Symp. Res. Attacks, Intrusions, and Defenses","author":"Rosenberg Ishai","unstructured":"Ishai Rosenberg, Asaf Shabtai, Lior Rokach, and Yuval Elovici. 2018. Generic black-box end-to-end attack against state of the art API call based malware classifiers. In Int'l Symp. Res. Attacks, Intrusions, and Defenses. Springer, 490--510."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644895"},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. Sys. 6103--6113","author":"Shafahi Ali","year":"2018","unstructured":"Ali Shafahi, W Ronny Huang, Mahyar Najibi, Octavian Suciu, Christoph Studer, Tudor Dumitras, and Tom Goldstein. 2018. Poison frogs! targeted clean-label poisoning attacks on neural networks. In Adv. Neural Inf. Proc. Sys. 6103--6113."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1368895"},{"key":"e_1_3_2_1_28_1","volume-title":"27th USENIX Sec. Symp. 1299--1316","author":"Suciu Octavian","year":"2018","unstructured":"Octavian Suciu, Radu Marginean, Yigitcan Kaya, Hal Daume III, and Tudor Dumitras. 2018. When does machine learning FAIL? generalized transferability for evasion and poisoning attacks. In 27th USENIX Sec. Symp. 1299--1316."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)WR.1943-5452.0000983"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)WR.1943-5452.0000969"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/201817301010"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3323470"},{"key":"e_1_3_2_1_33_1","volume-title":"Intrusion Detection for Industrial Control Systems: Evaluation Analysis and Adversarial Attacks. arXiv preprint arXiv:1911.04278","author":"Zizzo Giulio","year":"2019","unstructured":"Giulio Zizzo, Chris Hankin, Sergio Maffeis, and Kevin Jones. 2019. Intrusion Detection for Industrial Control Systems: Evaluation Analysis and Adversarial Attacks. arXiv preprint arXiv:1911.04278 (2019)."}],"event":{"name":"SAC '21: The 36th ACM\/SIGAPP Symposium on Applied Computing","location":"Virtual Event Republic of Korea","acronym":"SAC '21","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 36th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412841.3441892","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3412841.3441892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:23Z","timestamp":1750197743000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412841.3441892"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,22]]},"references-count":33,"alternative-id":["10.1145\/3412841.3441892","10.1145\/3412841"],"URL":"https:\/\/doi.org\/10.1145\/3412841.3441892","relation":{},"subject":[],"published":{"date-parts":[[2021,3,22]]},"assertion":[{"value":"2021-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}