{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T05:47:21Z","timestamp":1771048041602,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["OAC-1738929"],"award-info":[{"award-number":["OAC-1738929"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3447833","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"29-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Real-Time Evasion Attacks against Deep Learning-Based Anomaly Detection from Distributed System Logs"],"prefix":"10.1145","author":[{"given":"J. Dinal","family":"Herath","sequence":"first","affiliation":[{"name":"State University of New York at Binghamton, Binghamton, NY, USA"}]},{"given":"Ping","family":"Yang","sequence":"additional","affiliation":[{"name":"State University of New York at Binghamton, Binghamton, NY, USA"}]},{"given":"Guanhua","family":"Yan","sequence":"additional","affiliation":[{"name":"State University of New York at Binghamton, Binghamton, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00254"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33019428"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICAS.2019.8771527"},{"key":"e_1_3_2_2_6_1","volume-title":"Information Science and Applications","author":"Breier Jakub","unstructured":"Jakub Breier and Jana Branivs ov\u00e1. 2015. Anomaly detection from log files using data mining techniques . In Information Science and Applications . Springer , 449--457. Jakub Breier and Jana Branivs ov\u00e1. 2015. Anomaly detection from log files using data mining techniques. In Information Science and Applications. Springer, 449--457."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-3128-1"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3217871.3217872"},{"key":"e_1_3_2_2_9_1","volume-title":"Deep learning for anomaly detection: A survey. arXiv preprint arXiv:1901.03407","author":"Chalapathy Raghavendra","year":"2019","unstructured":"Raghavendra Chalapathy and Sanjay Chawla . 2019. Deep learning for anomaly detection: A survey. arXiv preprint arXiv:1901.03407 ( 2019 ). Raghavendra Chalapathy and Sanjay Chawla. 2019. Deep learning for anomaly detection: A survey. arXiv preprint arXiv:1901.03407 (2019)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2004.1301345"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3208040.3208051"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0103"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_2_14_1","volume-title":"Real-time evasion attacks with physical constraints on deep learning-based anomaly detectors in industrial control systems. arXiv preprint arXiv:1907.07487","author":"Erba Alessandro","year":"2019","unstructured":"Alessandro Erba , Riccardo Taormina , Stefano Galelli , Marcello Pogliani , Michele Carminati , Stefano Zanero , and Nils Ole Tippenhauer . 2019. Real-time evasion attacks with physical constraints on deep learning-based anomaly detectors in industrial control systems. arXiv preprint arXiv:1907.07487 ( 2019 ). Alessandro Erba, Riccardo Taormina, Stefano Galelli, Marcello Pogliani, Michele Carminati, Stefano Zanero, and Nils Ole Tippenhauer. 2019. Real-time evasion attacks with physical constraints on deep learning-based anomaly detectors in industrial control systems. arXiv preprint arXiv:1907.07487 (2019)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"e_1_3_2_2_16_1","volume-title":"Real-time adversarial attacks. arXiv preprint arXiv:1905.13399","author":"Gong Yuan","year":"2019","unstructured":"Yuan Gong , Boyang Li , Christian Poellabauer , and Yiyu Shi . 2019. Real-time adversarial attacks. arXiv preprint arXiv:1905.13399 ( 2019 ). Yuan Gong, Boyang Li, Christian Poellabauer, and Yiyu Shi. 2019. Real-time adversarial attacks. arXiv preprint arXiv:1905.13399 (2019)."},{"key":"e_1_3_2_2_17_1","volume-title":"Deep Learning","author":"Goodfellow Ian","unstructured":"Ian Goodfellow , Yoshua Bengio , and Aaron Courville . 2016. Deep Learning . MIT Press . http:\/\/www.deeplearningbook.org. Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning. MIT Press. http:\/\/www.deeplearningbook.org."},{"key":"e_1_3_2_2_18_1","unstructured":"Aarish Grover. 2018. Anomaly Detection for Application Log Data. (2018).  Aarish Grover. 2018. Anomaly Detection for Application Log Data. (2018)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/646111.679466"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"e_1_3_2_2_22_1","volume-title":"RAMP: Real-Time Anomaly Detection in Scientific Workflows. In 2019 IEEE International Conference on Big Data (Big Data). IEEE, 1367--1374","author":"Herath J Dinal","year":"2019","unstructured":"J Dinal Herath , Changxin Bai , Guanhua Yan , Ping Yang , and Shiyong Lu . 2019 . RAMP: Real-Time Anomaly Detection in Scientific Workflows. In 2019 IEEE International Conference on Big Data (Big Data). IEEE, 1367--1374 . J Dinal Herath, Changxin Bai, Guanhua Yan, Ping Yang, and Shiyong Lu. 2019. RAMP: Real-Time Anomaly Detection in Scientific Workflows. In 2019 IEEE International Conference on Big Data (Big Data). IEEE, 1367--1374."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2014.16"},{"key":"e_1_3_2_2_24_1","volume-title":"Amit K Roy Chowdhury, and Ananthram Swami","author":"Li Shasha","year":"2018","unstructured":"Shasha Li , Ajaya Neupane , Sujoy Paul , Chengyu Song , Srikanth V Krishnamurthy , Amit K Roy Chowdhury, and Ananthram Swami . 2018 . Adversarial perturbations against real-time video classification systems. arXiv preprint arXiv:1807.00458 (2018). Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V Krishnamurthy, Amit K Roy Chowdhury, and Ananthram Swami. 2018. Adversarial perturbations against real-time video classification systems. arXiv preprint arXiv:1807.00458 (2018)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.46"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889232"},{"key":"e_1_3_2_2_27_1","volume-title":"Tactics of adversarial attack on deep reinforcement learning agents. arXiv preprint arXiv:1703.06748","author":"Lin Yen-Chen","year":"2017","unstructured":"Yen-Chen Lin , Zhang-Wei Hong , Yuan-Hong Liao , Meng-Li Shih , Ming-Yu Liu , and Min Sun . 2017. Tactics of adversarial attack on deep reinforcement learning agents. arXiv preprint arXiv:1703.06748 ( 2017 ). Yen-Chen Lin, Zhang-Wei Hong, Yuan-Hong Liao, Meng-Li Shih, Ming-Yu Liu, and Min Sun. 2017. Tactics of adversarial attack on deep reinforcement learning agents. arXiv preprint arXiv:1703.06748 (2017)."},{"key":"e_1_3_2_2_28_1","volume-title":"USENIX Annual Technical Conference. 1--14","author":"Lou Jian-Guang","year":"2010","unstructured":"Jian-Guang Lou , Qiang Fu , Shengqi Yang , Ye Xu , and Jiang Li . 2010 . Mining Invariants from Console Logs for System Problem Detection .. In USENIX Annual Technical Conference. 1--14 . Jian-Guang Lou, Qiang Fu, Shengqi Yang, Ye Xu, and Jiang Li. 2010. Mining Invariants from Console Logs for System Problem Detection.. In USENIX Annual Technical Conference. 1--14."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.132"},{"key":"e_1_3_2_2_30_1","volume-title":"CAG: A Real-time Low-cost Enhanced-robustness High-transferability Content-aware Adversarial Attack Generator. arXiv preprint arXiv:1912.07742","author":"Phan Huy","year":"2019","unstructured":"Huy Phan , Yi Xie , Siyu Liao , Jie Chen , and Bo Yuan . 2019 . CAG: A Real-time Low-cost Enhanced-robustness High-transferability Content-aware Adversarial Attack Generator. arXiv preprint arXiv:1912.07742 (2019). Huy Phan, Yi Xie, Siyu Liao, Jie Chen, and Bo Yuan. 2019. CAG: A Real-time Low-cost Enhanced-robustness High-transferability Content-aware Adversarial Attack Generator. arXiv preprint arXiv:1912.07742 (2019)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00465"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.014"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2689746.2689747"},{"key":"e_1_3_2_2_35_1","volume-title":"Prioritized experience replay. arXiv preprint arXiv:1511.05952","author":"Schaul Tom","year":"2015","unstructured":"Tom Schaul , John Quan , Ioannis Antonoglou , and David Silver . 2015. Prioritized experience replay. arXiv preprint arXiv:1511.05952 ( 2015 ). Tom Schaul, John Quan, Ioannis Antonoglou, and David Silver. 2015. Prioritized experience replay. arXiv preprint arXiv:1511.05952 (2015)."},{"key":"e_1_3_2_2_36_1","volume-title":"Reinforcement learning: An introduction","author":"Sutton Richard S","unstructured":"Richard S Sutton and Andrew G Barto . 2018. Reinforcement learning: An introduction . MIT press . Richard S Sutton and Andrew G Barto. 2018. Reinforcement learning: An introduction. MIT press."},{"key":"e_1_3_2_2_37_1","volume-title":"Divide the gradient by a running average of its recent magnitude. COURSERA: Neural networks for machine learning","author":"Tieleman Tijmen","year":"2012","unstructured":"Tijmen Tieleman and Geoffrey Hinton . 2012. Lecture 6.5-rmsprop : Divide the gradient by a running average of its recent magnitude. COURSERA: Neural networks for machine learning , Vol. 4 , 2 ( 2012 ), 26--31. Tijmen Tieleman and Geoffrey Hinton. 2012. Lecture 6.5-rmsprop: Divide the gradient by a running average of its recent magnitude. COURSERA: Neural networks for machine learning, Vol. 4, 2 (2012), 26--31."},{"key":"e_1_3_2_2_38_1","volume-title":"LogGAN: A Sequence-Based Generative Adversarial Network for Anomaly Detection Based on System Logs. In International Conference on Science of Cyber Security. Springer, 61--76","author":"Xia Bin","year":"2019","unstructured":"Bin Xia , Junjie Yin , Jian Xu , and Yun Li . 2019 . LogGAN: A Sequence-Based Generative Adversarial Network for Anomaly Detection Based on System Logs. In International Conference on Science of Cyber Security. Springer, 61--76 . Bin Xia, Junjie Yin, Jian Xu, and Yun Li. 2019. LogGAN: A Sequence-Based Generative Adversarial Network for Anomaly Detection Based on System Logs. In International Conference on Science of Cyber Security. Springer, 61--76."},{"key":"e_1_3_2_2_39_1","volume-title":"arXiv preprint arXiv:2003.02301","author":"Xie Yi","year":"2020","unstructured":"Yi Xie , Cong Shi , Zhuohang Li , Jian Liu , Yingying Chen , and Bo Yuan . 2020. Real-time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems. arXiv preprint arXiv:2003.02301 ( 2020 ). Yi Xie, Cong Shi, Zhuohang Li, Jian Liu, Yingying Chen, and Bo Yuan. 2020. Real-time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems. arXiv preprint arXiv:2003.02301 (2020)."},{"key":"e_1_3_2_2_40_1","volume-title":"Adversarial attacks and defenses in images, graphs and text: A review. arXiv preprint arXiv:1909.08072","author":"Xu Han","year":"2019","unstructured":"Han Xu , Yao Ma , Haochen Liu , Debayan Deb , Hui Liu , Jiliang Tang , and Anil Jain . 2019. Adversarial attacks and defenses in images, graphs and text: A review. arXiv preprint arXiv:1909.08072 ( 2019 ). Han Xu, Yao Ma, Haochen Liu, Debayan Deb, Hui Liu, Jiliang Tang, and Anil Jain. 2019. Adversarial attacks and defenses in images, graphs and text: A review. arXiv preprint arXiv:1909.08072 (2019)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.19"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"e_1_3_2_2_43_1","volume-title":"Adversarial examples: Attacks and defenses for deep learning","author":"Yuan Xiaoyong","year":"2019","unstructured":"Xiaoyong Yuan , Pan He , Qile Zhu , and Xiaolin Li. 2019. Adversarial examples: Attacks and defenses for deep learning . IEEE transactions on neural networks and learning systems, Vol. 30 , 9 ( 2019 ), 2805--2824. Xiaoyong Yuan, Pan He, Qile Zhu, and Xiaolin Li. 2019. Adversarial examples: Attacks and defenses for deep learning. IEEE transactions on neural networks and learning systems, Vol. 30, 9 (2019), 2805--2824."},{"key":"e_1_3_2_2_44_1","volume-title":"ADA: Adaptive Deep Log Anomaly Detector. In IEEE INFOCOM 2020-IEEE Conference on Computer Communications. IEEE, 2449--2458","author":"Yuan Yali","year":"2020","unstructured":"Yali Yuan , Sripriya Srikant Adhatarao , Mingkai Lin , Yachao Yuan , Zheli Liu , and Xiaoming Fu . 2020 . ADA: Adaptive Deep Log Anomaly Detector. In IEEE INFOCOM 2020-IEEE Conference on Computer Communications. IEEE, 2449--2458 . Yali Yuan, Sripriya Srikant Adhatarao, Mingkai Lin, Yachao Yuan, Zheli Liu, and Xiaoming Fu. 2020. ADA: Adaptive Deep Log Anomaly Detector. In IEEE INFOCOM 2020-IEEE Conference on Computer Communications. IEEE, 2449--2458."},{"key":"e_1_3_2_2_45_1","volume-title":"2019 a. Generating textual adversarial examples for deep learning models: A survey. arXiv preprint arXiv:1901.06796","author":"Zhang Wei Emma","year":"2019","unstructured":"Wei Emma Zhang , Quan Z Sheng , and Ahoud Abdulrahmn F Alhazmi . 2019 a. Generating textual adversarial examples for deep learning models: A survey. arXiv preprint arXiv:1901.06796 ( 2019 ). Wei Emma Zhang, Quan Z Sheng, and Ahoud Abdulrahmn F Alhazmi. 2019 a. Generating textual adversarial examples for deep learning models: A survey. arXiv preprint arXiv:1901.06796 (2019)."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","location":"Virtual Event USA","acronym":"CODASPY '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447833","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3422337.3447833","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447833","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447833","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447833"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":46,"alternative-id":["10.1145\/3422337.3447833","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3447833","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}