{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:41Z","timestamp":1750220681217,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1815883"],"award-info":[{"award-number":["CNS-1815883"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSF","award":["CNS-1562485"],"award-info":[{"award-number":["CNS-1562485"]}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-19-1-0169"],"award-info":[{"award-number":["FA9550-19-1-0169"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3447842","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"53-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Brittle Features of Device Authentication"],"prefix":"10.1145","author":[{"given":"Washington","family":"Garcia","sequence":"first","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Animesh","family":"Chhotaray","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Joseph I.","family":"Choi","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Suman Kalyan","family":"Adari","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Kevin R.B.","family":"Butler","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Somesh","family":"Jha","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2017.8267651"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022821128753"},{"key":"e_1_3_2_2_3_1","unstructured":"Marco V. Barbera Alessandro Epasto Alessandro Mei Sokol Kosta Vasile C. Perta and Julinda Stefa. 2013. CRAWDAD dataset sapienza\/probe-requests (v. 2013-09--10). Downloaded from https:\/\/crawdad.org\/sapienza\/probe-requests\/20130910. https:\/\/doi.org\/10.15783\/C76C7Z  Marco V. Barbera Alessandro Epasto Alessandro Mei Sokol Kosta Vasile C. Perta and Julinda Stefa. 2013. CRAWDAD dataset sapienza\/probe-requests (v. 2013-09--10). Downloaded from https:\/\/crawdad.org\/sapienza\/probe-requests\/20130910. https:\/\/doi.org\/10.15783\/C76C7Z"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23238"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.57"},{"key":"e_1_3_2_2_6_1","volume-title":"Wainwright","author":"Chen Jianbo","year":"2019","unstructured":"Jianbo Chen , Michael I. Jordan , and Martin J . Wainwright . 2019 . HopSkipJumpAttack: A Query-Efficient Decision-Based Attack . (April 2019). arxiv: 1904.02144 http:\/\/arxiv.org\/abs\/1904.02144 Jianbo Chen, Michael I. Jordan, and Martin J. Wainwright. 2019. HopSkipJumpAttack: A Query-Efficient Decision-Based Attack. (April 2019). arxiv: 1904.02144 http:\/\/arxiv.org\/abs\/1904.02144"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"e_1_3_2_2_8_1","volume-title":"Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach. arXiv:1807.04457 [cs, stat] (July","author":"Cheng Minhao","year":"2018","unstructured":"Minhao Cheng , Thong Le , Pin-Yu Chen , Jinfeng Yi , Huan Zhang , and Cho-Jui Hsieh . 2018. Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach. arXiv:1807.04457 [cs, stat] (July 2018 ). http:\/\/arxiv.org\/abs\/1807.04457 arXiv: 1807.04457. Minhao Cheng, Thong Le, Pin-Yu Chen, Jinfeng Yi, Huan Zhang, and Cho-Jui Hsieh. 2018. Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach. arXiv:1807.04457 [cs, stat] (July 2018). http:\/\/arxiv.org\/abs\/1807.04457 arXiv: 1807.04457."},{"key":"e_1_3_2_2_9_1","volume-title":"SIGN-OPT: A QUERY-EFFICIENT HARD-LABEL ADVERSARIAL ATTACK. The International Conference on Learning Representations (ICLR)","author":"Cheng Minhao","year":"2020","unstructured":"Minhao Cheng , Simranjit Singh , Patrick Chen , Pin-Yu Chen , Sijia Liu , and Cho-Jui Hsieh . 2020 . SIGN-OPT: A QUERY-EFFICIENT HARD-LABEL ADVERSARIAL ATTACK. The International Conference on Learning Representations (ICLR) (2020), 16. Minhao Cheng, Simranjit Singh, Patrick Chen, Pin-Yu Chen, Sijia Liu, and Cho-Jui Hsieh. 2020. SIGN-OPT: A QUERY-EFFICIENT HARD-LABEL ADVERSARIAL ATTACK. The International Conference on Learning Representations (ICLR) (2020), 16."},{"key":"e_1_3_2_2_10_1","volume-title":"Certified Adversarial Robustness via Randomized Smoothing. arXiv:1902.02918 [cs, stat] (June","author":"Cohen Jeremy M.","year":"2019","unstructured":"Jeremy M. Cohen , Elan Rosenfeld , and J. Zico Kolter . 2019. Certified Adversarial Robustness via Randomized Smoothing. arXiv:1902.02918 [cs, stat] (June 2019 ). http:\/\/arxiv.org\/abs\/1902.02918 arXiv: 1902.02918. Jeremy M. Cohen, Elan Rosenfeld, and J. Zico Kolter. 2019. Certified Adversarial Robustness via Randomized Smoothing. arXiv:1902.02918 [cs, stat] (June 2019). http:\/\/arxiv.org\/abs\/1902.02918 arXiv: 1902.02918."},{"key":"e_1_3_2_2_11_1","volume-title":"Wireless Personal Communications","volume":"97","author":"Dalai Asish Kumar","year":"2017","unstructured":"Asish Kumar Dalai ,, and Sanjay Kumar Jena . 2017 . WDTF: A Technique for Wireless Device Type Fingerprinting . Wireless Personal Communications , Vol. 97 (2017). https:\/\/doi.org\/10.1007\/s11277-017--4652-y Asish Kumar Dalai,, and Sanjay Kumar Jena. 2017. WDTF: A Technique for Wireless Device Type Fingerprinting. Wireless Personal Communications, Vol. 97 (2017). https:\/\/doi.org\/10.1007\/s11277-017--4652-y"},{"key":"e_1_3_2_2_12_1","volume-title":"IPSN '09 Proceedings of the 2009 International Conference on Information","author":"Danev Boris","year":"2009","unstructured":"Boris Danev and Srdjan Capkun . 2009 . Transient-based identification of wireless sensor nodes . IPSN '09 Proceedings of the 2009 International Conference on Information (2009), 25--36. https:\/\/doi.org\/10.1145\/1602165.1602170 Boris Danev and Srdjan Capkun. 2009. Transient-based identification of wireless sensor nodes. IPSN '09 Proceedings of the 2009 International Conference on Information (2009), 25--36. https:\/\/doi.org\/10.1145\/1602165.1602170"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Hung Dang Yue Huang and Ee-Chien Chang. 2017. Evading Classifiers by Morphing in the Dark. (2017). https:\/\/doi.org\/10.1145\/3133956.3133978  Hung Dang Yue Huang and Ee-Chien Chang. 2017. Evading Classifiers by Morphing in the Dark. (2017). https:\/\/doi.org\/10.1145\/3133956.3133978","DOI":"10.1145\/3133956.3133978"},{"key":"e_1_3_2_2_14_1","volume-title":"Explanations can be manipulated and geometry is to blame. arXiv:1906.07983 [cs, stat] (June","author":"Dombrowski Ann-Kathrin","year":"2019","unstructured":"Ann-Kathrin Dombrowski , Maximilian Alber , Christopher J. Anders , Marcel Ackermann , Klaus-Robert M\u00fcller , and Pan Kessel . 2019. Explanations can be manipulated and geometry is to blame. arXiv:1906.07983 [cs, stat] (June 2019 ). http:\/\/arxiv.org\/abs\/1906.07983 arXiv: 1906.07983. Ann-Kathrin Dombrowski, Maximilian Alber, Christopher J. Anders, Marcel Ackermann, Klaus-Robert M\u00fcller, and Pan Kessel. 2019. Explanations can be manipulated and geometry is to blame. arXiv:1906.07983 [cs, stat] (June 2019). http:\/\/arxiv.org\/abs\/1906.07983 arXiv: 1906.07983."},{"key":"e_1_3_2_2_15_1","volume-title":"Learning Perceptually-Aligned Representations via Adversarial Robustness. arXiv:1906.00945 [cs, stat] (June","author":"Engstrom Logan","year":"2019","unstructured":"Logan Engstrom , Andrew Ilyas , Shibani Santurkar , Dimitris Tsipras , Brandon Tran , and Aleksander Madry . 2019. Learning Perceptually-Aligned Representations via Adversarial Robustness. arXiv:1906.00945 [cs, stat] (June 2019 ). http:\/\/arxiv.org\/abs\/1906.00945 arXiv: 1906.00945. Logan Engstrom, Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Brandon Tran, and Aleksander Madry. 2019. Learning Perceptually-Aligned Representations via Adversarial Robustness. arXiv:1906.00945 [cs, stat] (June 2019). http:\/\/arxiv.org\/abs\/1906.00945 arXiv: 1906.00945."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2502081.2502121"},{"key":"e_1_3_2_2_17_1","volume-title":"Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things. IEEE International Conference on Communications","volume":"10","author":"Ferdowsi Aidin","year":"2018","unstructured":"Aidin Ferdowsi and Walid Saad . 2018 . Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things. IEEE International Conference on Communications , Vol. 2018-May (2018). https:\/\/doi.org\/ 10 .1109\/ICC.2018.8422728 arxiv: 1711.01306 Aidin Ferdowsi and Walid Saad. 2018. Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things. IEEE International Conference on Communications, Vol. 2018-May (2018). https:\/\/doi.org\/10.1109\/ICC.2018.8422728 arxiv: 1711.01306"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the International Conference on Learning Representations (ICLR).","author":"Goodfellow Ian","year":"2015","unstructured":"Ian Goodfellow , Jonathon Shlens , and Christian Szegedy . 2015 . Explaining and Harnessing Adversarial Examples . In Proceedings of the International Conference on Learning Representations (ICLR). Ian Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In Proceedings of the International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243792"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_2_22_1","volume-title":"Natural Adversarial Examples. (2019). arxiv","author":"Hendrycks Dan","year":"1907","unstructured":"Dan Hendrycks , Kevin Zhao , Steven Basart , Jacob Steinhardt , and Dawn Song . 2019. Natural Adversarial Examples. (2019). arxiv : 1907 .07174 Dan Hendrycks, Kevin Zhao, Steven Basart, Jacob Steinhardt, and Dawn Song. 2019. Natural Adversarial Examples. (2019). arxiv: 1907.07174"},{"key":"e_1_3_2_2_23_1","volume-title":"PassGAN: A Deep Learning Approach for Password Guessing. arXiv:1709.00440 [cs, stat] (Feb","author":"Hitaj Briland","year":"2019","unstructured":"Briland Hitaj , Paolo Gasti , Giuseppe Ateniese , and Fernando Perez-Cruz . 2019. PassGAN: A Deep Learning Approach for Password Guessing. arXiv:1709.00440 [cs, stat] (Feb . 2019 ). http:\/\/arxiv.org\/abs\/1709.00440 arXiv: 1709.00440. Briland Hitaj, Paolo Gasti, Giuseppe Ateniese, and Fernando Perez-Cruz. 2019. PassGAN: A Deep Learning Approach for Password Guessing. arXiv:1709.00440 [cs, stat] (Feb. 2019). http:\/\/arxiv.org\/abs\/1709.00440 arXiv: 1709.00440."},{"key":"e_1_3_2_2_24_1","volume-title":"Density and Distance Distributions. In 2013 IEEE 13th International Conference on Data Mining Workshops. 468--473","author":"Houle Michael E.","year":"2013","unstructured":"Michael E. Houle . 2013 . Dimensionality, Discriminability , Density and Distance Distributions. In 2013 IEEE 13th International Conference on Data Mining Workshops. 468--473 . https:\/\/doi.org\/10.1109\/ICDMW.2013.139 Michael E. Houle. 2013. Dimensionality, Discriminability, Density and Distance Distributions. In 2013 IEEE 13th International Conference on Data Mining Workshops. 468--473. https:\/\/doi.org\/10.1109\/ICDMW.2013.139"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485917"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711469"},{"key":"e_1_3_2_2_27_1","volume-title":"Joseph","author":"Kantchelian Alex","year":"2015","unstructured":"Alex Kantchelian , J. D. Tygar , and Anthony D . Joseph . 2015 . Evasion and Hardening of Tree Ensemble Classifiers . (2015). arxiv: 1509.07892 http:\/\/arxiv.org\/abs\/1509.07892 Alex Kantchelian, J. D. Tygar, and Anthony D. Joseph. 2015. Evasion and Hardening of Tree Ensemble Classifiers. (2015). arxiv: 1509.07892 http:\/\/arxiv.org\/abs\/1509.07892"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"e_1_3_2_2_29_1","volume-title":"Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality. arXiv:1801.02613 [cs] (March","author":"Ma Xingjun","year":"2018","unstructured":"Xingjun Ma , Bo Li , Yisen Wang , Sarah M. Erfani , Sudanthi Wijewickrema , Grant Schoenebeck , Dawn Song , Michael E. Houle , and James Bailey . 2018. Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality. arXiv:1801.02613 [cs] (March 2018 ). http:\/\/arxiv.org\/abs\/1801.02613 arXiv: 1801.02613. Xingjun Ma, Bo Li, Yisen Wang, Sarah M. Erfani, Sudanthi Wijewickrema, Grant Schoenebeck, Dawn Song, Michael E. Houle, and James Bailey. 2018. Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality. arXiv:1801.02613 [cs] (March 2018). http:\/\/arxiv.org\/abs\/1801.02613 arXiv: 1801.02613."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMAPP.2018.8460440"},{"key":"e_1_3_2_2_31_1","volume-title":"Juan Davis Guarnizo, and Yuval Elovici.","author":"Meidan Yair","year":"2017","unstructured":"Yair Meidan , Michael Bohadana , Asaf Shabtai , Martin Ochoa , Nils Ole Tippenhauer , Juan Davis Guarnizo, and Yuval Elovici. 2017 . Detection of Unauthorized IoT Devices Using Machine Learning Techniques . (2017). https:\/\/doi.org\/10.1002\/prot.21521 arxiv: 1709.04647 Yair Meidan, Michael Bohadana, Asaf Shabtai, Martin Ochoa, Nils Ole Tippenhauer, Juan Davis Guarnizo, and Yuval Elovici. 2017. Detection of Unauthorized IoT Devices Using Machine Learning Techniques. (2017). https:\/\/doi.org\/10.1002\/prot.21521 arxiv: 1709.04647"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2796446"},{"key":"e_1_3_2_2_33_1","volume-title":"Proceedings - International Conference on Distributed Computing Systems. 2511--2514","author":"Miettinen Markus","year":"2017","unstructured":"Markus Miettinen , Samuel Marchal , Ibbad Hafeez , Tommaso Frassetto , N Asokan , Ahmad Reza Sadeghi , and Sasu Tarkoma . 2017 . IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT . In Proceedings - International Conference on Distributed Computing Systems. 2511--2514 . https:\/\/doi.org\/10.1109\/ICDCS.2017.284 arxiv: 1611.04880 Markus Miettinen, Samuel Marchal, Ibbad Hafeez, Tommaso Frassetto, N Asokan, Ahmad Reza Sadeghi, and Sasu Tarkoma. 2017. IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT. In Proceedings - International Conference on Distributed Computing Systems. 2511--2514. https:\/\/doi.org\/10.1109\/ICDCS.2017.284 arxiv: 1611.04880"},{"key":"e_1_3_2_2_34_1","volume-title":"Finger-GAN: Generating Realistic Fingerprint Images Using Connectivity Imposed GAN. arXiv:1812.10482 [cs] (Dec","author":"Minaee Shervin","year":"2018","unstructured":"Shervin Minaee and Amirali Abdolrashidi . 2018. Finger-GAN: Generating Realistic Fingerprint Images Using Connectivity Imposed GAN. arXiv:1812.10482 [cs] (Dec . 2018 ). http:\/\/arxiv.org\/abs\/1812.10482 arXiv: 1812.10482. Shervin Minaee and Amirali Abdolrashidi. 2018. Finger-GAN: Generating Realistic Fingerprint Images Using Connectivity Imposed GAN. arXiv:1812.10482 [cs] (Dec. 2018). http:\/\/arxiv.org\/abs\/1812.10482 arXiv: 1812.10482."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10208-015-9296-2"},{"key":"e_1_3_2_2_36_1","unstructured":"Nicholas Papernot and contributors. 2019. Cleverhans. https:\/\/github.com\/tensorflow\/cleverhans.  Nicholas Papernot and contributors. 2019. Cleverhans. https:\/\/github.com\/tensorflow\/cleverhans."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_2_2_39_1","volume-title":"SoK: Security and Privacy in Machine Learning. In 2018 IEEE European Symposium on Security and Privacy (EuroS P). 399--414","author":"Papernot N.","year":"2018","unstructured":"N. Papernot , P. McDaniel , A. Sinha , and M. P. Wellman . 2018 . SoK: Security and Privacy in Machine Learning. In 2018 IEEE European Symposium on Security and Privacy (EuroS P). 399--414 . https:\/\/doi.org\/10.1109\/EuroSP. 2018 .00035 N. Papernot, P. McDaniel, A. Sinha, and M. P. Wellman. 2018. SoK: Security and Privacy in Machine Learning. In 2018 IEEE European Symposium on Security and Privacy (EuroS P). 399--414. https:\/\/doi.org\/10.1109\/EuroSP.2018.00035"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369033"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2009.01.010"},{"volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Sharif Mahmood","key":"e_1_3_2_2_43_1","unstructured":"Mahmood Sharif , Sruti Bhagavatula , Lujo Bauer , and Michael K. Reiter . 2016. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition . In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, and Michael K. Reiter. 2016. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_2_44_1","volume-title":"How can we fool LIME and SHAP? Adversarial Attacks on Post hoc Explanation Methods. (Nov","author":"Slack Dylan","year":"2019","unstructured":"Dylan Slack , Sophie Hilgard , Emily Jia , Sameer Singh , and Himabindu Lakkaraju . 2019. How can we fool LIME and SHAP? Adversarial Attacks on Post hoc Explanation Methods. (Nov . 2019 ). arxiv: 1911.02508 http:\/\/arxiv.org\/abs\/1911.02508 Dylan Slack, Sophie Hilgard, Emily Jia, Sameer Singh, and Himabindu Lakkaraju. 2019. How can we fool LIME and SHAP? Adversarial Attacks on Post hoc Explanation Methods. (Nov. 2019). arxiv: 1911.02508 http:\/\/arxiv.org\/abs\/1911.02508"},{"key":"e_1_3_2_2_45_1","volume-title":"Danilo Vasconcellos Vargas, and Sakurai Kouichi","author":"Su Jiawei","year":"2017","unstructured":"Jiawei Su , Danilo Vasconcellos Vargas, and Sakurai Kouichi . 2017 . One pixel attack for fooling deep neural networks. (2017). arxiv: 1710.08864 http:\/\/arxiv.org\/abs\/1710.08864 Jiawei Su, Danilo Vasconcellos Vargas, and Sakurai Kouichi. 2017. One pixel attack for fooling deep neural networks. (2017). arxiv: 1710.08864 http:\/\/arxiv.org\/abs\/1710.08864"},{"key":"e_1_3_2_2_46_1","volume-title":"Porceedings of the International Conference on Learning Representations (ICLR).","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2014 . Intriguing properties of neural networks . In Porceedings of the International Conference on Learning Representations (ICLR). Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In Porceedings of the International Conference on Learning Representations (ICLR)."},{"volume-title":"CRAWDAD dataset gatech\/fingerprinting (v. 2014-06-09). Downloaded from https:\/\/crawdad.org\/gatech\/fingerprinting\/20140609. https:\/\/doi.org\/10.15783\/C78G67","author":"Uluagac A. Selcuk","key":"e_1_3_2_2_47_1","unstructured":"A. Selcuk Uluagac . 2014. CRAWDAD dataset gatech\/fingerprinting (v. 2014-06-09). Downloaded from https:\/\/crawdad.org\/gatech\/fingerprinting\/20140609. https:\/\/doi.org\/10.15783\/C78G67 A. Selcuk Uluagac. 2014. CRAWDAD dataset gatech\/fingerprinting (v. 2014-06-09). Downloaded from https:\/\/crawdad.org\/gatech\/fingerprinting\/20140609. https:\/\/doi.org\/10.15783\/C78G67"},{"key":"e_1_3_2_2_48_1","unstructured":"Xinyang Zhang Ningfei Wang Hua Shen Shouling Ji Xiapu Luo and Ting Wang. 2019. Interpretable Deep Learning under Fire. https:\/\/arxiv.org\/abs\/1812.00891  Xinyang Zhang Ningfei Wang Hua Shen Shouling Ji Xiapu Luo and Ting Wang. 2019. Interpretable Deep Learning under Fire. https:\/\/arxiv.org\/abs\/1812.00891"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24210"}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CODASPY '21"},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447842","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3422337.3447842","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447842","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447842"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":49,"alternative-id":["10.1145\/3422337.3447842","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3447842","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}