{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T16:40:53Z","timestamp":1777567253602,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"FFG","award":["SBA-K1"],"award-info":[{"award-number":["SBA-K1"]}]},{"name":"BMK","award":["873979"],"award-info":[{"award-number":["873979"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3519363","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"358-360","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Poisoning Attacks against Feature-Based Image Classification"],"prefix":"10.1145","author":[{"given":"Robin","family":"Mayerhofer","sequence":"first","affiliation":[{"name":"Vienna University of Technology, Vienna, Austria"}]},{"given":"Rudolf","family":"Mayer","sequence":"additional","affiliation":[{"name":"SBA Research gGmbH &amp; Vienna University of Technology, Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 29th International Conference on Machine Learning (ICML)","author":"Biggio Battista","year":"2012","unstructured":"Battista Biggio , Blaine Nelson , and Pavel Laskov . 2012 . Poisoning Attacks against Support Vector Machines . In Proceedings of the 29th International Conference on Machine Learning (ICML) ( Edinburgh, UK). Omnipress, New York, NY, USA. Battista Biggio, Blaine Nelson, and Pavel Laskov. 2012. Poisoning Attacks against Support Vector Machines. In Proceedings of the 29th International Conference on Machine Learning (ICML) (Edinburgh, UK). Omnipress, New York, NY, USA."},{"key":"e_1_3_2_1_2_1","volume-title":"Pattern Recognition","volume":"84","author":"Biggio Battista","year":"2018","unstructured":"Battista Biggio and Fabio Roli . 2018 . Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning . Pattern Recognition , Vol. 84 (2018). https:\/\/doi.org\/10.1016\/j.patcog.2018.07.023 10.1016\/j.patcog.2018.07.023 Battista Biggio and Fabio Roli. 2018. Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning . Pattern Recognition , Vol. 84 (2018). https:\/\/doi.org\/10.1016\/j.patcog.2018.07.023"},{"key":"e_1_3_2_1_3_1","volume-title":"BadNets: Evaluating Backdooring Attacks on Deep Neural Networks","author":"Gu Tianyu","year":"2019","unstructured":"Tianyu Gu , Kang Liu , Brendan Dolan-Gavitt , and Siddharth Garg . 2019. BadNets: Evaluating Backdooring Attacks on Deep Neural Networks . IEEE Access , Vol . 7 ( 2019 ). https:\/\/doi.org\/10.1109\/ACCESS.2019.2909068 10.1109\/ACCESS.2019.2909068 Tianyu Gu, Kang Liu, Brendan Dolan-Gavitt, and Siddharth Garg. 2019. BadNets: Evaluating Backdooring Attacks on Deep Neural Networks . IEEE Access , Vol. 7 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2909068"},{"key":"e_1_3_2_1_4_1","volume-title":"Poisoning Attacks in Federated Learning: An Evaluation on Traffic Sign Classification. In 10th ACM Conference on Data and Application Security and Privacy. ACM, New Orleans LA USA. https:\/\/doi.org\/10","author":"Nuding Florian","year":"2020","unstructured":"Florian Nuding and Rudolf Mayer . 2020 . Poisoning Attacks in Federated Learning: An Evaluation on Traffic Sign Classification. In 10th ACM Conference on Data and Application Security and Privacy. ACM, New Orleans LA USA. https:\/\/doi.org\/10 .1145\/3374664.3379534 10.1145\/3374664.3379534 Florian Nuding and Rudolf Mayer. 2020. Poisoning Attacks in Federated Learning: An Evaluation on Traffic Sign Classification. In 10th ACM Conference on Data and Application Security and Privacy. ACM, New Orleans LA USA. https:\/\/doi.org\/10.1145\/3374664.3379534"},{"key":"e_1_3_2_1_5_1","volume-title":"Data Poisoning in Sequential and Parallel Federated Learning. In ACM International Workshop on Security and Privacy Analytics (IWSPA ). ACM","author":"Nuding Florian","year":"2022","unstructured":"Florian Nuding and Rudolf Mayer . 2022 . Data Poisoning in Sequential and Parallel Federated Learning. In ACM International Workshop on Security and Privacy Analytics (IWSPA ). ACM , Baltimore, MD, USA. https:\/\/doi.org\/10.1145\/3510548.35 19372 10.1145\/3510548.3519372 Florian Nuding and Rudolf Mayer. 2022. Data Poisoning in Sequential and Parallel Federated Learning. In ACM International Workshop on Security and Privacy Analytics (IWSPA ). ACM, Baltimore, MD, USA. https:\/\/doi.org\/10.1145\/3510548.3519372"},{"key":"e_1_3_2_1_6_1","volume-title":"Machine Learning and Knowledge Extraction","author":"Rehman Huma","unstructured":"Huma Rehman , Andreas Ekelhart , and Rudolf Mayer . 2019. Backdoor Attacks in Neural Networks -- A Systematic Evaluation on Multiple Traffic Sign Datasets . In Machine Learning and Knowledge Extraction . Springer International Publishing , Cham . https:\/\/doi.org\/10.1007\/978--3-030--29726--8_18 10.1007\/978--3-030--29726--8_18 Huma Rehman, Andreas Ekelhart, and Rudolf Mayer. 2019. Backdoor Attacks in Neural Networks -- A Systematic Evaluation on Multiple Traffic Sign Datasets . In Machine Learning and Knowledge Extraction. Springer International Publishing, Cham. https:\/\/doi.org\/10.1007\/978--3-030--29726--8_18"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2011.6033395"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2011.6033494"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","location":"Baltimore MD USA","acronym":"CODASPY '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3519363","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3519363","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:40Z","timestamp":1750188640000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3519363"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":8,"alternative-id":["10.1145\/3508398.3519363","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3519363","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}