{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T09:45:01Z","timestamp":1771062301925,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Research funded by the Defence Science and Technology Laboratory (Dstl)."}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3605764.3623986","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:12:17Z","timestamp":1700568737000},"page":"91-101","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6340-004X","authenticated-orcid":false,"given":"Chris","family":"Hicks","sequence":"first","affiliation":[{"name":"The Alan Turing Institute, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2667-5906","authenticated-orcid":false,"given":"Vasilios","family":"Mavroudis","sequence":"additional","affiliation":[{"name":"The Alan Turing Institute, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4482-6835","authenticated-orcid":false,"given":"Myles","family":"Foley","sequence":"additional","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4721-3017","authenticated-orcid":false,"given":"Thomas","family":"Davies","sequence":"additional","affiliation":[{"name":"The Alan Turing Institute, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4752-9334","authenticated-orcid":false,"given":"Kate","family":"Highnam","sequence":"additional","affiliation":[{"name":"The Alan Turing Institute, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3841-3332","authenticated-orcid":false,"given":"Tim","family":"Watson","sequence":"additional","affiliation":[{"name":"The Alan Turing Institute, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. Cyber Operations Research Gym. https:\/\/github.com\/cage-challenge\/ CybORG. Created by Maxwell Standen David Bowman Son Hoang Toby Richer Martin Lucas Richard Van Tassel Phillip Vu Mitchell Kiely KC C. Natalie Konschnik Joshua Collyer."},{"key":"e_1_3_2_1_2_1","volume-title":"Cyber-Security and Reinforcement Learning -- A Brief Survey. Engineering Applications of Artificial Intelligence","author":"Khan Adawadkar Amrin Maria","year":"2022","unstructured":"Amrin Maria Khan Adawadkar and Nilima Kulkarni. 2022. Cyber-Security and Reinforcement Learning -- A Brief Survey. Engineering Applications of Artificial Intelligence (2022)."},{"key":"e_1_3_2_1_3_1","volume-title":"Workshop on Machine Learning for Cybersecurity as part of the Proceedings of the 39th International Conference on Machine Learning (ML4Cyber '22)","author":"Andrew Alex","year":"2022","unstructured":"Alex Andrew, Sam Spillard, Joshua Collyer, and Neil Dhir. 2022. Developing Optimal Causal Cyber-Defence Agents via Cyber Security Simulation. In Workshop on Machine Learning for Cybersecurity as part of the Proceedings of the 39th International Conference on Machine Learning (ML4Cyber '22)."},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Learning Representations (ICLR '21)","author":"Andrychowicz Marcin","year":"2021","unstructured":"Marcin Andrychowicz, Anton Raichuk, and Others. 2021. What Matters for On-Policy Deep Actor-Critic Methods? A Large-Scale Study. In International Conference on Learning Representations (ICLR '21)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560830.3563732"},{"key":"e_1_3_2_1_6_1","volume-title":"Emergent Tool Use From Multi-Agent Autocurricula. In International Conference on Learning Representations (ICLR '20)","author":"Baker Bowen","year":"2020","unstructured":"Bowen Baker, Ingmar Kanitscheider, Todor Markov, Yi Wu, Glenn Powell, Bob McGrew, and Igor Mordatch. 2020. Emergent Tool Use From Multi-Agent Autocurricula. In International Conference on Learning Representations (ICLR '20)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3605764.3623916"},{"key":"e_1_3_2_1_8_1","volume-title":"11th USENIX Workshop on Offensive Technologies (WOOT '17)","author":"Belikovetsky Sofia","year":"2017","unstructured":"Sofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, Jacob Gatlin, and Yuval Elovici. 2017. dr0wned -- Cyber-Physical Attack with Additive Manufacturing. In 11th USENIX Workshop on Offensive Technologies (WOOT '17)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553380"},{"key":"e_1_3_2_1_10_1","volume-title":"Analysis Frameworks, and Analysis Tools. Online","author":"Best Katharina L.","unstructured":"Katharina L. Best, Jon Schmid, Shane Tierney, Jalal Awan, Nahom M. Beyene, Maynard A. Holliday, Raza Khan, and Karen Lee. 2020. How to Analyze the Cyber Threat from Drones: Background, Analysis Frameworks, and Analysis Tools. Online. RAND Corporation."},{"key":"e_1_3_2_1_11_1","unstructured":"Greg Brockman Vicki Cheung Ludwig Pettersson Jonas Schneider John Schulman Jie Tang and Wojciech Zaremba. 2016. OpenAI Gym."},{"key":"e_1_3_2_1_12_1","volume-title":"Robust artificial intelligence for active cyber defence. Online","author":"Burke Anthony","unstructured":"Anthony Burke. 2020. Robust artificial intelligence for active cyber defence. Online. The Alan Turing Institute."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SVCC56964.2023.10165310"},{"key":"e_1_3_2_1_14_1","volume-title":"23rd USENIX Security Symposium (USENIX Security '14)","author":"Costin Andrei","year":"2014","unstructured":"Andrei Costin, Jonas Zaddach, Aur\u00e9lien Francillon, and Davide Balzarotti. 2014. A Large-Scale Analysis of the Security of Embedded Firmwares. In 23rd USENIX Security Symposium (USENIX Security '14)."},{"key":"e_1_3_2_1_15_1","volume-title":"Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study. In 17th International Conference on Embedded Systems (VLSID '18)","author":"Dey Vishal","year":"2018","unstructured":"Vishal Dey, Vikramkumar Pudi, Anupam Chattopadhyay, and Yuval Elovici. 2018. Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study. In 17th International Conference on Embedded Systems (VLSID '18)."},{"key":"e_1_3_2_1_16_1","volume-title":"A note on two problems in connexion with graphs. Numerische mathematik","author":"Dijkstra Edsger W","year":"1959","unstructured":"Edsger W Dijkstra. 1959. A note on two problems in connexion with graphs. Numerische mathematik (1959)."},{"key":"e_1_3_2_1_17_1","volume-title":"Greg Beams, and Reece Rivera","author":"Fernando Benjamin C.","year":"2019","unstructured":"Benjamin C. Fernando, Greg Beams, and Reece Rivera. 2019. Security Analysis of DJI Phantom 3 Standard. Online. Massachusetts Institute of Technology. https: \/\/courses.csail.mit.edu\/6.857\/2016\/files\/9.pdf"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3527286"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom56396.2022.00031"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the Conference on Applied Machine Learning in Information Security (CAMLIS '22)","author":"Foley Myles","year":"2022","unstructured":"Myles Foley, MiaWang, Zoe M, Chris Hicks, and Vasilios Mavroudis. 2022. Inroads into Autonomous Network Defence using Explained Reinforcement Learning. In Proceedings of the Conference on Applied Machine Learning in Information Security (CAMLIS '22)."},{"key":"e_1_3_2_1_21_1","volume-title":"Cognitron: A self-organizing multilayered neural network. Biological Cybernetics","author":"Fukushima Kunihiko","year":"1975","unstructured":"Kunihiko Fukushima. 1975. Cognitron: A self-organizing multilayered neural network. Biological Cybernetics (1975)."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 17th ISCRAM Conference.","author":"Glantz Edward J","year":"2020","unstructured":"Edward J Glantz, Frank E Ritter, Don Gilbreath, Sarah J Stager, Alexandra Anton, and Rahul Emani. 2020. UAV use in disaster management. In Proceedings of the 17th ISCRAM Conference."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560690"},{"key":"e_1_3_2_1_24_1","unstructured":"TTCP CAGE Working Group. 2022. TTCP CAGE Challenge 3. https:\/\/github. com\/cage-challenge\/cage-challenge-3."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269092"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Yi Han Benjamin I. P. Rubinstein Tamas Abraham et al. 2018. Reinforcement Learning for Autonomous Defence in Software-Defined Networking. In Decision and Game Theory for Security.","DOI":"10.1007\/978-3-030-01554-1_9"},{"key":"e_1_3_2_1_27_1","unstructured":"John Hannay. 2022. CAGE Challenge 2 Winning Submission. PPO Greedy Decoys. https:\/\/github.com\/john-cardiff\/-cyborg-cage-2."},{"key":"e_1_3_2_1_28_1","volume-title":"Reinforcement Learning for feedback-enabled cyber resilience. Annual Reviews in Control","author":"Huang Yunhan","year":"2022","unstructured":"Yunhan Huang, Linan Huang, and Quanyan Zhu. 2022. Reinforcement Learning for feedback-enabled cyber resilience. Annual Reviews in Control (2022)."},{"key":"e_1_3_2_1_29_1","volume-title":"Humphreys","author":"Kerns Andrew J.","year":"2014","unstructured":"Andrew J. Kerns, Daniel P. Shepard, Jahshan A. Bhatti, and Todd E. Humphreys. 2014. Unmanned Aircraft Capture and Control Via GPS Spoofing. Journal of Field Robotics (2014)."},{"key":"e_1_3_2_1_30_1","volume-title":"9th International Conference on Computational Science and Computational Intelligence (CSCI '22)","author":"Kunz Thomas","year":"2023","unstructured":"Thomas Kunz, Christian Fisher, James La Novara-Gsell, Christopher Nguyen, and Li Li. 2023. A Multiagent CyberBattleSim for RL Cyber Operation Agents. In 9th International Conference on Computational Science and Computational Intelligence (CSCI '22)."},{"key":"e_1_3_2_1_31_1","volume-title":"Autonomous Cyber Defence. A roadmap from lab to ops. Online","author":"Lohn Andrew","unstructured":"Andrew Lohn, Anna Knack, Ant Burke, and Krystal Jackson. 2023. Autonomous Cyber Defence. A roadmap from lab to ops. Online. Centre for Emerging Technology and Security (CETaS) at The Alan Turing Institute."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems (NeurIPS'17)","author":"Scott","unstructured":"Scott M. Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions. In Proceedings of the 31st International Conference on Neural Information Processing Systems (NeurIPS'17)."},{"key":"e_1_3_2_1_33_1","volume-title":"AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks. In 2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA).","author":"Luo Mulong","year":"2023","unstructured":"Mulong Luo, Wenjie Xiong, et al. 2023. AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks. In 2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Daniel J. Mankowitz Andrea Michi Anton Zhernov Marco Gelmi Marco Selvi Cosmin Paduraru Edouard Leurent et al. 2023. Faster sorting algorithms discovered using deep reinforcement learning. Nature (2023).","DOI":"10.1038\/s41586-023-06004-9"},{"key":"e_1_3_2_1_35_1","volume-title":"CybORG: A Gym for the Development of Autonomous Cyber Agents. In 1st International Workshop on Adaptive Cyber Defense (IJCAI '21)","author":"Junae Kim Maxwell Standen David Bowman","year":"2021","unstructured":"David Bowman Toby JR? icher Junae Kim Maxwell Standen, Martin Lucas and Damian Marriott. 2021. CybORG: A Gym for the Development of Autonomous Cyber Agents. In 1st International Workshop on Adaptive Cyber Defense (IJCAI '21)."},{"key":"e_1_3_2_1_36_1","volume-title":"Mauro Conti, Riccardo Lazzeretti, and A. Selcuk Uluagac.","author":"Mekdad Yassine","year":"2023","unstructured":"Yassine Mekdad, Ahmet Aris, Leonardo Babun, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, and A. Selcuk Uluagac. 2023. A survey on security and privacy issues of UAVs. Computer Networks (2023)."},{"key":"e_1_3_2_1_37_1","unstructured":"Volodymyr Mnih Koray Kavukcuoglu David Silver et al. 2015. Human-level control through deep reinforcement learning. Nature (2015)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3121870"},{"key":"e_1_3_2_1_39_1","unstructured":"OpenAI : Christopher Berner Greg Brockman Brooke Chan Vicki Cheung and Others. 2019. Dota 2 with Large Scale Deep Reinforcement Learning. arXiv:1912.06680"},{"key":"e_1_3_2_1_40_1","volume-title":"Bart De Vylder, et al","author":"Perolat Julien","year":"2022","unstructured":"Julien Perolat, Bart De Vylder, et al. 2022. Mastering the Game of Stratego with Model-Free Multiagent Reinforcement Learning. Science (2022)."},{"key":"e_1_3_2_1_41_1","unstructured":"Ulyana Piterbarg Lerrel Pinto and Rob Fergus. 2023. NetHack is Hard to Hack. arXiv:2305.19240"},{"key":"e_1_3_2_1_42_1","volume-title":"5th USENIXWorkshop on Offensive Technologies ((WOOT '11)).","author":"Reed Theodore","unstructured":"Theodore Reed, Joseph Geis, and Sven Dietrich. 2011. SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster. In 5th USENIXWorkshop on Offensive Technologies ((WOOT '11))."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"e_1_3_2_1_44_1","unstructured":"J. Schulman F. Wolski P. Dhariwal A. Radford and O. Klimov. 2017. Proximal Policy Optimization Algorithms. arXiv:1707.06347"},{"key":"e_1_3_2_1_45_1","volume-title":"Deep Reinforcement Learning in the Advanced Cybersecurity Threat Detection and Protection. Information Systems Frontiers","author":"Sewak Mohit","year":"2022","unstructured":"Mohit Sewak, Sanjay K. Sahay, and Hemant Rathore. 2022. Deep Reinforcement Learning in the Advanced Cybersecurity Threat Detection and Protection. Information Systems Frontiers (2022)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"David Silver Aja Huang et al. 2016. Mastering the game of Go with deep neural networks and tree search. Nature (2016).","DOI":"10.1038\/nature16961"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"David Silver Thomas Hubert Julian Schrittwieser et al. 2018. A general reinforcement learning algorithm that masters chess shogi and Go through self-play. Science (2018).","DOI":"10.1126\/science.aar6404"},{"key":"e_1_3_2_1_48_1","volume-title":"Individualized Controlled Continuous Communication Model for Multiagent Cooperative and Competitive Tasks. In International Conference on Learning Representations (ICLR '19)","author":"Singh Amanpreet","year":"2019","unstructured":"Amanpreet Singh, Tushar Jain, and Sainbayar Sukhbaatar. 2019. Individualized Controlled Continuous Communication Model for Multiagent Cooperative and Competitive Tasks. In International Conference on Learning Representations (ICLR '19)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3497768"},{"key":"e_1_3_2_1_50_1","volume-title":"Barto","author":"Sutton Richard S.","year":"2018","unstructured":"Richard S. Sutton and Andrew G. Barto. 2018. Reinforcement Learning: An Introduction."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/3009657.3009806"},{"key":"e_1_3_2_1_52_1","unstructured":"Microsoft Defender Research Team. [n. d.]."},{"key":"e_1_3_2_1_53_1","volume-title":"PettingZoo: Gym for Multi-Agent Reinforcement Learning. In Advances in Neural Information Processing Systems (NeurIPS '21)","author":"Terry J","year":"2021","unstructured":"J Terry, Benjamin Black, Nathaniel Grammel, Mario Jayakumar, Ananth Hari, Ryan Sullivan, Luis S Santos, Clemens Dieffendahl, Caroline Horsch, Rodrigo Perez-Vicente, Niall Williams, Yashas Lokesh, and Praveen Ravi. 2021. PettingZoo: Gym for Multi-Agent Reinforcement Learning. In Advances in Neural Information Processing Systems (NeurIPS '21)."},{"key":"e_1_3_2_1_54_1","unstructured":"U.S. DoD 2022. Securing Defense-Critical Supply Chains. An action plan developed in response to President Biden's Executive Order 14017. Online. U.S. DoD."},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the 2017 Workshop on Internet of Things Security and Privacy (IoTS&P '17)","author":"Valente Junia","unstructured":"Junia Valente and Alvaro A. Cardenas. 2017. Understanding Security Threats in Consumer Drones Through the Lens of the Discovery Quadcopter Family. In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy (IoTS&P '17)."},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the ACM on Measurement and Analysis of Computing Systems","author":"Vyas Sanyam","year":"2023","unstructured":"Sanyam Vyas, John Hannay, Andrew Bolton, and Pete Burnap. 2023. Automated Cyber Defence: A Review. Proceedings of the ACM on Measurement and Analysis of Computing Systems (2023)."},{"key":"e_1_3_2_1_57_1","volume-title":"SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning. In 32nd USENIX Security Symposium (USENIX Security '23)","author":"Wahaibi Salim Al","year":"2023","unstructured":"Salim Al Wahaibi, Myles Foley, and Sergio Maffeis. 2023. SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning. In 32nd USENIX Security Symposium (USENIX Security '23)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","unstructured":"Guihong Wang and Jinglun Shi. 2019. Actor-Critic for Multi-agent System with Variable Quantity of Agents. In IoT as a Service.","DOI":"10.1007\/978-3-030-14657-3_5"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6221"},{"key":"e_1_3_2_1_60_1","volume-title":"Watkins and Peter Dayan","author":"Christopher","year":"1992","unstructured":"Christopher J.C.H. Watkins and Peter Dayan. 1992. Technical Note: Q-Learning. Machine Learning (1992)."},{"key":"e_1_3_2_1_61_1","volume-title":"Whitehead and Long-Ji Lin","author":"Steven","year":"1995","unstructured":"Steven D. Whitehead and Long-Ji Lin. 1995. Reinforcement learning of non- Markov decision processes. Artificial Intelligence (1995)."},{"key":"e_1_3_2_1_62_1","volume-title":"Reinforcement Learning for Real Life Workshop in the 36th Conference on Neural Information Processing Systems (RL4RealLife '22).","author":"Wolk Melody","unstructured":"Melody Wolk, Andy Applebaum, Camron Dennler, Patrick Dwyer, Marina Moskowitz, Harold Nguyen, Nicole Nichols, Nicole Park, Paul Rachwalski, Frank Rau, and Adrian Webster. 2022. Beyond CAGE: Investigating Generalization of Learned Autonomous Network Defense Policies. In Reinforcement Learning for Real Life Workshop in the 36th Conference on Neural Information Processing Systems (RL4RealLife '22)."},{"key":"e_1_3_2_1_63_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning.","author":"Yang Yaodong","year":"2018","unstructured":"Yaodong Yang, Rui Luo, Minne Li, Ming Zhou, Weinan Zhang, and Jun Wang. 2018. Mean Field Multi-Agent Reinforcement Learning. In Proceedings of the 35th International Conference on Machine Learning."},{"key":"e_1_3_2_1_64_1","volume-title":"The Surprising Effectiveness of PPO in Cooperative Multi- Agent Games. In Thirty-sixth Conference on Neural Information Processing Systems Datasets and Benchmarks Track (NeurIPS '22)","author":"Yu Chao","year":"2022","unstructured":"Chao Yu, Akash Velu, Eugene Vinitsky, Jiaxuan Gao, Yu Wang, Alexandre Bayen, and Yi Wu. 2022. The Surprising Effectiveness of PPO in Cooperative Multi- Agent Games. In Thirty-sixth Conference on Neural Information Processing Systems Datasets and Benchmarks Track (NeurIPS '22)."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24031"},{"key":"e_1_3_2_1_66_1","volume-title":"31st USENIX Security Symposium (USENIX Security '22)","author":"Zhou Ce","year":"2022","unstructured":"Ce Zhou, Qiben Yan, Yan Shi, and Lichao Sun. 2022. DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems. In 31st USENIX Security Symposium (USENIX Security '22)."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605764.3623986","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605764.3623986","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:37:14Z","timestamp":1755913034000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605764.3623986"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":66,"alternative-id":["10.1145\/3605764.3623986","10.1145\/3605764"],"URL":"https:\/\/doi.org\/10.1145\/3605764.3623986","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}