{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:12Z","timestamp":1750219752603,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Agenda Mobilizadora Sines Nexus, supported by the Recovery and Resilience Plan (PRR) and by the European Funds Next Generation EU, following Notice No. 02\/C05-i01\/2022, Component 5 - Capitalization and Business Innovation - Mobilizing Agendas for Business Innovation and by the FCT, I.P.\/MCTES through national funds (PIDDAC), within the scope of CISUC R&D Unit ? UIDB\/00326\/2020 or project code UIDP\/00326\/2020.","award":["7113"],"award-info":[{"award-number":["7113"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3615366.3622793","type":"proceedings-article","created":{"date-parts":[[2023,10,17]],"date-time":"2023-10-17T18:17:34Z","timestamp":1697566654000},"page":"182-187","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Advanced Machine Learning for Runtime Data Generation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-4600-5184","authenticated-orcid":false,"given":"Bukhtawar","family":"Zamir","sequence":"first","affiliation":[{"name":"Department of Informatics Engineering, University of Coimba, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4623-764X","authenticated-orcid":false,"given":"Jo\u00e3o R.","family":"Campos","sequence":"additional","affiliation":[{"name":"Department of Informatics Engineering, University of Coimba, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5103-8541","authenticated-orcid":false,"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[{"name":"Department of Informatics Engineering, University of Coimba, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2023,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"On the relationship between software complexity and security. arXiv preprint arXiv:2002.07135","author":"Alenezi Mamdouh","year":"2020","unstructured":"Mamdouh Alenezi and Mohammad Zarour . 2020. On the relationship between software complexity and security. arXiv preprint arXiv:2002.07135 ( 2020 ). Mamdouh Alenezi and Mohammad Zarour. 2020. On the relationship between software complexity and security. arXiv preprint arXiv:2002.07135 (2020)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.18"},{"key":"e_1_3_2_1_3_1","volume-title":"Generating multi-categorical samples with generative adversarial networks. arXiv preprint arXiv:1807.01202","author":"Camino Ramiro","year":"2018","unstructured":"Ramiro Camino , Christian Hammerschmidt , and Radu State . 2018. Generating multi-categorical samples with generative adversarial networks. arXiv preprint arXiv:1807.01202 ( 2018 ). Ramiro Camino, Christian Hammerschmidt, and Radu State. 2018. Generating multi-categorical samples with generative adversarial networks. arXiv preprint arXiv:1807.01202 (2018)."},{"key":"e_1_3_2_1_4_1","volume-title":"Improving missing data imputation with deep generative models. arXiv preprint arXiv:1902.10666","author":"Camino D","year":"2019","unstructured":"Ramiro\u00a0 D Camino , Christian\u00a0 A Hammerschmidt , and Radu State . 2019. Improving missing data imputation with deep generative models. arXiv preprint arXiv:1902.10666 ( 2019 ). Ramiro\u00a0D Camino, Christian\u00a0A Hammerschmidt, and Radu State. 2019. Improving missing data imputation with deep generative models. arXiv preprint arXiv:1902.10666 (2019)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00020"},{"key":"e_1_3_2_1_6_1","volume-title":"On the Applicability of Machine Learning-based Online Failure Prediction for Modern Complex Systems. In 2022 18th European Dependable Computing Conference (EDCC). IEEE, 49\u201356","author":"Campos R","year":"2022","unstructured":"Jo\u00e3o\u00a0 R Campos , Ernesto Costa , and Marco Vieira . 2022 . On the Applicability of Machine Learning-based Online Failure Prediction for Modern Complex Systems. In 2022 18th European Dependable Computing Conference (EDCC). IEEE, 49\u201356 . Jo\u00e3o\u00a0R Campos, Ernesto Costa, and Marco Vieira. 2022. On the Applicability of Machine Learning-based Online Failure Prediction for Modern Complex Systems. In 2022 18th European Dependable Computing Conference (EDCC). IEEE, 49\u201356."},{"key":"e_1_3_2_1_7_1","volume-title":"Online Failure Prediction for Complex Systems: Methodology and Case Studies","author":"Campos R","year":"2022","unstructured":"Jo\u00e3o\u00a0 R Campos , Ernesto Costa , and Marco Vieira . 2022. Online Failure Prediction for Complex Systems: Methodology and Case Studies . IEEE Transactions on Dependable and Secure Computing ( 2022 ). Jo\u00e3o\u00a0R Campos, Ernesto Costa, and Marco Vieira. 2022. Online Failure Prediction for Complex Systems: Methodology and Case Studies. IEEE Transactions on Dependable and Secure Computing (2022)."},{"key":"e_1_3_2_1_8_1","unstructured":"Scott Carpenter. 2021. outage of social media. https:\/\/www.bloomberg.com\/news\/articles\/2021-10-04\/zuckerberg-loses-7-billion-in-hours-as-facebook-plunges#xj4y7vzkg  Scott Carpenter. 2021. outage of social media. https:\/\/www.bloomberg.com\/news\/articles\/2021-10-04\/zuckerberg-loses-7-billion-in-hours-as-facebook-plunges#xj4y7vzkg"},{"key":"e_1_3_2_1_9_1","volume-title":"Techniques and Tools for Runtime Security Monitoring and Analysis of Microservices. In 2023 53rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks - Supplemental","volume":"193","author":"Castro Jessica","year":"2023","unstructured":"Jessica Castro , Nuno Laranjeiro , and Marco Vieira . 2023 . Techniques and Tools for Runtime Security Monitoring and Analysis of Microservices. In 2023 53rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S). 191\u2013 193 . https:\/\/doi.org\/10.1109\/DSN-S58398.2023.00052 10.1109\/DSN-S58398.2023.00052 Jessica Castro, Nuno Laranjeiro, and Marco Vieira. 2023. Techniques and Tools for Runtime Security Monitoring and Analysis of Microservices. In 2023 53rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S). 191\u2013193. https:\/\/doi.org\/10.1109\/DSN-S58398.2023.00052"},{"key":"e_1_3_2_1_10_1","unstructured":"Edward Choi Siddharth Biswal Bradley Malin Jon Duke Walter\u00a0F Stewart and Jimeng Sun. 2017. Generating multi-label discrete patient records using generative adversarial networks. In Machine learning for healthcare conference. PMLR 286\u2013305.  Edward Choi Siddharth Biswal Bradley Malin Jon Duke Walter\u00a0F Stewart and Jimeng Sun. 2017. Generating multi-label discrete patient records using generative adversarial networks. In Machine learning for healthcare conference. PMLR 286\u2013305."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2021.1966879"},{"key":"e_1_3_2_1_12_1","unstructured":"National\u00a0Research Council 2013. Nonresponse in social science surveys: A research agenda. (2013).  National\u00a0Research Council 2013. Nonresponse in social science surveys: A research agenda. (2013)."},{"key":"e_1_3_2_1_13_1","volume-title":"Effective data generation for imbalanced learning using conditional generative adversarial networks. Expert Systems with applications 91","author":"Douzas Georgios","year":"2018","unstructured":"Georgios Douzas and Fernando Bacao . 2018. Effective data generation for imbalanced learning using conditional generative adversarial networks. Expert Systems with applications 91 ( 2018 ), 464\u2013471. Georgios Douzas and Fernando Bacao. 2018. Effective data generation for imbalanced learning using conditional generative adversarial networks. Expert Systems with applications 91 (2018), 464\u2013471."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-27477-1_23"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21248173"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/risks6020029"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00359-3_1"},{"key":"e_1_3_2_1_18_1","volume-title":"Intrusion Injection for Virtualized Systems: Concepts and Approach. In 2023 53rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 417\u2013430","author":"Gon\u00e7alves F.","year":"2023","unstructured":"Charles\u00a0 F. Gon\u00e7alves , Nuno Antunes , and Marco Vieira . 2023 . Intrusion Injection for Virtualized Systems: Concepts and Approach. In 2023 53rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 417\u2013430 . https:\/\/doi.org\/10.1109\/DSN58367.2023.00047 10.1109\/DSN58367.2023.00047 Charles\u00a0F. Gon\u00e7alves, Nuno Antunes, and Marco Vieira. 2023. Intrusion Injection for Virtualized Systems: Concepts and Approach. In 2023 53rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 417\u2013430. https:\/\/doi.org\/10.1109\/DSN58367.2023.00047"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/en16052290"},{"key":"e_1_3_2_1_21_1","volume-title":"Improved training of wasserstein gans. Advances in neural information processing systems 30","author":"Gulrajani Ishaan","year":"2017","unstructured":"Ishaan Gulrajani , Faruk Ahmed , Martin Arjovsky , Vincent Dumoulin , and Aaron\u00a0 C Courville . 2017. Improved training of wasserstein gans. Advances in neural information processing systems 30 ( 2017 ). Ishaan Gulrajani, Faruk Ahmed, Martin Arjovsky, Vincent Dumoulin, and Aaron\u00a0C Courville. 2017. Improved training of wasserstein gans. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/2716881","article-title":"An effective fault-tolerant intrusion detection system under distributed environment","volume":"2021","author":"Hong Bo","year":"2021","unstructured":"Bo Hong , Hui Wang , and Zijian Cao . 2021 . An effective fault-tolerant intrusion detection system under distributed environment . Wireless Communications and Mobile Computing 2021 (2021), 1 \u2013 9 . Bo Hong, Hui Wang, and Zijian Cao. 2021. An effective fault-tolerant intrusion detection system under distributed environment. Wireless Communications and Mobile Computing 2021 (2021), 1\u20139.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"e_1_3_2_1_23_1","volume-title":"International Conference on Machine Learning. PMLR, 2921\u20132930","author":"Hwang Uiwon","year":"2019","unstructured":"Uiwon Hwang , Dahuin Jung , and Sungroh Yoon . 2019 . Hexagan: Generative adversarial nets for real world classification . In International Conference on Machine Learning. PMLR, 2921\u20132930 . Uiwon Hwang, Dahuin Jung, and Sungroh Yoon. 2019. Hexagan: Generative adversarial nets for real world classification. In International Conference on Machine Learning. PMLR, 2921\u20132930."},{"key":"e_1_3_2_1_24_1","volume-title":"Categorical reparameterization with gumbel-softmax. arXiv preprint arXiv:1611.01144","author":"Jang Eric","year":"2016","unstructured":"Eric Jang , Shixiang Gu , and Ben Poole . 2016. Categorical reparameterization with gumbel-softmax. arXiv preprint arXiv:1611.01144 ( 2016 ). Eric Jang, Shixiang Gu, and Ben Poole. 2016. Categorical reparameterization with gumbel-softmax. arXiv preprint arXiv:1611.01144 (2016)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42254-021-00314-5"},{"key":"e_1_3_2_1_26_1","volume-title":"International conference on machine learning. PMLR","author":"Kim Taeksoo","year":"2017","unstructured":"Taeksoo Kim , Moonsu Cha , Hyunsoo Kim , Jung\u00a0Kwon Lee , and Jiwon Kim . 2017 . Learning to discover cross-domain relations with generative adversarial networks . In International conference on machine learning. PMLR , 1857\u20131865. Taeksoo Kim, Moonsu Cha, Hyunsoo Kim, Jung\u00a0Kwon Lee, and Jiwon Kim. 2017. Learning to discover cross-domain relations with generative adversarial networks. In International conference on machine learning. PMLR, 1857\u20131865."},{"key":"e_1_3_2_1_27_1","volume-title":"Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114","author":"Kingma P","year":"2013","unstructured":"Diederik\u00a0 P Kingma and Max Welling . 2013. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 ( 2013 ). Diederik\u00a0P Kingma and Max Welling. 2013. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013)."},{"key":"e_1_3_2_1_28_1","volume-title":"Gans for sequences of discrete elements with the gumbel-softmax distribution. arXiv preprint arXiv:1611.04051","author":"Kusner J","year":"2016","unstructured":"Matt\u00a0 J Kusner and Jos\u00e9\u00a0Miguel Hern\u00e1ndez-Lobato . 2016. Gans for sequences of discrete elements with the gumbel-softmax distribution. arXiv preprint arXiv:1611.04051 ( 2016 ). Matt\u00a0J Kusner and Jos\u00e9\u00a0Miguel Hern\u00e1ndez-Lobato. 2016. Gans for sequences of discrete elements with the gumbel-softmax distribution. arXiv preprint arXiv:1611.04051 (2016)."},{"key":"e_1_3_2_1_29_1","volume-title":"The concrete distribution: A continuous relaxation of discrete random variables. arXiv preprint arXiv:1611.00712","author":"Maddison J","year":"2016","unstructured":"Chris\u00a0 J Maddison , Andriy Mnih , and Yee\u00a0Whye Teh . 2016. The concrete distribution: A continuous relaxation of discrete random variables. arXiv preprint arXiv:1611.00712 ( 2016 ). Chris\u00a0J Maddison, Andriy Mnih, and Yee\u00a0Whye Teh. 2016. The concrete distribution: A continuous relaxation of discrete random variables. arXiv preprint arXiv:1611.00712 (2016)."},{"key":"e_1_3_2_1_30_1","unstructured":"Lev Manovich. 2019. Abstraction and complexity.  Lev Manovich. 2019. Abstraction and complexity."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2172423"},{"key":"e_1_3_2_1_32_1","volume-title":"Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784","author":"Mirza Mehdi","year":"2014","unstructured":"Mehdi Mirza and Simon Osindero . 2014. Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784 ( 2014 ). Mehdi Mirza and Simon Osindero. 2014. Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784 (2014)."},{"key":"e_1_3_2_1_33_1","volume-title":"Airline passenger name record generation using generative adversarial networks. arXiv preprint arXiv:1807.06657","author":"Mottini Alejandro","year":"2018","unstructured":"Alejandro Mottini , Alix Lheritier , and Rodrigo Acuna-Agost . 2018. Airline passenger name record generation using generative adversarial networks. arXiv preprint arXiv:1807.06657 ( 2018 ). Alejandro Mottini, Alix Lheritier, and Rodrigo Acuna-Agost. 2018. Airline passenger name record generation using generative adversarial networks. arXiv preprint arXiv:1807.06657 (2018)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISACV.2018.8354080"},{"key":"e_1_3_2_1_35_1","unstructured":"Nicholas Reimann. 2023. Customer privacy. https:\/\/www.forbes.com\/sites\/nicholasreimann\/2023\/01\/19\/t-mobile-data-breach-hackers-stole-37-million-customers-info-company-says\/?sh=4ee1ad263d64  Nicholas Reimann. 2023. Customer privacy. https:\/\/www.forbes.com\/sites\/nicholasreimann\/2023\/01\/19\/t-mobile-data-breach-hackers-stole-37-million-customers-info-company-says\/?sh=4ee1ad263d64"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1670679.1670680"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00360"},{"key":"e_1_3_2_1_38_1","unstructured":"Dennis Ulmer Lotta Meijerink and Giovanni Cin\u00e0. 2020. Trust issues: Uncertainty estimation does not enable reliable ood detection on medical tabular data. In Machine Learning for Health. PMLR 341\u2013354.  Dennis Ulmer Lotta Meijerink and Giovanni Cin\u00e0. 2020. Trust issues: Uncertainty estimation does not enable reliable ood detection on medical tabular data. In Machine Learning for Health. PMLR 341\u2013354."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.595959"},{"key":"e_1_3_2_1_40_1","volume-title":"Testing component-based software: A cautionary tale","author":"Weyuker J","year":"1998","unstructured":"Elaine\u00a0 J Weyuker . 1998. Testing component-based software: A cautionary tale . IEEE software 15, 5 ( 1998 ), 54\u201359. Elaine\u00a0J Weyuker. 1998. Testing component-based software: A cautionary tale. IEEE software 15, 5 (1998), 54\u201359."},{"key":"e_1_3_2_1_41_1","volume-title":"Modeling tabular data using conditional gan. Advances in Neural Information Processing Systems 32","author":"Xu Lei","year":"2019","unstructured":"Lei Xu , Maria Skoularidou , Alfredo Cuesta-Infante , and Kalyan Veeramachaneni . 2019. Modeling tabular data using conditional gan. Advances in Neural Information Processing Systems 32 ( 2019 ). Lei Xu, Maria Skoularidou, Alfredo Cuesta-Infante, and Kalyan Veeramachaneni. 2019. Modeling tabular data using conditional gan. Advances in Neural Information Processing Systems 32 (2019)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00015"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10804"}],"event":{"name":"LADC 2023: 12th Latin-American Symposium on Dependable and Secure Computing","acronym":"LADC 2023","location":"La Paz Bolivia"},"container-title":["12th Latin-American Symposium on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3615366.3622793","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3615366.3622793","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:54Z","timestamp":1750178214000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3615366.3622793"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":43,"alternative-id":["10.1145\/3615366.3622793","10.1145\/3615366"],"URL":"https:\/\/doi.org\/10.1145\/3615366.3622793","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}