{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T13:48:23Z","timestamp":1762177703086,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,30]]},"DOI":"10.1145\/3649403.3656486","type":"proceedings-article","created":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T16:04:12Z","timestamp":1715789052000},"page":"8-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5282-0965","authenticated-orcid":false,"given":"Francesco","family":"Marchiori","sequence":"first","affiliation":[{"name":"University of Padova, Padua, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padova &amp; Delft University of Technology, Padua, Italy"}]}],"member":"320","published-online":{"date-parts":[[2024,5,27]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/3607199.3607227"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1016\/j.adhoc.2019.02.001"},{"key":"e_1_3_2_1_3_1","volume-title":"The Scientific World Journal","volume":"2015","author":"Sivasamy Aneetha Avalappampatty","year":"2015","unstructured":"Aneetha Avalappampatty Sivasamy, Bose Sundan, et al. 2015. A dynamic intrusion detection system based on multivariate Hotelling's T 2 statistics approach for network environments. The Scientific World Journal , Vol. 2015 (2015)."},{"volume-title":"Model evasion attack on intrusion detection systems using adversarial machine learning. In 2020 54th annual conference on information sciences and systems (CISS)","author":"Ayub Md Ahsan","unstructured":"Md Ahsan Ayub, William A Johnson, Douglas A Talbert, and Ambareen Siraj. 2020. Model evasion attack on intrusion detection systems using adversarial machine learning. In 2020 54th annual conference on information sciences and systems (CISS). IEEE, 1--6.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","volume-title":"Recent advances in adversarial training for adversarial robustness. arXiv preprint arXiv:2102.01356","author":"Bai Tao","year":"2021","unstructured":"Tao Bai, Jinqi Luo, Jun Zhao, Bihan Wen, and Qian Wang. 2021. Recent advances in adversarial training for adversarial robustness. arXiv preprint arXiv:2102.01356 (2021)."},{"key":"e_1_3_2_1_6_1","volume-title":"Deep learning for anomaly detection: A survey. arXiv preprint arXiv:1901.03407","author":"Chalapathy Raghavendra","year":"2019","unstructured":"Raghavendra Chalapathy and Sanjay Chawla. 2019. Deep learning for anomaly detection: A survey. arXiv preprint arXiv:1901.03407 (2019)."},{"doi-asserted-by":"crossref","unstructured":"Emad Efatinasab Francesco Marchiori Alessandro Brighente Mirco Rampazzo and Mauro Conti. 2024. FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. arxiv: 2403.17494 [cs.CR]","key":"e_1_3_2_1_7_1","DOI":"10.1007\/978-3-031-64171-8_26"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.2174\/1874447802014010086"},{"key":"e_1_3_2_1_9_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_10_1","volume-title":"Byung Il Kwak, and Huy Kang Kim","author":"Han Mee Lan","year":"2018","unstructured":"Mee Lan Han, Byung Il Kwak, and Huy Kang Kim. 2018. Anomaly intrusion detection method for vehicular networks based on survival analysis. Vehicular communications , Vol. 14 (2018), 52--63."},{"volume-title":"Road vehicles - Controller area network (CAN). Standard","author":"International Standard Organization","unstructured":"International Standard Organization. 2015. ISO 11898:2015: Road vehicles - Controller area network (CAN). Standard. International Organization for Standardization, Geneva, CH.","key":"e_1_3_2_1_11_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1371\/journal.pone.0155781"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1186\/s42400-019-0038-7"},{"key":"e_1_3_2_1_14_1","volume-title":"Torchattacks: A pytorch repository for adversarial attacks. arXiv preprint arXiv:2010.01950","author":"Kim Hoki","year":"2020","unstructured":"Hoki Kim. 2020. Torchattacks: A pytorch repository for adversarial attacks. arXiv preprint arXiv:2010.01950 (2020)."},{"volume-title":"Artificial intelligence safety and security","author":"Kurakin Alexey","unstructured":"Alexey Kurakin, Ian J Goodfellow, and Samy Bengio. 2018. Adversarial examples in the physical world. In Artificial intelligence safety and security. Chapman and Hall\/CRC, 99--112.","key":"e_1_3_2_1_15_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1186\/s13638-019-1484-3"},{"key":"e_1_3_2_1_17_1","volume-title":"Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083","author":"Madry Aleksander","year":"2017","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)."},{"key":"e_1_3_2_1_18_1","volume-title":"DIMVA 2017, Bonn, Germany, July 6--7, 2017, Proceedings 14","author":"Palanca Andrea","year":"2017","unstructured":"Andrea Palanca, Eric Evenchick, Federico Maggi, and Stefano Zanero. 2017. A stealth, selective, link-layer denial-of-service attack against automotive networks. In Detection of Intrusions and Malware, and Vulnerability Assessment: 14th International Conference, DIMVA 2017, Bonn, Germany, July 6--7, 2017, Proceedings 14. Springer, 185--206."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/JIOT.2020.3048038"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1109\/IVS.2018.8500383"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/ICOIN.2016.7427089"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/3341105.3373868"},{"key":"e_1_3_2_1_23_1","volume-title":"Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204","author":"Tram\u00e8r Florian","year":"2017","unstructured":"Florian Tram\u00e8r, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh, and Patrick McDaniel. 2017. Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204 (2017)."},{"key":"e_1_3_2_1_24_1","volume-title":"9th European congress on embedded real time software and systems (ERTS","author":"Weber Marc","year":"2018","unstructured":"Marc Weber, Simon Klug, Eric Sax, and Bastian Zimmer. 2018. Embedded hybrid anomaly detection for automotive CAN communication. In 9th European congress on embedded real time software and systems (ERTS 2018)."},{"key":"e_1_3_2_1_25_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Wu Ruoyu","year":"2022","unstructured":"Ruoyu Wu, Taegyu Kim, Dave Jing Tian, Antonio Bianchi, and Dongyan Xu. 2022. $$DnD$$: A $$Cross-Architecture$$ Deep Neural Network Decompiler. In 31st USENIX Security Symposium (USENIX Security 22). 2135--2152."},{"key":"e_1_3_2_1_26_1","volume-title":"On the Resilience of Machine Learning-Based IDS for Automotive Networks. In 2023 IEEE Vehicular Networking Conference (VNC). IEEE, 239--246","author":"Zenden Ivo","year":"2023","unstructured":"Ivo Zenden, Han Wang, Alfonso Iacovazzi, Arash Vahidi, Rolf Blom, and Shahid Raza. 2023. On the Resilience of Machine Learning-Based IDS for Automotive Networks. In 2023 IEEE Vehicular Networking Conference (VNC). IEEE, 239--246."}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"acronym":"WiSec '24","name":"WiSec '24: 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Seoul Republic of Korea"},"container-title":["Proceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649403.3656486","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649403.3656486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:20Z","timestamp":1750291400000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649403.3656486"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":26,"alternative-id":["10.1145\/3649403.3656486","10.1145\/3649403"],"URL":"https:\/\/doi.org\/10.1145\/3649403.3656486","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]},"assertion":[{"value":"2024-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}