{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:40:01Z","timestamp":1755844801739,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-20-CE39-0011"],"award-info":[{"award-number":["ANR-20-CE39-0011"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3691368","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"5081-5083","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Demo: Towards Reproducible Evaluations of ML-Based IDS Using Data-Driven Approaches"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5711-4402","authenticated-orcid":false,"given":"Solayman","family":"Ayoubi","sequence":"first","affiliation":[{"name":"Sorbonne University, CNRS, LIP6, Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0948-7172","authenticated-orcid":false,"given":"S\u00e9bastien","family":"Tixeuil","sequence":"additional","affiliation":[{"name":"Sorbonne University, CNRS, LIP6 &amp; Institut Universitaire de France, Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8150-6617","authenticated-orcid":false,"given":"Gregory","family":"Blanc","sequence":"additional","affiliation":[{"name":"SAMOVAR, T\u00e9l\u00e9com SudParis Institut Polytechnique de Paris, Palaiseau, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4864-5380","authenticated-orcid":false,"given":"Houda","family":"Jmila","sequence":"additional","affiliation":[{"name":"Institute LIST, CEA, Paris-Saclay University, Palaiseau, France"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"volume-title":"Foundations and Practice of Security","author":"Ayoubi Solayman","key":"e_1_3_2_1_1_1","unstructured":"Solayman Ayoubi, Gregory Blanc, Houda Jmila, Thomas Silverston, and S\u00e9bastien Tixeuil. 2022. Data-driven evaluation of intrusion detectors: a methodological framework. In Foundations and Practice of Security. Springer Nature Switzerland, 142--157. isbn: 978--3-031--30122--3."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"e_1_3_2_1_3_1","unstructured":"Ian J. Goodfellow Jonathon Shlens and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. CoRR abs\/1412.6572."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Houda Jmila and Mohamed Ibn Khedher. 2022. Adversarial machine learning for network intrusion detection: a comparative study. Computer Networks 214 109073:1--109073:14.","DOI":"10.1016\/j.comnet.2022.109073"},{"volume-title":"Evaluating computer intrusion detection systems: a survey of common practices. 48, 1, 1--41","author":"Milenkoski Aleksandar","key":"e_1_3_2_1_5_1","unstructured":"Aleksandar Milenkoski, Marco Vieira, Samuel Kounev, Alberto Avritzer, and Bryan D Payne. 2015. Evaluating computer intrusion detection systems: a survey of common practices. 48, 1, 1--41. Publisher: ACM New York, NY, USA."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2019.00051"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691368","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3691368","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:20:18Z","timestamp":1755843618000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691368"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":7,"alternative-id":["10.1145\/3658644.3691368","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3691368","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}