{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T01:29:56Z","timestamp":1755221396024,"version":"3.43.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T00:00:00Z","timestamp":1749081600000},"content-version":"vor","delay-in-days":1,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2030611; OAC-2320951"],"award-info":[{"award-number":["CNS-2030611; OAC-2320951"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,4]]},"DOI":"10.1145\/3716815.3729009","type":"proceedings-article","created":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T14:35:32Z","timestamp":1749134132000},"page":"38-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Poisoning Attacks against Quantile L1 Regression in CPS Anomaly Detection Frameworks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5771-167X","authenticated-orcid":false,"given":"Mohammad Jaminur","family":"Islam","sequence":"first","affiliation":[{"name":"Western Michigan University, Kalamazoo, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9666-9363","authenticated-orcid":false,"given":"Richard T.","family":"Meyer","sequence":"additional","affiliation":[{"name":"Western Michigan University, Kalamazoo, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3596-9447","authenticated-orcid":false,"given":"Shameek","family":"Bhattacharjee","sequence":"additional","affiliation":[{"name":"Western Michigan University, Kalamazoo, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,5]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","article-title":"2021. Detection and Forensics against Stealthy Data Falsification","volume":"18","author":"Bhattacharjee S.","year":"2021","unstructured":"S. Bhattacharjee and S. K. Das. 2021. Detection and Forensics against Stealthy Data Falsification in Smart Metering Infrastructure. IEEE Trans. on Dependable and Secure Computing 18, 1 (2021), 356--371.","journal-title":"Smart Metering Infrastructure. IEEE Trans. on Dependable and Secure Computing"},{"volume-title":"ACM Cyber-Physical Sys. Security Workshop (CPSS '22)","author":"Bhattacharjee S.","key":"e_1_3_2_1_2_1","unstructured":"S. Bhattacharjee, M.J. Islam, and S. Abedzadeh. 2022. Robust Anomaly Based Attack Detection in Smart Grids under Data Poisoning Attacks. In ACM Cyber-Physical Sys. Security Workshop (CPSS '22). 3--14."},{"key":"e_1_3_2_1_3_1","first-page":"2","article-title":"2021","volume":"24","author":"Bhattacharjee S.","year":"2021","unstructured":"S. Bhattacharjee, V. Madhavarapu, S. Silvestri, and S. K. Das. 2021. Attack Context Embedded Data Driven Trust Diagnostics in Smart Metering Infrastructure. ACM Trans. Priv. Secur. 24, 2, Article 9 (2021).","journal-title":"ACM Trans. Priv. Secur."},{"key":"e_1_3_2_1_4_1","unstructured":"Nicholas Carlini and David Wagner. 2017. Towards Evaluating the Robustness of Neural Networks. arXiv:1608.04644 [cs.CR] https:\/\/arxiv.org\/abs\/1608.04644"},{"volume-title":"Adversarial Regression for Detecting Attacks in Cyber-Physical Systems. In International Joint Conference on Artificial Intelligence.","author":"Ghafouri A.","key":"e_1_3_2_1_5_1","unstructured":"A. Ghafouri, Y. Vorobeychik, and X. Koutsoukos. 2018. Adversarial Regression for Detecting Attacks in Cyber-Physical Systems. In International Joint Conference on Artificial Intelligence."},{"key":"e_1_3_2_1_6_1","first-page":"4","article-title":"2018","volume":"51","author":"Giraldo J.","year":"2018","unstructured":"J. Giraldo, D. Urbina, A. Cardenas, J. Valente, M. Faisal, J. Ruths, N. Tippenhauer, H. Sandberg, and R. Candell. 2018. A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. ACM Comput. Surv. 51, 4, Article 76 (jul 2018), 36 pages.","journal-title":"ACM Comput. Surv."},{"key":"e_1_3_2_1_7_1","volume-title":"Explaining and Harnessing Adversarial Examples. In Intl. Conf. on Learning Representations.","author":"Goodfellow I.","year":"2014","unstructured":"I. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and Harnessing Adversarial Examples. In Intl. Conf. on Learning Representations."},{"volume-title":"ACM\/IEEE International Conference on Cyber-Physical Systems (ICCPS). 215--224","author":"Islam J.","key":"e_1_3_2_1_8_1","unstructured":"J. Islam, J. Talusan, S. Bhattacharjee, F. Tiausas, S. Vazirizade, A. Dubey, K. Yasumoto, and S. K. Das. 2022. Anomaly based Incident Detection in Large Scale Smart Transportation Systems. In ACM\/IEEE International Conference on Cyber-Physical Systems (ICCPS). 215--224."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"M. Jagielski A. Oprea B. Biggio C. Liu C. Nita-Rotaru and B. Li. 2018. Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning. In IEE Sec. & Priv. (Oakland).","DOI":"10.1109\/SP.2018.00057"},{"key":"e_1_3_2_1_10_1","volume-title":"International Conference on Learning Representations.","author":"Kurakin Alexey","year":"2017","unstructured":"Alexey Kurakin, Ian J. Goodfellow, and Samy Bengio. 2017. Adversarial Machine Learning at Scale. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"A. Oluyomi S. Bhattacharjee and S. K. Das. 2023. Detection of False Data Injection in Smart Water Metering Infrastructure. In IEEE SMARTCOMP. 267--272.","DOI":"10.1109\/SMARTCOMP58114.2023.00070"},{"key":"e_1_3_2_1_12_1","volume-title":"Insider Threat Statistics You Should Know: Updated","author":"Maddie R.","year":"2022","unstructured":"Maddie R. 2022. Insider Threat Statistics You Should Know: Updated 2022. https:\/\/www.tessian.com\/blog\/insider-threat-statistics\/"},{"key":"e_1_3_2_1_13_1","volume-title":"IEEE GLOBECOM","author":"Roy P.","year":"2020","unstructured":"P. Roy, S. Bhattacharjee, and S. K. Das. 2020. Real Time Stream Mining based Attack Detection in Distribution Level PMUs for Smart Grids. In IEEE GLOBECOM 2020."},{"key":"e_1_3_2_1_14_1","volume-title":"Adversarial Diversity and Hard Positive Generation. IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","author":"Rozsa A.","year":"2016","unstructured":"A. Rozsa, E. M. Rudd, and T. E. Boult. 2016. Adversarial Diversity and Hard Positive Generation. IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2016), 410--417."},{"key":"e_1_3_2_1_15_1","unstructured":"Pecan Street. 2009. Pecan Street Project Dataset. https:\/\/www.pecanstreet.org\/"},{"volume-title":"Ensemble Adversarial Training: Attacks and Defenses. In Intl. Conf. on Learning Representations.","author":"Tram\u00e8r F.","key":"e_1_3_2_1_16_1","unstructured":"F. Tram\u00e8r, A. Kurakin, N. Papernot, I. Goodfellow, D. Boneh, and P. McDaniel. 2018. Ensemble Adversarial Training: Attacks and Defenses. In Intl. Conf. on Learning Representations."},{"key":"e_1_3_2_1_17_1","volume-title":"Limiting the Impact of Stealthy Attacks on Industrial Control Systems. In ACM Conference on Computer and Communications Security. 1092--1105","author":"Urbina D. I.","year":"2016","unstructured":"D. I. et. al. Urbina. 2016. Limiting the Impact of Stealthy Attacks on Industrial Control Systems. In ACM Conference on Computer and Communications Security. 1092--1105."}],"event":{"name":"CODASPY '25:CODASPY '25","sponsor":["sigsac ACM Special Interest Group on Security, Audit, and Control"],"location":"Pittsburgh PA USA","acronym":"CODASPY '25"},"container-title":["Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3716815.3729009","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3716815.3729009","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3716815.3729009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T15:46:30Z","timestamp":1754667990000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3716815.3729009"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,4]]},"references-count":17,"alternative-id":["10.1145\/3716815.3729009","10.1145\/3716815"],"URL":"https:\/\/doi.org\/10.1145\/3716815.3729009","relation":{},"subject":[],"published":{"date-parts":[[2025,6,4]]},"assertion":[{"value":"2025-06-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}