{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:25:03Z","timestamp":1774023903519,"version":"3.50.1"},"reference-count":67,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T00:00:00Z","timestamp":1667952000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T00:00:00Z","timestamp":1667952000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,9]]},"DOI":"10.23919\/fruct56874.2022.9953823","type":"proceedings-article","created":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T20:25:13Z","timestamp":1669667113000},"page":"3-14","source":"Crossref","is-referenced-by-count":8,"title":["Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study"],"prefix":"10.23919","author":[{"given":"Mahdi","family":"Abrishami","sequence":"first","affiliation":[{"name":"University of New Brunswick (UNB),Fredericton,Canada"}]},{"given":"Sajjad","family":"Dadkhah","sequence":"additional","affiliation":[{"name":"University of New Brunswick (UNB),Fredericton,Canada"}]},{"given":"Euclides Carlos","family":"Pinto Neto","sequence":"additional","affiliation":[{"name":"University of New Brunswick (UNB),Fredericton,Canada"}]},{"given":"Pulei","family":"Xiong","sequence":"additional","affiliation":[{"name":"Cybersecurity,National Research Council,Canada"}]},{"given":"Shahrear","family":"Iqbal","sequence":"additional","affiliation":[{"name":"National Research Council Fredericton,New Brunswick,Canada"}]},{"given":"Suprio","family":"Ray","sequence":"additional","affiliation":[{"name":"University of New Brunswick (UNB),Fredericton,Canada"}]},{"given":"Ali A.","family":"Ghorbani","sequence":"additional","affiliation":[{"name":"University of New Brunswick (UNB),Fredericton,Canada"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-1832-7.ch019"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2019.8824956"},{"key":"ref33","article-title":"Cloudeyes: Cloud-based mal-ware detection with reversible sketch for resource-constrained internet of things(iot) devices","volume":"47","author":"sun","year":"2016","journal-title":"Software Practice and Experience"},{"key":"ref32","first-page":"1","article-title":"Threat of adversarial attacks on dl-based iot device identification","author":"bao","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422402"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.49"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3395352.3402619"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.12.001"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2018.00015"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.012"},{"key":"ref60","year":"2021","journal-title":"scikit-learn developers &#x201C;sklearn svrn linearsvc"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2955129.2955178"},{"key":"ref61","first-page":"870","article-title":"Adversarial label flips attack on support vector machines","author":"xiao","year":"2012","journal-title":"ECAI 2012 IOS Press"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC50635.2020.9391558"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICESC48915.2020.9155761"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5537041"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICAML48257.2019.00043"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102352"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014337"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2014.2350451"},{"key":"ref67","first-page":"10","article-title":"Adversarial attacks against network intrusion detection in iot systems","volume":"8","author":"qiu","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"ref2","article-title":"A robust comparison of the kddcup99 and nsl-kdd iot network intrusion detection datasets through various machine learning algorithms","author":"sapre","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.106522"},{"key":"ref20","first-page":"9389","article-title":"Just how toxic is data poisoning? a unified benchmark for backdoor and data poisoning attacks","author":"schwarzschild","year":"0","journal-title":"International Conference on Machine Learning"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11012-3_23"},{"key":"ref21","first-page":"1299","article-title":"When does machine learning {FAIL}? generalized transferability for evasion and poisoning attacks","author":"suciu","year":"0","journal-title":"27th USENIX Security Symposium (USENIX Security 18)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207627"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICECE48499.2019.9058535"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON51285.2020.9298167"},{"key":"ref25","first-page":"1","article-title":"Evasion attacks with ad-versarial deep learning against power system state estimation","author":"sayghe","year":"2020","journal-title":"2020 IEEE Power & Energy Society General Meeting (PESGM)"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2016.7523532"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACPR.2017.33"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.3390\/technologies9030052"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-4470-8_18"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.3390\/jcp1020014"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.011"},{"key":"ref54","author":"hsu","year":"2003","journal-title":"A Practical Guide to Support Vector Classification"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/IPAS.2016.7880146"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ASICON47005.2019.8983598"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/technologies8040064"},{"key":"ref11","article-title":"A taxonomy and terminology of adversarial machine learning","author":"tabassi","year":"0","journal-title":"NIST IR 2019"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4067"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.03.003"},{"key":"ref13","first-page":"5","article-title":"Label sanitization against label flipping poisoning attacks","author":"paudice","year":"2018","journal-title":"Joint European Confer- ence on Machine Learning and Knowledge Discovery in Data- bases"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3018691"},{"key":"ref15","first-page":"1164","article-title":"Investigation of machine learning techniques in intrusion detection system for iot network","author":"sugi","year":"0","journal-title":"2020 3rd International Conference on Intelligent Sustainable Systems (ICISS)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2878025"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT52962.2021.9658088"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DAS54948.2022.9786101"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SEGE49949.2020.9181961"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3333501"},{"key":"ref3","author":"kinsey","year":"2017","journal-title":"What's new with the inter-net of things"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref8","first-page":"1","article-title":"Towards the development of a realistic multi-dimensional iot profiling dataset","author":"dadkhah","year":"0","journal-title":"2022 19th Annual International Conferenceon Privacy Security Trust (PST)"},{"key":"ref7","year":"2021","journal-title":"The BoT-IoT Dataset"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2901469"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2018.2884910"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403655"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3138541"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CISS48834.2020.1570617416"},{"key":"ref42","article-title":"Generative poisoning attack method against neural networks","author":"yang","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04831-9"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599832"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339697"}],"event":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","location":"Tampere, Finland","start":{"date-parts":[[2022,11,9]]},"end":{"date-parts":[[2022,11,11]]}},"container-title":["2022 32nd Conference of Open Innovations Association (FRUCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9953737\/9953804\/09953823.pdf?arnumber=9953823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,6]],"date-time":"2023-02-06T19:29:08Z","timestamp":1675711748000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9953823\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,9]]},"references-count":67,"URL":"https:\/\/doi.org\/10.23919\/fruct56874.2022.9953823","relation":{},"subject":[],"published":{"date-parts":[[2022,11,9]]}}}