iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3427228.3427660
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:14:04Z","timestamp":1730322844933,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427660","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"480-495","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems"],"prefix":"10.1145","author":[{"given":"Alessandro","family":"Erba","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany"}]},{"given":"Riccardo","family":"Taormina","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Netherlands"}]},{"given":"Stefano","family":"Galelli","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]},{"given":"Marcello","family":"Pogliani","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Italy"}]},{"given":"Michele","family":"Carminati","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Italy"}]},{"given":"Stefano","family":"Zanero","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Italy"}]},{"given":"Nils Ole","family":"Tippenhauer","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"volume-title":"Australia.","year":"2008","author":"Abrams Marshall","key":"e_1_3_2_1_1_1","unstructured":"Marshall Abrams . 2008. Malicious control system cyber security attack case study\u2013Maroochy Water Services , Australia. ( 2008 ). Marshall Abrams. 2008. Malicious control system cyber security attack case study\u2013Maroochy Water Services, Australia. (2008)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055366.3055375"},{"key":"e_1_3_2_1_3_1","first-page":"1963","article-title":"Cyber Security of Water SCADA Systems; Part I: Analysis and Experimentation of Stealthy Deception Attacks. Control Systems Technology","volume":"21","author":"Amin S.M.","year":"2013","unstructured":"S.M. Amin , X. Litrico , S. Sastry , and A.M. Bayen . 2013 . Cyber Security of Water SCADA Systems; Part I: Analysis and Experimentation of Stealthy Deception Attacks. Control Systems Technology , IEEE Transactions on 21 , 5 (2013), 1963 \u2013 1970 . S.M. Amin, X. Litrico, S. Sastry, and A.M. Bayen. 2013. Cyber Security of Water SCADA Systems; Part I: Analysis and Experimentation of Stealthy Deception Attacks. Control Systems Technology, IEEE Transactions on 21, 5 (2013), 1963\u20131970.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243781"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Battista Biggio Igino Corona Davide Maiorca Blaine Nelson Nedim \u0160rndi\u0107 Pavel Laskov Giorgio Giacinto and Fabio Roli. 2013. Evasion Attacks against Machine Learning at Test Time. In Machine Learning and Knowledge Discovery in Databases Hendrik Blockeel Kristian Kersting Siegfried Nijssen and Filip \u017delezn\u00fd (Eds.). 387\u2013402. Battista Biggio Igino Corona Davide Maiorca Blaine Nelson Nedim \u0160rndi\u0107 Pavel Laskov Giorgio Giacinto and Fabio Roli. 2013. Evasion Attacks against Machine Learning at Test Time. In Machine Learning and Knowledge Discovery in Databases Hendrik Blockeel Kristian Kersting Siegfried Nijssen and Filip \u017delezn\u00fd (Eds.). 387\u2013402.","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2010.02.014"},{"volume-title":"ACM Symp. Inf. Comput. Commun. Security.","author":"C\u00e1rdnas A.A.","key":"e_1_3_2_1_8_1","unstructured":"A.A. C\u00e1rdnas , S.M. Amin , Z.-S. Lin , Y.-L. Huang , C.-Y. Huang , and S. Sastry . 2011. Attacks against process control systems: Risk assessment, detection, and response . In ACM Symp. Inf. Comput. Commun. Security. A.A. C\u00e1rdnas, S.M. Amin, Z.-S. Lin, Y.-L. Huang, C.-Y. Huang, and S. Sastry. 2011. Attacks against process control systems: Risk assessment, detection, and response. In ACM Symp. Inf. Comput. Commun. Security."},{"key":"e_1_3_2_1_9_1","unstructured":"Nicholas Carlini Anish Athalye Nicolas Papernot Wieland Brendel Jonas Rauber Dimitris Tsipras Ian Goodfellow Aleksander Madry and Alexey Kurakin. 2019. On Evaluating Adversarial Robustness. arXiv preprint arXiv:1902.06705(2019). Nicholas Carlini Anish Athalye Nicolas Papernot Wieland Brendel Jonas Rauber Dimitris Tsipras Ian Goodfellow Aleksander Madry and Alexey Kurakin. 2019. On Evaluating Adversarial Robustness. arXiv preprint arXiv:1902.06705(2019)."},{"volume-title":"Proc. of the IEEE Symposium on Security and Privacy. 39\u201357","year":"2017","author":"Carlini N.","key":"e_1_3_2_1_10_1","unstructured":"N. Carlini and D. Wagner . 2017. Towards Evaluating the Robustness of Neural Networks . In Proc. of the IEEE Symposium on Security and Privacy. 39\u201357 . https:\/\/doi.org\/10.1109\/SP. 2017 .49 10.1109\/SP.2017.49 N. Carlini and D. Wagner. 2017. Towards Evaluating the Robustness of Neural Networks. In Proc. of the IEEE Symposium on Security and Privacy. 39\u201357. https:\/\/doi.org\/10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243752"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133978"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359847"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23265"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23313"},{"volume-title":"Article 76 (July","year":"2018","author":"Giraldo Jairo","key":"e_1_3_2_1_18_1","unstructured":"Jairo Giraldo , David Urbina , Alvaro Cardenas , Junia Valente , Mustafa Faisal , Justin Ruths , Nils\u00a0Ole Tippenhauer , Henrik Sandberg , and Richard Candell . 2018. A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. ACM Computing Surveys (CSUR) 51, 4 , Article 76 (July 2018 ), 36\u00a0pages. https:\/\/doi.org\/10.1145\/3203245 10.1145\/3203245 Jairo Giraldo, David Urbina, Alvaro Cardenas, Junia Valente, Mustafa Faisal, Justin Ruths, Nils\u00a0Ole Tippenhauer, Henrik Sandberg, and Richard Candell. 2018. A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. ACM Computing Surveys (CSUR) 51, 4, Article 76 (July 2018), 36\u00a0pages. https:\/\/doi.org\/10.1145\/3203245"},{"volume-title":"Proceedings of the thirteenth international conference on artificial intelligence and statistics. 249\u2013256","year":"2010","author":"Glorot Xavier","key":"e_1_3_2_1_19_1","unstructured":"Xavier Glorot and Yoshua Bengio . 2010 . Understanding the difficulty of training deep feedforward neural networks . In Proceedings of the thirteenth international conference on artificial intelligence and statistics. 249\u2013256 . Xavier Glorot and Yoshua Bengio. 2010. Understanding the difficulty of training deep feedforward neural networks. In Proceedings of the thirteenth international conference on artificial intelligence and statistics. 249\u2013256."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.36"},{"key":"e_1_3_2_1_21_1","unstructured":"Ian\u00a0J. Goodfellow Jonathon Shlens and Christian Szegedy. 2014. Explaining and Harnessing Adversarial Examples. CoRR abs\/1412.6572(2014). Ian\u00a0J. Goodfellow Jonathon Shlens and Christian Szegedy. 2014. Explaining and Harnessing Adversarial Examples. CoRR abs\/1412.6572(2014)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664277"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-014-0011-y"},{"volume-title":"Long short-term memory. Neural computation 9, 8","year":"1997","author":"Hochreiter Sepp","key":"e_1_3_2_1_25_1","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber . 1997. Long short-term memory. Neural computation 9, 8 ( 1997 ), 1735\u20131780. Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735\u20131780."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2008.08.003"},{"volume-title":"Centre for Research in Cyber Security","year":"2017","key":"e_1_3_2_1_28_1","unstructured":"iTrust , Centre for Research in Cyber Security , Singapore University of Technology and Design . 2017 . WADI datatset. https:\/\/itrust.sutd.edu.sg\/itrust-labs_datasets\/dataset_info\/, Last accessed on: 2020-06-15. iTrust, Centre for Research in Cyber Security, Singapore University of Technology and Design. 2017. WADI datatset. https:\/\/itrust.sutd.edu.sg\/itrust-labs_datasets\/dataset_info\/, Last accessed on: 2020-06-15."},{"key":"e_1_3_2_1_29_1","unstructured":"Keras EarlyStopping callback [n.d.]. EarlyStopping. https:\/\/keras.io\/api\/callbacks\/early_stopping. Keras EarlyStopping callback [n.d.]. EarlyStopping. https:\/\/keras.io\/api\/callbacks\/early_stopping."},{"key":"e_1_3_2_1_30_1","unstructured":"Keras ReduceLROnPlateau callback [n.d.]. ReduceLROnPlateau. https:\/\/keras.io\/api\/callbacks\/reduce_lr_on_plateau\/. Keras ReduceLROnPlateau callback [n.d.]. ReduceLROnPlateau. https:\/\/keras.io\/api\/callbacks\/reduce_lr_on_plateau\/."},{"volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980(2014).","year":"2014","author":"Kingma P","key":"e_1_3_2_1_31_1","unstructured":"Diederik\u00a0 P Kingma and Jimmy Ba . 2014 . Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980(2014). Diederik\u00a0P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980(2014)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264896"},{"key":"e_1_3_2_1_33_1","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey\u00a0E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097\u20131105. Alex Krizhevsky Ilya Sutskever and Geoffrey\u00a0E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097\u20131105."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714599"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23202"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"volume-title":"6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings.","year":"2018","author":"Madry Aleksander","key":"e_1_3_2_1_37_1","unstructured":"Aleksander Madry , Aleksandar Makelov , Ludwig Schmidt , Dimitris Tsipras , and Adrian Vladu . 2018 . Towards Deep Learning Models Resistant to Adversarial Attacks . In 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings. Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings."},{"key":"e_1_3_2_1_38_1","unstructured":"Alireza Makhzani Jonathon Shlens Navdeep Jaitly Ian Goodfellow and Brendan Frey. 2015. Adversarial autoencoders. arXiv preprint arXiv:1511.05644(2015). Alireza Makhzani Jonathon Shlens Navdeep Jaitly Ian Goodfellow and Brendan Frey. 2015. Adversarial autoencoders. arXiv preprint arXiv:1511.05644(2015)."},{"volume-title":"47th Annual Allerton Conference on. IEEE, 911\u2013918","year":"2009","author":"Mo Yilin","key":"e_1_3_2_1_39_1","unstructured":"Yilin Mo and Bruno Sinopoli . 2009 . Secure control against replay attacks. In Communication, Control, and Computing, 2009. Allerton 2009 . 47th Annual Allerton Conference on. IEEE, 911\u2013918 . Yilin Mo and Bruno Sinopoli. 2009. Secure control against replay attacks. In Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on. IEEE, 911\u2013918."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364724"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"volume-title":"The Limitations of Deep Learning in Adversarial Settings. In 2016 IEEE European Symposium on Security and Privacy (EuroSP). 372\u2013387","year":"2016","author":"Papernot N.","key":"e_1_3_2_1_43_1","unstructured":"N. Papernot , P. McDaniel , S. Jha , M. Fredrikson , Z.\u00a0 B. Celik , and A. Swami . 2016 . The Limitations of Deep Learning in Adversarial Settings. In 2016 IEEE European Symposium on Security and Privacy (EuroSP). 372\u2013387 . https:\/\/doi.org\/10.1109\/EuroSP. 2016 .36 10.1109\/EuroSP.2016.36 N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z.\u00a0B. Celik, and A. Swami. 2016. The Limitations of Deep Learning in Adversarial Settings. In 2016 IEEE European Symposium on Security and Privacy (EuroSP). 372\u2013387. https:\/\/doi.org\/10.1109\/EuroSP.2016.36"},{"volume-title":"Proc. of the IEEE Symposium on Security and Privacy. 582\u2013597","year":"2016","author":"Papernot N.","key":"e_1_3_2_1_44_1","unstructured":"N. Papernot , P. McDaniel , X. Wu , S. Jha , and A. Swami . 2016. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks . In Proc. of the IEEE Symposium on Security and Privacy. 582\u2013597 . https:\/\/doi.org\/10.1109\/SP. 2016 .41 10.1109\/SP.2016.41 N. Papernot, P. McDaniel, X. Wu, S. Jha, and A. Swami. 2016. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks. In Proc. of the IEEE Symposium on Security and Privacy. 582\u2013597. https:\/\/doi.org\/10.1109\/SP.2016.41"},{"volume-title":"Proc. of the USENIX Security Symposium","year":"2020","author":"Quinonez Raul","key":"e_1_3_2_1_45_1","unstructured":"Raul Quinonez , Jairo Giraldo , Luis Salazar , Erick Bauman , Alvaro Cardenas , and Zhiqiang Lin . 2020 . SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants . In Proc. of the USENIX Security Symposium . Boston, MA. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/quinonez Raul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, and Zhiqiang Lin. 2020. SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. In Proc. of the USENIX Security Symposium. Boston, MA. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/quinonez"},{"key":"e_1_3_2_1_46_1","unstructured":"R. Taormina. 2018. AutoEncoders for Event Detection (AEED): a Keras-based class for anomaly detection in water sensor networks.https:\/\/github.com\/rtaormina\/aeed Last accessed on: 2020-06-15. R. Taormina. 2018. AutoEncoders for Event Detection (AEED): a Keras-based class for anomaly detection in water sensor networks.https:\/\/github.com\/rtaormina\/aeed Last accessed on: 2020-06-15."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"volume-title":"Poster: Security Analysis of Multi-Sensor Fusion based Localization in Autonomous Vehicles.","year":"2020","author":"Shen Junjie","key":"e_1_3_2_1_48_1","unstructured":"Junjie Shen , Jun\u00a0Yeon Won , Shinan Liu , Qi\u00a0Alfred Chen , and Alexander Veidenbaum . 2020 . Poster: Security Analysis of Multi-Sensor Fusion based Localization in Autonomous Vehicles. (2020). Junjie Shen, Jun\u00a0Yeon Won, Shinan Liu, Qi\u00a0Alfred Chen, and Alexander Veidenbaum. 2020. Poster: Security Analysis of Multi-Sensor Fusion based Localization in Autonomous Vehicles. (2020)."},{"volume-title":"Generalized Transferability for Evasion and Poisoning Attacks. In 27th USENIX Security Symposium (USENIX Security 18)","year":"2018","author":"Suciu Octavian","key":"e_1_3_2_1_49_1","unstructured":"Octavian Suciu , Radu Marginean , Yigitcan Kaya , Hal Daume\u00a0III, and Tudor Dumitras . 2018 . When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks. In 27th USENIX Security Symposium (USENIX Security 18) . 1299\u20131316. Octavian Suciu, Radu Marginean, Yigitcan Kaya, Hal Daume\u00a0III, and Tudor Dumitras. 2018. When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks. In 27th USENIX Security Symposium (USENIX Security 18). 1299\u20131316."},{"key":"e_1_3_2_1_50_1","unstructured":"Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian\u00a0J. Goodfellow and Rob Fergus. 2013. Intriguing properties of neural networks. CoRR abs\/1312.6199(2013). arxiv:1312.6199 Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian\u00a0J. Goodfellow and Rob Fergus. 2013. Intriguing properties of neural networks. CoRR abs\/1312.6199(2013). arxiv:1312.6199"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)WR.1943-5452.0000983"},{"key":"#cr-split#-e_1_3_2_1_52_1.1","doi-asserted-by":"crossref","unstructured":"R. Taormina S. Galelli H.C. Douglas N.\u00a0O. Tippenhauer E. Salomons and A. Ostfeld. 2019. A toolbox for assessing the impacts of cyber-physical attacks on water distribution systems. Environmental Modelling Software. Environmental Modelling Software 112 (02 2019) 46-51. https:\/\/doi.org\/10.1016\/j.envsoft.2018.11.008 10.1016\/j.envsoft.2018.11.008","DOI":"10.1016\/j.envsoft.2018.11.008"},{"key":"#cr-split#-e_1_3_2_1_52_1.2","doi-asserted-by":"crossref","unstructured":"R. Taormina S. Galelli H.C. Douglas N.\u00a0O. Tippenhauer E. Salomons and A. Ostfeld. 2019. A toolbox for assessing the impacts of cyber-physical attacks on water distribution systems. Environmental Modelling Software. Environmental Modelling Software 112 (02 2019) 46-51. https:\/\/doi.org\/10.1016\/j.envsoft.2018.11.008","DOI":"10.1016\/j.envsoft.2018.11.008"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)WR.1943-5452.0000969"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483441"},{"key":"e_1_3_2_1_55_1","unstructured":"Throwing Star LAN Tap [n.d.]. Throwing Star LAN Tap. https:\/\/greatscottgadgets.com\/throwingstar\/. Throwing Star LAN Tap [n.d.]. Throwing Star LAN Tap. https:\/\/greatscottgadgets.com\/throwingstar\/."},{"volume-title":"USENIX Security Symposium. 601\u2013618","year":"2016","author":"Tram\u00e8r Florian","key":"e_1_3_2_1_56_1","unstructured":"Florian Tram\u00e8r , Fan Zhang , Ari Juels , Michael\u00a0 K Reiter , and Thomas Ristenpart . 2016 . Stealing Machine Learning Models via Prediction APIs .. In USENIX Security Symposium. 601\u2013618 . Florian Tram\u00e8r, Fan Zhang, Ari Juels, Michael\u00a0K Reiter, and Thomas Ristenpart. 2016. Stealing Machine Learning Models via Prediction APIs.. In USENIX Security Symposium. 601\u2013618."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"volume-title":"Proceedings of IEEE Symposium on Security and Privacy. 197\u2013211","year":"2014","author":"\u0160rndi\u0107 Nedim","key":"e_1_3_2_1_58_1","unstructured":"Nedim \u0160rndi\u0107 and Pavel Laskov . 2014 . Practical Evasion of a Learning-Based Classifier: A Case Study . In Proceedings of IEEE Symposium on Security and Privacy. 197\u2013211 . https:\/\/doi.org\/10.1109\/SP.2014.20 10.1109\/SP.2014.20 Nedim \u0160rndi\u0107 and Pavel Laskov. 2014. Practical Evasion of a Learning-Based Classifier: A Case Study. In Proceedings of IEEE Symposium on Security and Privacy. 197\u2013211. https:\/\/doi.org\/10.1109\/SP.2014.20"},{"volume-title":"Computer security: Is this the start of cyberwarfare?Nature 174 (June","year":"2011","author":"Weinberger Sharon","key":"e_1_3_2_1_59_1","unstructured":"Sharon Weinberger . 2011. Computer security: Is this the start of cyberwarfare?Nature 174 (June 2011 ), 142\u2013145. Sharon Weinberger. 2011. Computer security: Is this the start of cyberwarfare?Nature 174 (June 2011), 142\u2013145."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591773"},{"volume-title":"Proceedings of the Network and Distributed Systems Symposium.","year":"2016","author":"Xu Weilin","key":"e_1_3_2_1_61_1","unstructured":"Weilin Xu , Yanjun Qi , and David Evans . 2016 . Automatically evading classifiers . In Proceedings of the Network and Distributed Systems Symposium. Weilin Xu, Yanjun Qi, and David Evans. 2016. Automatically evading classifiers. In Proceedings of the Network and Distributed Systems Symposium."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","acronym":"ACSAC '20","location":"Austin USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T15:49:14Z","timestamp":1673538554000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427660"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":63,"alternative-id":["10.1145\/3427228.3427660","10.1145\/3427228"],"URL":"http:\/\/dx.doi.org\/10.1145\/3427228.3427660","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}