{"id":"https://openalex.org/W4292432025","doi":"https://doi.org/10.1111/exsy.13072","title":"SVM\u2010based generative adverserial networks for federated learning and edge computing attack model and outpoising","display_name":"SVM\u2010based generative adverserial networks for federated learning and edge computing attack model and outpoising","publication_year":2022,"publication_date":"2022-08-09","ids":{"openalex":"https://openalex.org/W4292432025","doi":"https://doi.org/10.1111/exsy.13072"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1111/exsy.13072","pdf_url":null,"source":{"id":"https://openalex.org/S72232612","display_name":"Expert Systems","issn_l":"0266-4720","issn":["0266-4720","1468-0394"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032558763","display_name":"Poongodi Manoharan","orcid":"https://orcid.org/0000-0001-6801-6138"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Poongodi Manoharan","raw_affiliation_strings":["Division of Information and Communication Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Division of Information and Communication Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050805123","display_name":"Ranjan Walia","orcid":"https://orcid.org/0000-0002-8042-9768"},"institutions":[{"id":"https://openalex.org/I4210127441","display_name":"Indian Institute of Technology Jammu","ror":"https://ror.org/02f0vsw63","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210127441"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ranjan Walia","raw_affiliation_strings":["Department of Electrical Engineering, Model Insitute of Engineering and Technology, Jammu, India"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Model Insitute of Engineering and Technology, Jammu, India","institution_ids":["https://openalex.org/I4210127441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081281059","display_name":"Celestine Iwendi","orcid":"https://orcid.org/0000-0003-4350-3911"},"institutions":[{"id":"https://openalex.org/I165678365","display_name":"University of Bolton","ror":"https://ror.org/01t884y44","country_code":"GB","type":"education","lineage":["https://openalex.org/I165678365"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Celestine Iwendi","raw_affiliation_strings":["School of Creative Technologies, University of Bolton, Bolton, UK"],"affiliations":[{"raw_affiliation_string":"School of Creative Technologies, University of Bolton, Bolton, UK","institution_ids":["https://openalex.org/I165678365"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034250987","display_name":"Tariq Ahamed Ahanger","orcid":"https://orcid.org/0000-0002-4525-0738"},"institutions":[{"id":"https://openalex.org/I142608572","display_name":"Prince Sattam Bin Abdulaziz University","ror":"https://ror.org/04jt46d36","country_code":"SA","type":"education","lineage":["https://openalex.org/I142608572"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Tariq Ahamed Ahanger","raw_affiliation_strings":["Information Systems, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Information Systems, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia","institution_ids":["https://openalex.org/I142608572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108122512","display_name":"S. T. Suganthi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210125537","display_name":"Lebanese French University","ror":"https://ror.org/030t96b35","country_code":"IQ","type":"education","lineage":["https://openalex.org/I4210125537"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"S. T. Suganthi","raw_affiliation_strings":["Department of Computer Engineering, Lebanese French University, Erbil, Iraq"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Lebanese French University, Erbil, Iraq","institution_ids":["https://openalex.org/I4210125537"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009934723","display_name":"M. M. Kamruzzaman","orcid":"https://orcid.org/0000-0001-8464-1523"},"institutions":[{"id":"https://openalex.org/I199702508","display_name":"Al Jouf University","ror":"https://ror.org/02zsyt821","country_code":"SA","type":"education","lineage":["https://openalex.org/I199702508"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"M. M. Kamruzzaman","raw_affiliation_strings":["Department of Computer Science, College of Computer and Information Science Jouf University, Sakaka, KSA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer and Information Science Jouf University, Sakaka, KSA","institution_ids":["https://openalex.org/I199702508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024097894","display_name":"Sami Bourouis","orcid":"https://orcid.org/0000-0002-6638-7039"},"institutions":[{"id":"https://openalex.org/I179331831","display_name":"Taif University","ror":"https://ror.org/014g1a453","country_code":"SA","type":"education","lineage":["https://openalex.org/I179331831"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Sami Bourouis","raw_affiliation_strings":["Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003710841","display_name":"Wajdi Alhakami","orcid":"https://orcid.org/0000-0003-1230-9470"},"institutions":[{"id":"https://openalex.org/I179331831","display_name":"Taif University","ror":"https://ror.org/014g1a453","country_code":"SA","type":"education","lineage":["https://openalex.org/I179331831"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Wajdi Alhakami","raw_affiliation_strings":["Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001299811","display_name":"Mounir Hamdi","orcid":"https://orcid.org/0000-0002-9766-0085"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Mounir Hamdi","raw_affiliation_strings":["Division of Information and Communication Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Division of Information and Communication Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]}],"institution_assertions":[],"countries_distinct_count":5,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5032558763","https://openalex.org/A5081281059","https://openalex.org/A5009934723"],"corresponding_institution_ids":["https://openalex.org/I4210144839","https://openalex.org/I165678365","https://openalex.org/I199702508"],"apc_list":{"value":3860,"currency":"USD","value_usd":3860,"provenance":"doaj"},"apc_paid":null,"fwci":9.185,"has_fulltext":false,"cited_by_count":54,"citation_normalized_percentile":{"value":0.99997,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"40","issue":"5","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Deep Learning Models","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Deep Learning Models","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Characterization and Detection of Android Malware","score":0.9903,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/discriminator","display_name":"Discriminator","score":0.77733123},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated Learning","score":0.573951},{"id":"https://openalex.org/keywords/membership-inference-attacks","display_name":"Membership Inference Attacks","score":0.533378},{"id":"https://openalex.org/keywords/secure-computation","display_name":"Secure Computation","score":0.516826},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep Learning","score":0.515933},{"id":"https://openalex.org/keywords/adversarial-examples","display_name":"Adversarial Examples","score":0.502481},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.4609087},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.43082237}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.90230834},{"id":"https://openalex.org/C2779803651","wikidata":"https://www.wikidata.org/wiki/Q5282088","display_name":"Discriminator","level":3,"score":0.77733123},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7070943},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6982559},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.58721536},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.50317806},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.46729472},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.46513718},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.4609087},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.44349873},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.43082237},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.42462516},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34166533},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19003096},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1111/exsy.13072","pdf_url":null,"source":{"id":"https://openalex.org/S72232612","display_name":"Expert Systems","issn_l":"0266-4720","issn":["0266-4720","1468-0394"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.68,"id":"https://metadata.un.org/sdg/10"}],"grants":[{"funder":"https://openalex.org/F4320309815","funder_display_name":"Qatar Foundation","award_id":null},{"funder":"https://openalex.org/F4320323722","funder_display_name":"Taif University","award_id":"TURSP\u20102020/107"}],"datasets":[],"versions":[],"referenced_works_count":59,"referenced_works":["https://openalex.org/W1968411139","https://openalex.org/W2019240280","https://openalex.org/W2053637704","https://openalex.org/W2070922421","https://openalex.org/W2072277721","https://openalex.org/W2107397716","https://openalex.org/W2293066912","https://openalex.org/W2346078635","https://openalex.org/W2417915283","https://openalex.org/W2559840118","https://openalex.org/W2591882872","https://openalex.org/W2596636257","https://openalex.org/W2735056258","https://openalex.org/W2765325683","https://openalex.org/W2767079719","https://openalex.org/W2768475350","https://openalex.org/W2773459750","https://openalex.org/W2790661630","https://openalex.org/W2912213068","https://openalex.org/W2926061468","https://openalex.org/W2934843808","https://openalex.org/W2962763344","https://openalex.org/W2963178695","https://openalex.org/W2963456518","https://openalex.org/W2964162474","https://openalex.org/W2964381969","https://openalex.org/W2980261328","https://openalex.org/W2982302101","https://openalex.org/W2986455874","https://openalex.org/W2989979564","https://openalex.org/W2990041205","https://openalex.org/W3009927559","https://openalex.org/W3016025798","https://openalex.org/W3016481661","https://openalex.org/W3033079786","https://openalex.org/W3081389481","https://openalex.org/W3084847664","https://openalex.org/W3093836107","https://openalex.org/W3119161496","https://openalex.org/W3128215001","https://openalex.org/W3130982961","https://openalex.org/W3135672363","https://openalex.org/W3157237205","https://openalex.org/W3157369405","https://openalex.org/W3163222347","https://openalex.org/W3173865055","https://openalex.org/W3178811037","https://openalex.org/W3192770481","https://openalex.org/W3193171431","https://openalex.org/W3193349739","https://openalex.org/W3203893856","https://openalex.org/W4206940055","https://openalex.org/W4213221860","https://openalex.org/W4213287091","https://openalex.org/W4214758171","https://openalex.org/W4281386550","https://openalex.org/W4283264067","https://openalex.org/W4284966659","https://openalex.org/W747247434"],"related_works":["https://openalex.org/W4380714744","https://openalex.org/W4319453655","https://openalex.org/W4293202849","https://openalex.org/W2964074194","https://openalex.org/W2387995142","https://openalex.org/W2089959425","https://openalex.org/W2057775761","https://openalex.org/W1980965563","https://openalex.org/W1608433645","https://openalex.org/W1489300767"],"abstract_inverted_index":{"Abstract":[0],"Machine":[1,97],"learning":[2,30,98,194,199],"are":[3,47],"vulnerable":[4],"to":[5,18,23,50,139,154,172],"the":[6,12,16,20,25,29,33,52,57,74,96,102,108,111,114,132,141,156,159,173,178,182,189,192],"threats.":[7],"The":[8,42,118,135],"Intruders":[9],"can":[10,146],"utilize":[11],"malicious":[13],"nature":[14],"of":[15,110,116,124,166],"nodes":[17],"attack":[19,45,168],"training":[21,99],"dataset":[22],"worsen":[24],"process":[26,115],"and":[27,31,40,62,70,131,144,196],"manipulate":[28],"make":[32],"over":[34],"all":[35],"system":[36,120,137],"with":[37],"less":[38],"efficiency":[39],"performance.":[41],"optimized":[43],"poison":[44],"procedures":[46],"already":[48],"introduced":[49],"estimate":[51],"overall":[53],"bad":[54],"scenario,":[55],"design":[56],"intrusion":[58],"as":[59,149,151],"bi\u2010level":[60],"optimization":[61],"it":[63,145],"is":[64,68,76,185],"considered":[65],"computational":[66],"complexity":[67],"high":[69],"demanding,":[71],"in":[72,113],"contrary":[73],"applicability":[75],"limited":[77],"such":[78],"models":[79],"deep":[80,198],"neural":[81],"networks.":[82,200],"In":[83],"this":[84],"research":[85],"papers,":[86],"we":[87],"have":[88,121,163],"proposed,":[89],"novel":[90],"proposed":[91,119,136,183],"system,":[92],"poisoning":[93],"attacks":[94,153],"against":[95],"dataset,":[100],"including":[101],"genuine":[103],"data":[104,161],"points":[105],"that":[106,181],"reduce":[107],"accuracy":[109],"classifier":[112],"training.":[117],"3":[122],"components":[123],"Generative":[125],"Adverserial":[126],"networks":[127],"(GAN)":[128],"generator,":[129],"discriminator,":[130],"target":[133],"classifier.":[134],"allows":[138],"detect":[140,155],"vulnerability":[142,171],"easy":[143],"be":[147],"found":[148],"similar":[150],"realistic":[152],"area":[157],"where":[158],"underlying":[160],"distribution":[162],"more":[164],"possibility":[165],"poising":[167],"which":[169],"cause":[170],"network.":[174],"Our":[175],"experimentation,":[176],"proves":[177],"claim":[179],"our":[180],"model":[184],"effective":[186],"on":[187],"compromising":[188],"classifiers":[190],"uses":[191],"machine":[193],"algorithms":[195],"also":[197]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4292432025","counts_by_year":[{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":27},{"year":2022,"cited_by_count":15}],"updated_date":"2024-11-28T17:09:40.994692","created_date":"2022-08-20"}