{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T04:14:24Z","timestamp":1730261664550,"version":"3.28.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"9-10","license":[{"start":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T00:00:00Z","timestamp":1712275200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T00:00:00Z","timestamp":1712275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Hexa-X II","award":["1010957591010957"]},{"DOI":"10.13039\/501100004410","name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ft\u0131rma Kurumu","doi-asserted-by":"publisher","award":["5169902"],"id":[{"id":"10.13039\/501100004410","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s12243-024-01031-7","type":"journal-article","created":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T08:01:54Z","timestamp":1712304114000},"page":"663-677","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Guarding 6G use cases: a deep dive into AI\/ML threats in All-Senses meeting"],"prefix":"10.1007","volume":"79","author":[{"given":"Leyli","family":"Kara\u00e7ay","sequence":"first","affiliation":[]},{"given":"Zakaria","family":"Laaroussi","sequence":"additional","affiliation":[]},{"given":"Sonika","family":"ujjwal","sequence":"additional","affiliation":[]},{"given":"Elif Ustundag","family":"Soykan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,5]]},"reference":[{"key":"1031_CR1","doi-asserted-by":"publisher","unstructured":"Kara\u00e7ay, L, Laaroussi Z, Ujjwal S, Soykan EU (2023) On the security of 6G use cases: AI\/ML-specific threat modeling of All-Senses meeting. In: 2023 2nd International conference on 6g networking (6GNet), pp 1\u20138. https:\/\/doi.org\/10.1109\/6GNet58894.2023.10317758","DOI":"10.1109\/6GNet58894.2023.10317758"},{"key":"1031_CR2","unstructured":"Khorsandi BM (2022) Targets and requirements for 6G - initial E2E architecture. report, European Union\u2019s Horizon 2020 research and innovation programme. https:\/\/hexa-x.eu\/wp-content\/uploads\/2022\/03\/Hexa-X_D1.3.pdf"},{"key":"1031_CR3","doi-asserted-by":"crossref","unstructured":"Kononenko D, Lempitsky V (2015) Learning to look up: realtime monocular gaze correction using machine learning. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 4667\u20134675","DOI":"10.1109\/CVPR.2015.7299098"},{"key":"1031_CR4","doi-asserted-by":"publisher","unstructured":"Lombardi S, Simon T, Saragih J, Schwartz G, Lehrmann A, Sheikh Y (2019) Neural volumes: learning dynamic renderable volumes from images. ACM Trans Graph 38(4). https:\/\/doi.org\/10.1145\/3306346.3323020","DOI":"10.1145\/3306346.3323020"},{"issue":"17","key":"1031_CR5","doi-asserted-by":"publisher","first-page":"6662","DOI":"10.3390\/s22176662","volume":"22","author":"L Mauri","year":"2022","unstructured":"Mauri L, Damiani E (2022) Modeling threats to AI-ML systems using STRIDE. Sensors 22(17):6662","journal-title":"Sensors"},{"key":"1031_CR6","doi-asserted-by":"publisher","unstructured":"Laaroussi Z, Ustundag\u00a0Soykan E, Liljenstam M, G\u00fclen U, Kara\u00e7ay L, Tomur E (2022) On the security of 6G use cases: threat analysis of \u2019All-Senses Meeting\u2019.In: 2022 IEEE 19th annual consumer communications & networking conference (CCNC), pp 1\u20136. https:\/\/doi.org\/10.1109\/CCNC49033.2022.9700673","DOI":"10.1109\/CCNC49033.2022.9700673"},{"key":"1031_CR7","unstructured":"Shevchenko N, Chick TA, O\u2019Riordan P, Scanlon TP, Woody C (2018) Threat modeling: a summary of available methods. Technical report, Carnegie Mellon University Software Engineering Institute Pittsburgh United"},{"key":"1031_CR8","doi-asserted-by":"crossref","unstructured":"Lawrence J, Goldman DB, Achar S, Blascovich GM, Desloge JG, Fortes T, Gomez EM, H\u00e4berling S, Hoppe H, Huibers A, Knaus C, Kuschak B, Martin-Brualla R, Nover H, Russell AI, Seitz SM, Tong K (2021) Project Starline: a high-fidelity telepresence system. ACM Trans Graph (Proc SIGGRAPH Asia) 40(6)","DOI":"10.1145\/3478513.3480490"},{"key":"1031_CR9","unstructured":"Akyildiz IF, Guo H (2022) Holographic-type communication: a new challenge for the next decade"},{"issue":"1","key":"1031_CR10","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/MCOM.001.1900272","volume":"58","author":"A Clemm","year":"2020","unstructured":"Clemm A, Vega MT, Ravuri HK, Wauters T, Turck FD (2020) Toward truly immersive holographic-type communication: challenges and solutions. IEEE Commun Mag 58(1):93\u201399. https:\/\/doi.org\/10.1109\/MCOM.001.1900272","journal-title":"IEEE Commun Mag"},{"key":"1031_CR11","doi-asserted-by":"publisher","first-page":"65797","DOI":"10.1109\/ACCESS.2019.2917291","volume":"7","author":"D You","year":"2019","unstructured":"You D, Doan TV, Torre R, Mehrabi M, Kropp A, Nguyen V, Salah H, Nguyen GT, Fitzek FHP (2019) Fog computing as an enabler for immersive media: service scenarios and research opportunities. IEEE Access 7:65797\u201365810. https:\/\/doi.org\/10.1109\/ACCESS.2019.2917291","journal-title":"IEEE Access"},{"issue":"7858","key":"1031_CR12","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1038\/s41586-021-03476-5","volume":"593","author":"L Shi","year":"2021","unstructured":"Shi L, Li B, Kim C, Kellnhofer P (2021) Author Correction: Towards real-time photorealistic 3D holography with deep neural networks. Nature 593(7858):13\u201313. https:\/\/doi.org\/10.1038\/s41586-021-03476-5","journal-title":"Nature"},{"key":"1031_CR13","doi-asserted-by":"publisher","first-page":"90495","DOI":"10.1109\/ACCESS.2020.2993803","volume":"8","author":"K Patel","year":"2020","unstructured":"Patel K, Mehta D, Mistry C, Gupta R, Tanwar S, Kumar N, Alazab M (2020) Facial sentiment analysis using AI techniques: state-of-the-art, taxonomies, and challenges. IEEE Access 8:90495\u201390519. https:\/\/doi.org\/10.1109\/ACCESS.2020.2993803","journal-title":"IEEE Access"},{"key":"1031_CR14","unstructured":"NVIDIA (2020) NVIDIA announces cloud-AI video-streaming platform to better connect millions working and studying remotely"},{"key":"1031_CR15","doi-asserted-by":"publisher","unstructured":"Martinek R, Kelnar M, Vanus J, Koudelka P, Bilik P, Koziorek J, Zidek J (2015) Adaptive noise suppression in voice communication using a neuro-fuzzy inference system. In: 2015 38th International conference on telecommunications and signal processing (TSP), pp 382\u2013386. https:\/\/doi.org\/10.1109\/TSP.2015.7296288","DOI":"10.1109\/TSP.2015.7296288"},{"key":"1031_CR16","unstructured":"MPAI Community. http:\/\/mpai.community"},{"key":"1031_CR17","unstructured":"Bibhudatta, D (2023) Generative AI will transform virtual meetings"},{"key":"1031_CR18","doi-asserted-by":"crossref","unstructured":"Hasan R, Hasan R (2021) Towards a threat model and security analysis of video conferencing systems. In: 2021 IEEE 18th annual consumer communications & networking conference (CCNC), pp 1\u20134. IEEE","DOI":"10.1109\/CCNC49032.2021.9369505"},{"key":"1031_CR19","doi-asserted-by":"publisher","first-page":"90677","DOI":"10.1109\/ACCESS.2021.3091722","volume":"9","author":"T Isobe","year":"2021","unstructured":"Isobe T, Ito R (2021) Security analysis of end-to-end encryption for zoom meetings. IEEE Access 9:90677\u201390689","journal-title":"IEEE Access"},{"key":"1031_CR20","doi-asserted-by":"publisher","unstructured":"Ling C, Balc\u0131 U, Blackburn J, Stringhini G (2021) A first look at Zoombombing. In: 2021 IEEE symposium on security and privacy (SP), pp 1452\u20131467. https:\/\/doi.org\/10.1109\/SP40001.2021.00061","DOI":"10.1109\/SP40001.2021.00061"},{"key":"1031_CR21","doi-asserted-by":"crossref","unstructured":"Qamar S, Anwar Z, Afzal M (2023) A systematic threat analysis and defense strategies for the metaverse and extended reality systems. Comput Secur 103127","DOI":"10.1016\/j.cose.2023.103127"},{"key":"1031_CR22","unstructured":"Challenges AC (2020) AI cybersecurity challenges,threat landscape for artificial intelligence. report, European Union Agency for Cybersecurity, ENISA. https:\/\/www.enisa.europa.eu\/publications\/artificial-intelligence-cybersecurity-challenges"},{"key":"1031_CR23","doi-asserted-by":"crossref","unstructured":"Tabassi E, Burns KJ, Hadjimichael M, Molina-Markham AD, Sexton JT (2019) A taxonomy and terminology of adversarial machine learning. NIST IR, 1\u201329","DOI":"10.6028\/NIST.IR.8269-draft"},{"key":"1031_CR24","doi-asserted-by":"crossref","unstructured":"Papernot N (2018) A marauder\u2019s map of security and privacy in machine learning: an overview of current and future research directions for making machine learning secure and private. In: Proceedings of the 11th ACM workshop on artificial intelligence and security, pp 1\u20131","DOI":"10.1145\/3270101.3270102"},{"key":"1031_CR25","doi-asserted-by":"crossref","unstructured":"Papernot N, McDaniel P, Sinha A, Wellman MP (2018) SoK: security and privacy in machine learning. In: 2018 IEEE european symposium on security and privacy (EuroS & P), pp 399\u2013414. IEEE","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"1031_CR26","doi-asserted-by":"crossref","unstructured":"Barreno M, Nelson B, Sears R, Joseph AD, Tygar JD (2006) Can machine learning be secure? In: Proceedings of the 2006 ACM symposium on information, computer and communications security, pp 16\u201325","DOI":"10.1145\/1128817.1128824"},{"key":"1031_CR27","doi-asserted-by":"crossref","unstructured":"Mauri L, Damiani E (2021) STRIDE-AI: an approach to identifying vulnerabilities of machine learning assets. In: 2021 IEEE international conference on cyber security and resilience (CSR), pp 147\u2013154. IEEE","DOI":"10.1109\/CSR51186.2021.9527917"},{"key":"1031_CR28","unstructured":"Industry Specification Group (ISG) Securing artificial intelligence (SAI) (2021) Securing Artificial Intelligence (SAI). ETSI, France"},{"key":"1031_CR29","unstructured":"Brown T, Mann B, Ryder N, Subbiah M, Kaplan JDea (2020) Language models are few-shot learners. In: Larochelle, H, Ranzato M, Hadsell R, Balcan MF, Lin H (eds) Advances in neural information processing systems, vol 33, pp 1877\u20131901. Curran Associates, Inc., ???. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2020\/file\/1457c0d6bfcb4967418bfb8ac142f64a-Paper.pdf"},{"key":"1031_CR30","unstructured":"Selin J (2019) Evaluation of threat modeling methodologies"},{"key":"1031_CR31","unstructured":"National Cyber Security Center (2023) Using attack trees to understand cyber security risk. https:\/\/www.ncsc.gov.uk\/collection\/risk-management\/using-attack-trees-to-understand-cyber-security-risk"},{"key":"1031_CR32","unstructured":"Microsoft (2021) Microsoft AI Security Risk Assessment, Best Practices and Guidance to Secure AI Systems"},{"key":"1031_CR33","unstructured":"Casella D, Lawson L (2022) AI and privacy: everything you need to know about trust and technology. https:\/\/www.ericsson.com\/en\/blog\/2022\/8\/ai-and-privacy-everything-you-need-to-know"},{"key":"1031_CR34","unstructured":"Boyd C (2022) Meta blows safety bubble around users after reports of sexual harassment"},{"key":"1031_CR35","unstructured":"Hong S, Chandrasekaran V, Kaya Y, Dumitras T, Papernot N (2020) On the effectiveness of mitigating data poisoning attacks with gradient shaping. ArXiv:2002.11497"},{"key":"1031_CR36","unstructured":"Nelson B, Barreno M, Chi FJ, Joseph AD, Rubinstein BIP, Saini U, Sutton C, Tygar JD, Xia K (2008) Exploiting machine learning to subvert your spam filter. In: USENIX workshop on large-scale exploits and emergent threats"},{"key":"1031_CR37","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.AI.100-2e2023.ipd","volume-title":"Adversarial machine learning: a taxonomy and terminology of attacks and mitigations (draft)","author":"A Oprea","year":"2023","unstructured":"Oprea A, Vassilev A (2023) Adversarial machine learning: a taxonomy and terminology of attacks and mitigations (draft). Technical report, National Institute of Standards and Technology"},{"key":"1031_CR38","unstructured":"Goodfellow I, Bengio Y, Courville A (2016) Deep learning. MIT press, ???"},{"key":"1031_CR39","doi-asserted-by":"publisher","first-page":"97495","DOI":"10.1109\/ACCESS.2022.3204037","volume":"10","author":"E Ustundag Soykan","year":"2022","unstructured":"Ustundag Soykan E, Kara\u00e7ay L, Karako\u00e7 F, Tomur E (2022) A survey and guideline on privacy enhancing technologies for collaborative machine learning. IEEE Access 10:97495\u201397519. https:\/\/doi.org\/10.1109\/ACCESS.2022.3204037","journal-title":"IEEE Access"},{"key":"1031_CR40","unstructured":"Foundation TO (2023) OWASP API Security Project.https:\/\/owasp.org\/www-project-api-security\/"},{"key":"1031_CR41","unstructured":"Foundation TO (2023) OWASP top 10 for large language model applications.https:\/\/owasp.org\/www-project-top-10-for-large-language-model-applications"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-024-01031-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-024-01031-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-024-01031-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:19:50Z","timestamp":1730197190000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-024-01031-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,5]]},"references-count":41,"journal-issue":{"issue":"9-10","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["1031"],"URL":"https:\/\/doi.org\/10.1007\/s12243-024-01031-7","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2024,4,5]]},"assertion":[{"value":"30 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}