{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:21:27Z","timestamp":1730211687422,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679401","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"9-15","source":"Crossref","is-referenced-by-count":0,"title":["Verifying the Robustness of Machine Learning based Intrusion Detection Against Adversarial Perturbation"],"prefix":"10.1109","author":[{"given":"Ehsan","family":"Nowroozi","sequence":"first","affiliation":[{"name":"Department of Business and Computing, Ravensbourne University,London,United Kingdom"}]},{"given":"Rahim","family":"Taheri","sequence":"additional","affiliation":[{"name":"School of Computing, University of Portsmouth,United Kingdom"}]},{"given":"Mehrdad","family":"Hajizadeh","sequence":"additional","affiliation":[{"name":"Technische Universität Chemnitz, Chair of Communication Networks,Chemnitz,Germany"}]},{"given":"Thomas","family":"Bauschert","sequence":"additional","affiliation":[{"name":"Technische Universität Chemnitz, Chair of Communication Networks,Chemnitz,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3329081"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-49803-9","volume-title":"Adversarial Multimedia Foren-sics","author":"Nowroozi","year":"2024"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM59352.2023.10327863"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS56928.2023.10154343"},{"issue":"1","key":"ref6","first-page":"457","article-title":"Perusing the effect of discretization of data on accuracy of predicting naive bayes algorithm","author":"Parsaei","year":"2016","journal-title":"Journal of Current Research in Science"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49033.2022.9700498"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking62109.2024.10619725"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3289625"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102092"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0048-x"},{"journal-title":"Explainable ai is responsible ai: How ex-plainability creates trustworthy and socially responsible artificial intel-ligence","year":"2023","author":"Baker","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445923"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3536425"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3204171"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3282981"},{"journal-title":"Explaining and harnessing adversarial examples","year":"2015","author":"Goodfellow","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3164354"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3233793"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_5"},{"key":"ref23","article-title":"On the effectiveness of interval bound propagation for training verifiably robust models","author":"Gowal","year":"2018","journal-title":"arXiv preprint"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC51019.2021.9418291"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3299815.3314439"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3056614"},{"key":"ref27","first-page":"41","article-title":"A deep learning approach to network intrusion detection","volume-title":"IEEE Transactions on Emerging Topics in Computational Intelligence","volume":"2","author":"Shone","year":"2018"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2021.3139170"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107784"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3358228"},{"journal-title":"Efficient and accurate estimation of lipschitz constants for deep neural networks","year":"2023","author":"Fazlyab","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108719"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordjournals.pan.a004868"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"volume-title":"Ids-ibp","year":"2024","author":"Nowroozi","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3267831"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2024,9,2]]},"location":"London, United Kingdom","end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679401.pdf?arnumber=10679401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T04:58:02Z","timestamp":1727240282000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679401\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679401","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}