{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T20:35:20Z","timestamp":1721334920052},"reference-count":0,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"PRIN 2017 project RexLearn","award":["2017TWNMH2"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1109\/mc.2023.3299572","type":"journal-article","created":{"date-parts":[[2024,3,6]],"date-time":"2024-03-06T18:53:50Z","timestamp":1709751230000},"page":"26-34","source":"Crossref","is-referenced-by-count":4,"title":["Machine Learning Security Against Data Poisoning: Are We There Yet?"],"prefix":"10.1109","volume":"57","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-3807-6417","authenticated-orcid":false,"given":"Antonio Emanuele","family":"Cin\u00e0","sequence":"first","affiliation":[{"name":"Department of Computer Science, Bioengineering, Robotics, and Systems Engineering, University of Genova, Genova, Italy"}]},{"given":"Kathrin","family":"Grosse","sequence":"additional","affiliation":[{"name":"School of Architecture, Civil, and Environmental Engineering, École Polytechnique Fédérale de Lausanne, Lausanne, Switzerland"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9318-6913","authenticated-orcid":false,"given":"Ambra","family":"Demontis","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, University of Cagliari, Cagliari, Italy"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7752-509X","authenticated-orcid":false,"given":"Battista","family":"Biggio","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, University of Cagliari, Cagliari, Italy"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4103-9190","authenticated-orcid":false,"given":"Fabio","family":"Roli","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Bioengineering, Robotics, and Systems Engineering, University of Genova, Genova, Italy"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8992-9243","authenticated-orcid":false,"given":"Marcello","family":"Pelillo","sequence":"additional","affiliation":[{"name":"Department of Environmental Sciences, Informatics, and Statistics, Ca’ Foscari University of Venice, Venice, Italy"}]}],"member":"263","container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/10461644\/10461694.pdf?arnumber=10461694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T19:14:44Z","timestamp":1709838884000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10461694\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":0,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mc.2023.3299572","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"value":"0018-9162","type":"print"},{"value":"1558-0814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3]]}}}