{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:15:14Z","timestamp":1730283314641,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency (DARPA)","doi-asserted-by":"publisher","award":["HR001120C0012"],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,29]]},"DOI":"10.1109\/milcom52596.2021.9653040","type":"proceedings-article","created":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T21:06:10Z","timestamp":1640898370000},"page":"880-885","source":"Crossref","is-referenced-by-count":0,"title":["Combinatorial Boosting of Ensembles of Diversified Classifiers for Defense Against Evasion Attacks"],"prefix":"10.1109","author":[{"given":"Rauf","family":"Izmailov","sequence":"first","affiliation":[{"name":"Peraton Labs Inc.,USA"}]},{"given":"Peter","family":"Lin","sequence":"additional","affiliation":[{"name":"Peraton Labs Inc.,USA"}]},{"given":"Sridhar","family":"Venkatesan","sequence":"additional","affiliation":[{"name":"Peraton Labs Inc.,USA"}]},{"given":"Shridatt","family":"Sugrim","sequence":"additional","affiliation":[{"name":"Peraton Labs Inc.,USA"}]}],"member":"263","reference":[{"journal-title":"On adaptive attacks to adversarial example defenses","year":"2020","author":"tramer","key":"ref10"},{"journal-title":"Civtak news licensing support & download for civtak \/ tak tools","year":"2021","key":"ref11"},{"journal-title":"slowloris py - Simple slowloris in Python","year":"2015","author":"yaltirakli","key":"ref12"},{"journal-title":"Cylance I Kill You!","year":"2019","author":"ashkenazy","key":"ref13"},{"key":"ref14","first-page":"1","article-title":"Hidost: a static machine-learning-based detector of malicious files","volume":"2016","author":"\u0161rndi?","year":"2016","journal-title":"EURASIP Journal on Information Security"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00015"},{"journal-title":"Adversarial examples for deep learning cyber security analytics","year":"2019","author":"chernikova","key":"ref16"},{"key":"ref17","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2017","journal-title":"ArXiv Preprint"},{"journal-title":"Cifar-10 (canadian institute for advanced research)","year":"2009","author":"krizhevsky","key":"ref18"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref3","article-title":"Transferability in machine learning: from phenomena to black-box attacks using adversarial samples","author":"papernot","year":"2016","journal-title":"CoRR"},{"journal-title":"Anomalous example detection in deep learning A survey","year":"2021","author":"bulusu","key":"ref6"},{"journal-title":"Security matters A survey on adversarial machine learning","year":"2018","author":"li","key":"ref5"},{"journal-title":"Athena A framework based on diverse weak defenses for building adversarial defense","year":"2020","author":"meng","key":"ref8"},{"journal-title":"Trs Transferability reduced ensemble via encouraging gradient diversity and model smoothness","year":"2021","author":"yang","key":"ref7"},{"key":"ref2","first-page":"1","article-title":"Security evaluation of pattern classifiers under attack","volume":"99","author":"biggio","year":"2013","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref1","first-page":"69","article-title":"Adversarial machine learning-industry perspectives","author":"kumar","year":"0","journal-title":"2020 IEEE Security and Privacy Workshops (SPW)"},{"key":"ref9","article-title":"Adversarial example defense: Ensembles of weak defenses are not strong","author":"he","year":"2017","journal-title":"11th USENIX Workshop on Offensive Technologies (WOOT 17)"}],"event":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2021,11,29]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2021,12,2]]}},"container-title":["MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9652874\/9652880\/09653040.pdf?arnumber=9653040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:09:29Z","timestamp":1659485369000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9653040\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,29]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/milcom52596.2021.9653040","relation":{},"subject":[],"published":{"date-parts":[[2021,11,29]]}}}