{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:21:29Z","timestamp":1729650089431,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,29]]},"DOI":"10.1109\/milcom52596.2021.9653139","type":"proceedings-article","created":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T21:06:10Z","timestamp":1640898370000},"page":"181-188","source":"Crossref","is-referenced-by-count":7,"title":["Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance"],"prefix":"10.1109","author":[{"given":"Jack W.","family":"Stokes","sequence":"first","affiliation":[{"name":"Microsoft Research,Redmond,WA,USA"}]},{"given":"Paul","family":"England","sequence":"additional","affiliation":[{"name":"Microsoft Research,Redmond,WA,USA"}]},{"given":"Kevin","family":"Kane","sequence":"additional","affiliation":[{"name":"Microsoft Research,Redmond,WA,USA"}]}],"member":"263","reference":[{"key":"ref31","first-page":"1393","article-title":"in-toto: Providing farm-to-table guarantees for bits and bytes","author":"torres-arias","year":"2019","journal-title":"28th USENIX Security Symposium (USENIX Security 19)"},{"journal-title":"A framework to secure the integrity of software supply chains","year":"0","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2018.00015"},{"key":"ref11","article-title":"Amp: Authentication of media via provenance","author":"england","year":"2020","journal-title":"ArXiv Preprint"},{"journal-title":"Protecting trusted media","year":"2020","author":"origin","key":"ref12"},{"journal-title":"Creating the standard for digital content provenance","year":"2020","author":"initiative","key":"ref13"},{"journal-title":"CCF A framework for building confidential verifiable replicated services","year":"2019","key":"ref14"},{"key":"ref15","article-title":"dagger: A python framework for reproducible machine learning experiment orchestration","author":"paganini","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref16","article-title":"Machine learning pipelines: Provenance, reproducibility and fair data principles","author":"samuel","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref17","article-title":"Adaptive learning of the optimal mini-batch size of sgd","author":"alfarra","year":"2020","journal-title":"ArXiv Preprint"},{"journal-title":"C2pa technical specifications","year":"2021","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44503-X_20"},{"journal-title":"Preserving video truth an anti-deepfakes narrative","year":"2020","author":"hodgson","key":"ref28"},{"key":"ref4","article-title":"Stronger data poisoning attacks break data sanitization defenses","author":"koh","year":"2018","journal-title":"ArXiv Preprint"},{"journal-title":"A new tool protects videos from deepfakes and tampering","year":"2019","author":"newman","key":"ref27"},{"key":"ref3","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"chen","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00790"},{"journal-title":"Software Package Data Exchange (SPDX)","year":"0","key":"ref29"},{"key":"ref5","article-title":"Data poisoning attacks against online learning","author":"wang","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_14"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"ref2","article-title":"Data poisoning attacks on factorization-based collaborative filtering","author":"li","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140450"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v30i1.10237","article-title":"Data poisoning attacks against autoregressive models","volume":"30","author":"alfeld","year":"2016","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68136-8_8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3457566"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WORKS49585.2019.00006"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2019.2934629"},{"key":"ref23","article-title":"Debugging machine learning pipelines","author":"louren\u00e7o","year":"0","journal-title":"Proceedings of the 3rd International Workshop on Data Management for End-to-End Machine Learning - DEEM'19"},{"journal-title":"Instilling trust into video","year":"2019","author":"amber","key":"ref26"},{"journal-title":"Photo and video verification you can trust","year":"2019","key":"ref25"}],"event":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2021,11,29]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2021,12,2]]}},"container-title":["MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9652874\/9652880\/09653139.pdf?arnumber=9653139","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T05:13:06Z","timestamp":1674277986000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9653139\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,29]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/milcom52596.2021.9653139","relation":{},"subject":[],"published":{"date-parts":[[2021,11,29]]}}}