{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:01:40Z","timestamp":1740099700130,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,16]],"date-time":"2020-07-16T00:00:00Z","timestamp":1594857600000},"content-version":"vor","delay-in-days":3,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010198","name":"Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-13-20045"],"id":[{"id":"10.13039\/100010198","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,13]]},"DOI":"10.1145\/3395352.3402618","type":"proceedings-article","created":{"date-parts":[[2020,7,16]],"date-time":"2020-07-16T18:24:28Z","timestamp":1594923868000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["Generative adversarial attacks against intrusion detection systems using active learning"],"prefix":"10.1145","author":[{"given":"Dule","family":"Shu","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Nandi O.","family":"Leslie","sequence":"additional","affiliation":[{"name":"U.S. Army Research Laboratory"}]},{"given":"Charles A.","family":"Kamhoua","sequence":"additional","affiliation":[{"name":"U.S. Army Research Laboratory"}]},{"given":"Conrad S.","family":"Tucker","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2020,7,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/850985.855567"},{"key":"e_1_3_2_1_2_1","volume-title":"Adversarial active learning for deep networks: a margin based approach. arXiv preprint arXiv:1802.09841","author":"Ducoffe Melanie","year":"2018","unstructured":"Melanie Ducoffe and Frederic Precioso. 2018. Adversarial active learning for deep networks: a margin based approach. arXiv preprint arXiv:1802.09841 (2018)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2018.2884910"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299815.3314439"},{"key":"e_1_3_2_1_5_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.07.238"},{"key":"e_1_3_2_1_7_1","volume-title":"Security alert: New stealthy android spyware-plankton-found in official android market. Department of Computer Science","author":"Jiang Xuxian","year":"2011","unstructured":"Xuxian Jiang. 2011. Security alert: New stealthy android spyware-plankton-found in official android market. Department of Computer Science, North Carolina State University, URL: http:\/\/www.csc.ncsu.edu\/faculty\/jiang\/Plankton (2011)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Bill Karakostas. 2016. Event Prediction in an IoT Environment Using Na\u00efve Bayesian Models.. In ANT\/SEIT. 11--17.","DOI":"10.1016\/j.procs.2016.04.093"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905633"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70087-8_58"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 23rd International Command and Control Research and Technology Symposium (ICCRTS): Multi-Domain C2 (Pensacola, EL: ICCRTS).","author":"Leslie N. O.","year":"2018","unstructured":"N. O. Leslie. 2018. Using semi-supervised learning for flow-based network intrusion detection. In Proceedings of the 23rd International Command and Control Research and Technology Symposium (ICCRTS): Multi-Domain C2 (Pensacola, EL: ICCRTS)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2099-5_1"},{"key":"e_1_3_2_1_13_1","volume-title":"Idsgan: Generative adversarial networks for attack generation against intrusion detection. arXiv preprint arXiv:1809.02077","author":"Lin Zilong","year":"2018","unstructured":"Zilong Lin, Yong Shi, and Zhi Xue. 2018. Idsgan: Generative adversarial networks for attack generation against intrusion detection. arXiv preprint arXiv:1809.02077 (2018)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974752"},{"volume-title":"Hardware Security and Trust","author":"Milosevic Jelena","key":"e_1_3_2_1_15_1","unstructured":"Jelena Milosevic, Francesco Regazzoni, and Miroslaw Malek. 2017. Malware threats and solutions for trustworthy mobile systems design. In Hardware Security and Trust. Springer, 149--167."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.01.012"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2017.01.012"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00019"},{"key":"e_1_3_2_1_21_1","volume-title":"Arash Habibi Lashkari, and Ali A Ghorbani","author":"Sharafaldin Iman","year":"2018","unstructured":"Iman Sharafaldin, Arash Habibi Lashkari, and Ali A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In ICISSP. 108--116."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2018.8642683"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0630-0"},{"key":"e_1_3_2_1_24_1","volume-title":"Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204","author":"Tram\u00e8r Florian","year":"2017","unstructured":"Florian Tram\u00e8r, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh, and Patrick McDaniel. 2017. Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204 (2017)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.09.014"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761337"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the Workshop on Semantic Analysis in Social Media. Association for Computational Linguistics, 18--27","author":"Zhang Renxian","year":"2012","unstructured":"Renxian Zhang, Dehong Gao, and Wenjie Li. 2012. Towards scalable speech act recognition in twitter: tackling insufficient training data. In Proceedings of the Workshop on Semantic Analysis in Social Media. Association for Computational Linguistics, 18--27."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Linz Austria","acronym":"WiSec '20"},"container-title":["Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395352.3402618","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395352.3402618","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T22:52:51Z","timestamp":1733871171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395352.3402618"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,13]]},"references-count":28,"alternative-id":["10.1145\/3395352.3402618","10.1145\/3395352"],"URL":"https:\/\/doi.org\/10.1145\/3395352.3402618","relation":{},"subject":[],"published":{"date-parts":[[2020,7,13]]},"assertion":[{"value":"2020-07-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}