{"id":"https://openalex.org/W4387469889","doi":"https://doi.org/10.1109/icpm60904.2023.10271991","title":"Manifold Learning for Adversarial Robustness in Predictive Process Monitoring","display_name":"Manifold Learning for Adversarial Robustness in Predictive Process Monitoring","publication_year":2023,"publication_date":"2023-10-09","ids":{"openalex":"https://openalex.org/W4387469889","doi":"https://doi.org/10.1109/icpm60904.2023.10271991"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpm60904.2023.10271991","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014329835","display_name":"Alexander Stevens","orcid":"https://orcid.org/0000-0001-6140-8788"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Alexander Stevens","raw_affiliation_strings":["Research Centre for Information Systems Engineering (LIRIS), KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"Research Centre for Information Systems Engineering (LIRIS), KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025815548","display_name":"Jari Peeperkorn","orcid":"https://orcid.org/0000-0003-4644-4881"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Jari Peeperkorn","raw_affiliation_strings":["Research Centre for Information Systems Engineering (LIRIS), KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"Research Centre for Information Systems Engineering (LIRIS), KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087087021","display_name":"Johannes De Smedt","orcid":"https://orcid.org/0000-0003-0389-0275"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Johannes De Smedt","raw_affiliation_strings":["Research Centre for Information Systems Engineering (LIRIS), KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"Research Centre for Information Systems Engineering (LIRIS), KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080266755","display_name":"Jochen De Weerdt","orcid":"https://orcid.org/0000-0001-6151-0504"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Jochen De Weerdt","raw_affiliation_strings":["Research Centre for Information Systems Engineering (LIRIS), KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"Research Centre for Information Systems Engineering (LIRIS), KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":69},"biblio":{"volume":"32","issue":null,"first_page":"17","last_page":"24"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Deep Learning Models","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Deep Learning Models","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection in High-Dimensional Data","score":0.9634,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11515","display_name":"Biological Agents for Bioterrorism","score":0.9518,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.75114167},{"id":"https://openalex.org/keywords/adversarial-examples","display_name":"Adversarial Examples","score":0.566511},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.45929685},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.4249428}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.928672},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.75130045},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.75114167},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6720923},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.62976414},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5618979},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.45929685},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.4249428},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28299218},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpm60904.2023.10271991","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.63}],"grants":[{"funder":"https://openalex.org/F4320322308","funder_display_name":"KU Leuven","award_id":null}],"datasets":[],"versions":[],"referenced_works_count":19,"referenced_works":["https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W1959608418","https://openalex.org/W2766108848","https://openalex.org/W2948741454","https://openalex.org/W2963076808","https://openalex.org/W2963501948","https://openalex.org/W2964066696","https://openalex.org/W3043411673","https://openalex.org/W3091710143","https://openalex.org/W3096520920","https://openalex.org/W3133048381","https://openalex.org/W3133897986","https://openalex.org/W3197745357","https://openalex.org/W4293846201","https://openalex.org/W4310524717","https://openalex.org/W4311734044","https://openalex.org/W4379798775","https://openalex.org/W949909655"],"related_works":["https://openalex.org/W4384648009","https://openalex.org/W4383468834","https://openalex.org/W4380352238","https://openalex.org/W4287828318","https://openalex.org/W4283221438","https://openalex.org/W3126470649","https://openalex.org/W3048732067","https://openalex.org/W2930249865","https://openalex.org/W2900159906","https://openalex.org/W2406556600"],"abstract_inverted_index":{"In":[0],"recent":[1,34],"years,":[2],"many":[3],"predictive":[4,11,64,67],"models":[5,42,70,142],"have":[6,36],"been":[7],"successfully":[8],"applied":[9],"to":[10,43,48,61,100,115,140],"process":[12,30,68],"monitoring,":[13],"enabling":[14],"tasks":[15],"such":[16],"as":[17],"predicting":[18],"the":[19,25,38,63,72,109,120,126],"next":[20],"activity,":[21],"remaining":[22],"time,":[23],"or":[24],"future":[26],"state":[27],"of":[28,40,66,74,103,111,122],"a":[29],"instance":[31],"(case).":[32],"However,":[33],"developments":[35],"shown":[37],"vulnerability":[39],"these":[41,117,133],"adversarial":[44,59,75,82,91,153],"attacks,":[45,92,137],"causing":[46],"algorithms":[47],"make":[49],"incorrect":[50],"predictions.":[51],"This":[52],"paper":[53],"addresses":[54],"this":[55],"issue":[56],"by":[57],"leveraging":[58],"examples":[60,83,118],"evaluate":[62],"performance":[65],"monitoring":[69],"in":[71,87,97],"face":[73],"threats.":[76,157],"Although":[77],"augmenting":[78],"training":[79],"data":[80,123,149],"with":[81],"has":[84],"proven":[85],"effective":[86],"defending":[88],"against":[89,155],"specific":[90],"it":[93],"often":[94],"remains":[95],"insufficient":[96],"mitigating":[98],"vulnerabilities":[99],"other":[101],"types":[102],"attacks.":[104],"Our":[105],"proposed":[106],"approach":[107],"explores":[108],"use":[110],"manifold":[112],"learning":[113,131],"techniques":[114],"restrict":[116],"within":[119],"range":[121],"on":[124,146],"which":[125],"model":[127],"is":[128],"trained.":[129],"By":[130],"from":[132],"specifically":[134],"engineered":[135],"(hidden)":[136],"we":[138],"seek":[139],"develop":[141],"that":[143],"maintain":[144],"accuracy":[145],"new,":[147],"unseen":[148],"while":[150],"effectively":[151],"improving":[152],"robustness":[154],"potential":[156]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4387469889","counts_by_year":[],"updated_date":"2024-11-12T19:53:20.705024","created_date":"2023-10-10"}