{"id":"https://openalex.org/W7128539897","doi":"https://doi.org/10.1007/s10664-025-10795-y","title":"SecMLOps: A comprehensive framework for integrating security throughout the machine learning operations lifecycle","display_name":"SecMLOps: A comprehensive framework for integrating security throughout the machine learning operations lifecycle","publication_year":2026,"publication_date":"2026-02-11","ids":{"openalex":"https://openalex.org/W7128539897","doi":"https://doi.org/10.1007/s10664-025-10795-y","pmid":"https://pubmed.ncbi.nlm.nih.gov/41694447"},"language":"en","primary_location":{"id":"doi:10.1007/s10664-025-10795-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10664-025-10795-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10664-025-10795-y.pdf","source":{"id":"https://openalex.org/S109852484","display_name":"Empirical Software Engineering","issn_l":"1382-3256","issn":["1382-3256","1573-7616"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Empirical Software Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref","pubmed"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10664-025-10795-y.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075234973","display_name":"XinRui Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]},{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xinrui Zhang","raw_affiliation_strings":["Department of Systems and Computer Engineering, Carleton University, Ottawa, ON Canada","Present Address: School of Computing, Queen's University, Kingston, ON Canada"],"affiliations":[{"raw_affiliation_string":"Department of Systems and Computer Engineering, Carleton University, Ottawa, ON Canada","institution_ids":["https://openalex.org/I67031392"]},{"raw_affiliation_string":"Present Address: School of Computing, Queen's University, Kingston, ON Canada","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012527216","display_name":"Pincan Zhao","orcid":"https://orcid.org/0000-0001-7393-5016"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Pincan Zhao","raw_affiliation_strings":["School of Information Technology, Carleton University, Ottawa, ON Canada"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Carleton University, Ottawa, ON Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039439171","display_name":"Jason Jaskolka","orcid":"https://orcid.org/0000-0001-6316-3040"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jason Jaskolka","raw_affiliation_strings":["Department of Systems and Computer Engineering, Carleton University, Ottawa, ON Canada"],"affiliations":[{"raw_affiliation_string":"Department of Systems and Computer Engineering, Carleton University, Ottawa, ON Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125509213","display_name":"Heng Li","orcid":null},"institutions":[{"id":"https://openalex.org/I45683168","display_name":"Polytechnique Montr\u00e9al","ror":"https://ror.org/05f8d4e86","country_code":"CA","type":"education","lineage":["https://openalex.org/I45683168"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Heng Li","raw_affiliation_strings":["Department of Computer and Software Engineering, Polytechnique Montr\u00e9al, Montreal, QC Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Software Engineering, Polytechnique Montr\u00e9al, Montreal, QC Canada","institution_ids":["https://openalex.org/I45683168"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5125545801","display_name":"Rongxing Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rongxing Lu","raw_affiliation_strings":["Present Address: School of Computing, Queen's University, Kingston, ON Canada"],"affiliations":[{"raw_affiliation_string":"Present Address: School of Computing, Queen's University, Kingston, ON Canada","institution_ids":["https://openalex.org/I204722609"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5012527216"],"corresponding_institution_ids":["https://openalex.org/I67031392"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.42205567,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"31","issue":"3","first_page":"74","last_page":"74"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8725000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8725000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.039900001138448715,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.010499999858438969,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.736299991607666},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.5674999952316284},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5196999907493591},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.44999998807907104},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4043000042438507},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3779999911785126},{"id":"https://openalex.org/keywords/security-engineering","display_name":"Security engineering","score":0.3749000132083893},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.36239999532699585},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.3407999873161316}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.736299991607666},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6309999823570251},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.5674999952316284},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5196999907493591},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5113999843597412},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.44999998807907104},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.42410001158714294},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4043000042438507},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3779999911785126},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.3749000132083893},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.36239999532699585},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.3407999873161316},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.33570000529289246},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3172000050544739},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.3165000081062317},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.3149999976158142},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.3084999918937683},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2978000044822693},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.2946000099182129},{"id":"https://openalex.org/C9903902","wikidata":"https://www.wikidata.org/wiki/Q3025536","display_name":"DevOps","level":3,"score":0.2912999987602234},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28929999470710754},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.28529998660087585},{"id":"https://openalex.org/C2776157020","wikidata":"https://www.wikidata.org/wiki/Q851598","display_name":"Physical security","level":2,"score":0.2802000045776367},{"id":"https://openalex.org/C2781133158","wikidata":"https://www.wikidata.org/wiki/Q1088669","display_name":"Survivability","level":2,"score":0.27869999408721924},{"id":"https://openalex.org/C81293917","wikidata":"https://www.wikidata.org/wiki/Q4189534","display_name":"System deployment","level":3,"score":0.27079999446868896},{"id":"https://openalex.org/C2778464652","wikidata":"https://www.wikidata.org/wiki/Q309849","display_name":"Open research","level":2,"score":0.260699987411499},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.25769999623298645},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.2567000091075897},{"id":"https://openalex.org/C2776397876","wikidata":"https://www.wikidata.org/wiki/Q1450531","display_name":"Cyberinfrastructure","level":2,"score":0.25609999895095825}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1007/s10664-025-10795-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10664-025-10795-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10664-025-10795-y.pdf","source":{"id":"https://openalex.org/S109852484","display_name":"Empirical Software Engineering","issn_l":"1382-3256","issn":["1382-3256","1573-7616"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Empirical Software Engineering","raw_type":"journal-article"},{"id":"pmid:41694447","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/41694447","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Empirical software engineering","raw_type":null},{"id":"pmh:oai:publications.polymtl.ca:73272","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401013","display_name":"PolyPublie (\u00c9cole Polytechnique de Montr\u00e9al)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45683168","host_organization_name":"Polytechnique Montr\u00e9al","host_organization_lineage":["https://openalex.org/I45683168"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:arXiv.org:2601.10848","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2601.10848","pdf_url":"https://arxiv.org/pdf/2601.10848","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:europepmc.org:11701557","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/12894179","pdf_url":null,"source":{"id":"https://openalex.org/S4306400806","display_name":"Europe PMC (PubMed Central)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1303153112","host_organization_name":"European Bioinformatics Institute","host_organization_lineage":["https://openalex.org/I1303153112"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Text"},{"id":"pmh:oai:pubmedcentral.nih.gov:12894179","is_oa":true,"landing_page_url":"https://pmc.ncbi.nlm.nih.gov/articles/PMC12894179/","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Empir Softw Eng","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1007/s10664-025-10795-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10664-025-10795-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10664-025-10795-y.pdf","source":{"id":"https://openalex.org/S109852484","display_name":"Empirical Software Engineering","issn_l":"1382-3256","issn":["1382-3256","1573-7616"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Empirical Software Engineering","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1597412403","display_name":null,"funder_award_id":"RGPIN-","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"},{"id":"https://openalex.org/G2165548363","display_name":null,"funder_award_id":"Canada","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"},{"id":"https://openalex.org/G3216283581","display_name":null,"funder_award_id":"RGPIN-201","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"},{"id":"https://openalex.org/G4171097734","display_name":null,"funder_award_id":"RGPIN-2019-06306","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"},{"id":"https://openalex.org/G6221715925","display_name":null,"funder_award_id":"RGPIN","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"},{"id":"https://openalex.org/G8124151633","display_name":null,"funder_award_id":"RGPIN-2019-06","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"},{"id":"https://openalex.org/G8284766523","display_name":null,"funder_award_id":"(NSERC)","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"},{"id":"https://openalex.org/G832689143","display_name":null,"funder_award_id":"RGPIN-2019","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"}],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7128539897.pdf","grobid_xml":"https://content.openalex.org/works/W7128539897.grobid-xml"},"referenced_works_count":58,"referenced_works":["https://openalex.org/W2003676537","https://openalex.org/W2031454541","https://openalex.org/W2066188046","https://openalex.org/W2099419573","https://openalex.org/W2131730994","https://openalex.org/W2243397390","https://openalex.org/W2289463038","https://openalex.org/W2464676481","https://openalex.org/W2546493083","https://openalex.org/W2572504188","https://openalex.org/W2594507094","https://openalex.org/W2744999500","https://openalex.org/W2782864149","https://openalex.org/W2895400994","https://openalex.org/W2897042519","https://openalex.org/W2924551358","https://openalex.org/W2950865323","https://openalex.org/W2963857521","https://openalex.org/W2986642681","https://openalex.org/W2987014658","https://openalex.org/W2992308087","https://openalex.org/W3004890695","https://openalex.org/W3013149459","https://openalex.org/W3033511014","https://openalex.org/W3046918297","https://openalex.org/W3087732660","https://openalex.org/W3087893815","https://openalex.org/W3104128335","https://openalex.org/W3111058250","https://openalex.org/W3116515605","https://openalex.org/W3134670202","https://openalex.org/W3135028703","https://openalex.org/W3165775819","https://openalex.org/W3202461888","https://openalex.org/W4200633541","https://openalex.org/W4281874271","https://openalex.org/W4287306930","https://openalex.org/W4319430780","https://openalex.org/W4320895574","https://openalex.org/W4323022560","https://openalex.org/W4328028822","https://openalex.org/W4360898063","https://openalex.org/W4360995249","https://openalex.org/W4385076038","https://openalex.org/W4386002526","https://openalex.org/W4386075937","https://openalex.org/W4388574628","https://openalex.org/W4388886073","https://openalex.org/W4390317578","https://openalex.org/W4391454585","https://openalex.org/W4391952702","https://openalex.org/W4392353733","https://openalex.org/W4392502635","https://openalex.org/W4393320961","https://openalex.org/W4395051966","https://openalex.org/W4406348806","https://openalex.org/W4409156008","https://openalex.org/W4410540183"],"related_works":[],"abstract_inverted_index":{"Machine":[0,69],"Learning":[1,70],"(ML)":[2],"has":[3],"emerged":[4],"as":[5,22,44],"a":[6,74,189],"pivotal":[7],"technology":[8],"in":[9,19,154,208],"the":[10,34,50,65,84,93,102,127,132,149,164,186],"operation":[11],"of":[12,36,54,67,95,126,136,152,188],"large":[13],"and":[14,27,52,109,134,169,206],"complex":[15],"systems,":[16],"driving":[17],"advancements":[18],"fields":[20],"such":[21,43],"autonomous":[23],"vehicles,":[24],"healthcare":[25],"diagnostics,":[26],"financial":[28],"fraud":[29],"detection.":[30],"Despite":[31],"its":[32],"benefits,":[33],"deployment":[35,108],"ML":[37,86,137,209],"models":[38],"brings":[39],"significant":[40],"security":[41,81,99,167,177,205],"challenges,":[42,60],"adversarial":[45],"attacks,":[46],"which":[47],"can":[48],"compromise":[49],"integrity":[51],"reliability":[53],"these":[55,59],"systems.":[56],"To":[57],"address":[58],"this":[61],"paper":[62],"builds":[63,91],"upon":[64],"concept":[66],"Secure":[68],"Operations":[71],"(SecMLOps),":[72],"providing":[73,172],"comprehensive":[75],"framework":[76,113],"designed":[77],"to":[78,107,199],"integrate":[79],"robust":[80],"measures":[82,168],"throughout":[83],"entire":[85],"operations":[87],"(MLOps)":[88],"lifecycle.":[89],"SecMLOps":[90,153],"on":[92,117,197],"principles":[94],"MLOps":[96,128],"by":[97],"embedding":[98],"considerations":[100],"from":[101],"initial":[103],"design":[104],"phase":[105],"through":[106],"continuous":[110],"monitoring.":[111],"This":[112],"is":[114],"particularly":[115],"focused":[116],"safeguarding":[118],"against":[119],"sophisticated":[120],"attacks":[121],"that":[122],"target":[123],"various":[124,212],"stages":[125],"lifecycle,":[129],"thereby":[130],"enhancing":[131],"resilience":[133],"trustworthiness":[135],"applications.":[138],"A":[139],"detailed":[140],"advanced":[141],"pedestrian":[142],"detection":[143],"system":[144,170],"(PDS)":[145],"use":[146],"case":[147],"demonstrates":[148],"practical":[150],"application":[151],"securing":[155],"critical":[156,173],"MLOps.":[157],"Through":[158],"extensive":[159],"empirical":[160],"evaluations,":[161],"we":[162],"highlight":[163],"trade-offs":[165],"between":[166,204],"performance,":[171],"insights":[174],"into":[175],"optimizing":[176],"without":[178],"unduly":[179],"impacting":[180],"operational":[181],"efficiency.":[182],"Our":[183],"findings":[184],"underscore":[185],"importance":[187],"balanced":[190],"approach,":[191],"offering":[192],"valuable":[193],"guidance":[194],"for":[195],"practitioners":[196],"how":[198],"achieve":[200],"an":[201],"optimal":[202],"balance":[203],"performance":[207],"deployments":[210],"across":[211],"domains.":[213]},"counts_by_year":[],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2026-02-11T00:00:00"}
