{"id":"https://openalex.org/W4408962680","doi":"https://doi.org/10.1007/s10207-025-01016-0","title":"Xai-driven black-box adversarial attacks on network intrusion detectors","display_name":"Xai-driven black-box adversarial attacks on network intrusion detectors","publication_year":2025,"publication_date":"2025-03-26","ids":{"openalex":"https://openalex.org/W4408962680","doi":"https://doi.org/10.1007/s10207-025-01016-0"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-025-01016-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01016-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01016-0.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01016-0.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048771463","display_name":"Satoshi Okada","orcid":"https://orcid.org/0000-0002-6601-5710"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Satoshi Okada","raw_affiliation_strings":["The University of Tokyo, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"The University of Tokyo, Tokyo, Japan","institution_ids":["https://openalex.org/I74801974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040720321","display_name":"Houda Jmila","orcid":"https://orcid.org/0000-0002-4864-5380"},"institutions":[{"id":"https://openalex.org/I4210085861","display_name":"Laboratoire d'Int\u00e9gration des Syst\u00e8mes et des Technologies","ror":"https://ror.org/000dbcc61","country_code":"FR","type":"government","lineage":["https://openalex.org/I2738703131","https://openalex.org/I2738703131","https://openalex.org/I277688954","https://openalex.org/I4210085861","https://openalex.org/I4210117989"]},{"id":"https://openalex.org/I277688954","display_name":"Universit\u00e9 Paris-Saclay","ror":"https://ror.org/03xjwb503","country_code":"FR","type":"education","lineage":["https://openalex.org/I277688954"]},{"id":"https://openalex.org/I2738703131","display_name":"Commissariat \u00e0 l'\u00c9nergie Atomique et aux \u00c9nergies Alternatives","ror":"https://ror.org/00jjx8s55","country_code":"FR","type":"government","lineage":["https://openalex.org/I2738703131"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Houda Jmila","raw_affiliation_strings":["Universit\u00e9 Paris-Saclay, CEA, List, Orsay, France"],"affiliations":[{"raw_affiliation_string":"Universit\u00e9 Paris-Saclay, CEA, List, Orsay, France","institution_ids":["https://openalex.org/I277688954","https://openalex.org/I2738703131","https://openalex.org/I4210085861"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051045550","display_name":"Kunio Akashi","orcid":"https://orcid.org/0009-0003-0741-3238"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kunio Akashi","raw_affiliation_strings":["The University of Tokyo, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"The University of Tokyo, Tokyo, Japan","institution_ids":["https://openalex.org/I74801974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058910521","display_name":"Takuho Mitsunaga","orcid":"https://orcid.org/0009-0003-0089-7997"},"institutions":[{"id":"https://openalex.org/I158123994","display_name":"Toyo University","ror":"https://ror.org/059d6yn51","country_code":"JP","type":"education","lineage":["https://openalex.org/I158123994"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Takuho Mitsunaga","raw_affiliation_strings":["INIAD, Toyo University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"INIAD, Toyo University, Tokyo, Japan","institution_ids":["https://openalex.org/I158123994"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051344662","display_name":"Yuji Sekiya","orcid":"https://orcid.org/0009-0006-6287-9606"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yuji Sekiya","raw_affiliation_strings":["The University of Tokyo, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"The University of Tokyo, Tokyo, Japan","institution_ids":["https://openalex.org/I74801974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031424624","display_name":"Hideki Takase","orcid":"https://orcid.org/0000-0002-2660-5927"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hideki Takase","raw_affiliation_strings":["The University of Tokyo, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"The University of Tokyo, Tokyo, Japan","institution_ids":["https://openalex.org/I74801974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043016218","display_name":"Gr\u00e9gory Blanc","orcid":"https://orcid.org/0000-0001-8150-6617"},"institutions":[{"id":"https://openalex.org/I4210145102","display_name":"Institut Polytechnique de Paris","ror":"https://ror.org/042tfbd02","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Gregory Blanc","raw_affiliation_strings":["SAMOVAR, Telecom SudParis, Institut Polytechnique de Paris, Palaiseau, France"],"affiliations":[{"raw_affiliation_string":"SAMOVAR, Telecom SudParis, Institut Polytechnique de Paris, Palaiseau, France","institution_ids":["https://openalex.org/I4210145102"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090578339","display_name":"Hiroshi Nakamura","orcid":"https://orcid.org/0009-0005-6505-1903"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroshi Nakamura","raw_affiliation_strings":["The University of Tokyo, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"The University of Tokyo, Tokyo, Japan","institution_ids":["https://openalex.org/I74801974"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5048771463"],"corresponding_institution_ids":["https://openalex.org/I74801974"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":12.389,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.98472317,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"24","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7751845717430115},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6640632748603821},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.6194099187850952},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5736058354377747},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5651639699935913},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.5322432518005371},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4869740903377533},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.4808112382888794},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.46798989176750183},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4572870135307312},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19614851474761963},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17312362790107727},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.10883080959320068}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7751845717430115},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6640632748603821},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.6194099187850952},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5736058354377747},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5651639699935913},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.5322432518005371},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4869740903377533},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.4808112382888794},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.46798989176750183},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4572870135307312},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19614851474761963},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17312362790107727},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.10883080959320068},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10207-025-01016-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01016-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01016-0.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-05009234v1","is_oa":true,"landing_page_url":"https://hal.science/hal-05009234","pdf_url":null,"source":{"id":"https://openalex.org/S4406922466","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://link.springer.com/article/10.1007/s10207-025-01016-0","raw_type":"Journal articles"}],"best_oa_location":{"id":"doi:10.1007/s10207-025-01016-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01016-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01016-0.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1069223013","display_name":null,"funder_award_id":"JSPS KAKENHI","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G1854824218","display_name":null,"funder_award_id":"ANR-20-CE39","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"},{"id":"https://openalex.org/G2402987151","display_name":null,"funder_award_id":"ANR-20-CE","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"},{"id":"https://openalex.org/G3178488984","display_name":null,"funder_award_id":"ANR-20-CE39-001","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"},{"id":"https://openalex.org/G3459562248","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G4636223006","display_name":null,"funder_award_id":"JSPS KAK","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G6484792931","display_name":null,"funder_award_id":"ANR-20-CE39-0011","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"},{"id":"https://openalex.org/G6851345361","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"},{"id":"https://openalex.org/G8020385436","display_name":"\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u306e\u6642\u7a7a\u9593\u7279\u5fb4\u91cf\u306b\u7740\u76ee\u3057\u305fDoS\u8010\u6027IoT\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u7814\u7a76","funder_award_id":"23K28051","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G8430481527","display_name":null,"funder_award_id":"Number","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320320883","display_name":"Agence Nationale de la Recherche","ror":"https://ror.org/00rbzpz17"},{"id":"https://openalex.org/F4320322832","display_name":"University of Tokyo","ror":"https://ror.org/057zh3y96"},{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4408962680.pdf"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W2342408547","https://openalex.org/W2344573374","https://openalex.org/W2560162835","https://openalex.org/W2597533723","https://openalex.org/W2756489700","https://openalex.org/W2789828921","https://openalex.org/W2807786182","https://openalex.org/W2821976686","https://openalex.org/W2853623529","https://openalex.org/W2889836475","https://openalex.org/W2889885925","https://openalex.org/W2909799481","https://openalex.org/W2923778952","https://openalex.org/W2926701059","https://openalex.org/W2944406047","https://openalex.org/W2945976633","https://openalex.org/W2958285686","https://openalex.org/W2963197901","https://openalex.org/W2990225485","https://openalex.org/W2991408690","https://openalex.org/W2995671208","https://openalex.org/W3006008420","https://openalex.org/W3015481738","https://openalex.org/W3037857795","https://openalex.org/W3081084674","https://openalex.org/W3090694330","https://openalex.org/W3093621053","https://openalex.org/W3111088413","https://openalex.org/W3132977238","https://openalex.org/W3135221028","https://openalex.org/W3166180472","https://openalex.org/W3204447734","https://openalex.org/W3204683301","https://openalex.org/W4220719329","https://openalex.org/W4247200422","https://openalex.org/W4285145603","https://openalex.org/W4293704439","https://openalex.org/W4313216189","https://openalex.org/W4315630101","https://openalex.org/W4322487524","https://openalex.org/W4385816161","https://openalex.org/W4399332528"],"related_works":["https://openalex.org/W3009622996","https://openalex.org/W2392603527","https://openalex.org/W2390009783","https://openalex.org/W2348767155","https://openalex.org/W2388497169","https://openalex.org/W3120393658","https://openalex.org/W4283700121","https://openalex.org/W1496376327","https://openalex.org/W2357468538","https://openalex.org/W2133389611"],"abstract_inverted_index":{"Abstract":[0],"Deep":[1],"Learning":[2],"(DL)":[3],"technologies":[4],"have":[5,11,62],"recently":[6],"gained":[7],"significant":[8],"attention":[9],"and":[10,53,78,120],"been":[12],"applied":[13],"to":[14,24,27,36,46,98],"Network":[15],"Intrusion":[16],"Detection":[17],"Systems":[18],"(NIDS).":[19],"However,":[20],"DL":[21,51],"is":[22,54,68],"known":[23],"be":[25],"vulnerable":[26],"adversarial":[28,82],"attacks,":[29,100],"which":[30],"evade":[31],"detection":[32],"by":[33,50,94,129],"introducing":[34],"perturbations":[35],"input":[37],"data.":[38],"Meanwhile,":[39],"eXplainable":[40],"Artificial":[41],"Intelligence":[42],"(XAI)":[43],"helps":[44],"us":[45],"understand":[47],"predictions":[48,77],"made":[49],"models":[52],"an":[55],"essential":[56],"technology":[57],"for":[58],"ensuring":[59],"accountability.":[60],"We":[61],"already":[63],"pointed":[64],"out":[65],"that":[66,138],"XAI":[67],"also":[69],"helpful":[70],"in":[71,115],"identifying":[72],"important":[73],"features":[74],"when":[75],"making":[76],"proposed":[79,113,127,140],"XAI-driven":[80],"white-box":[81,97],"attacks":[83,142],"on":[84],"DL-based":[85],"NIDS.":[86],"In":[87],"this":[88,92],"study,":[89],"we":[90,110],"extend":[91],"work":[93],"transitioning":[95],"from":[96],"black-box":[99,141],"thereby":[101],"increasing":[102],"the":[103,122,139,149,153],"practical":[104],"applicability":[105],"of":[106,125,152],"our":[107,112,126],"methods.":[108],"Furthermore,":[109],"implemented":[111],"method":[114,128],"a":[116],"real-world":[117],"network":[118],"environment":[119],"demonstrated":[121],"general":[123],"effectiveness":[124],"targeting":[130],"multiple":[131],"NIDS":[132],"models.":[133],"Our":[134],"experimental":[135],"results":[136],"show":[137],"achieve":[143],"high":[144],"evasion":[145],"rates":[146],"without":[147],"compromising":[148],"malicious":[150],"nature":[151],"attack":[154],"communications.":[155]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":6}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
