{"id":"https://openalex.org/W7124943211","doi":"https://doi.org/10.1109/access.2026.3655822","title":"Adversarial Shadows in Digital Forensics: New Insights Into File Fragment Classification Vulnerabilities and Defenses","display_name":"Adversarial Shadows in Digital Forensics: New Insights Into File Fragment Classification Vulnerabilities and Defenses","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7124943211","doi":"https://doi.org/10.1109/access.2026.3655822"},"language":null,"primary_location":{"id":"doi:10.1109/access.2026.3655822","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3655822","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2026.3655822","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005469697","display_name":"Teena Mary","orcid":null},"institutions":[{"id":"https://openalex.org/I48018076","display_name":"Christ University","ror":"https://ror.org/022tv9y30","country_code":"IN","type":"education","lineage":["https://openalex.org/I48018076"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Teena Mary","raw_affiliation_strings":["Department of Computer Science, CHRIST (Deemed to be University), Bengaluru, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, CHRIST (Deemed to be University), Bengaluru, Karnataka, India","institution_ids":["https://openalex.org/I48018076"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5116205532","display_name":"C.S. Sreeja","orcid":null},"institutions":[{"id":"https://openalex.org/I48018076","display_name":"Christ University","ror":"https://ror.org/022tv9y30","country_code":"IN","type":"education","lineage":["https://openalex.org/I48018076"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"C. S. Sreeja","raw_affiliation_strings":["Department of Computer Science, CHRIST (Deemed to be University), Bengaluru, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, CHRIST (Deemed to be University), Bengaluru, Karnataka, India","institution_ids":["https://openalex.org/I48018076"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5005469697"],"corresponding_institution_ids":["https://openalex.org/I48018076"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11371462,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"11064","last_page":"11083"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9337000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9337000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.01899999938905239,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.014499999582767487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8640000224113464},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.6467000246047974},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6385999917984009},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5910000205039978},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.5831999778747559},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.5516999959945679},{"id":"https://openalex.org/keywords/fragment","display_name":"Fragment (logic)","score":0.43050000071525574},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.39070001244544983}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8640000224113464},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8471999764442444},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.6467000246047974},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6385999917984009},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5910000205039978},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.5831999778747559},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.5516999959945679},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43790000677108765},{"id":"https://openalex.org/C2776235265","wikidata":"https://www.wikidata.org/wiki/Q18392052","display_name":"Fragment (logic)","level":2,"score":0.43050000071525574},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40619999170303345},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40560001134872437},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.39070001244544983},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3767000138759613},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.36039999127388},{"id":"https://openalex.org/C59577422","wikidata":"https://www.wikidata.org/wiki/Q10265143","display_name":"False accusation","level":2,"score":0.34150001406669617},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.33160001039505005},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.3183000087738037},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.3179999887943268},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.3059999942779541},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.27790001034736633},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.27639999985694885},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.2689000070095062},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.26269999146461487},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.2535000145435333},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.25279998779296875}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/access.2026.3655822","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3655822","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/access.2026.3655822","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3655822","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6625852584838867}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":69,"referenced_works":["https://openalex.org/W2009922365","https://openalex.org/W2027166822","https://openalex.org/W2122956713","https://openalex.org/W2125371264","https://openalex.org/W2151958475","https://openalex.org/W2243397390","https://openalex.org/W2574797807","https://openalex.org/W2603766943","https://openalex.org/W2744095836","https://openalex.org/W2746600820","https://openalex.org/W2889034351","https://openalex.org/W2963165251","https://openalex.org/W2963448658","https://openalex.org/W2963542245","https://openalex.org/W2963855547","https://openalex.org/W2963857521","https://openalex.org/W2969695741","https://openalex.org/W2982725903","https://openalex.org/W2983219069","https://openalex.org/W2990056855","https://openalex.org/W3036399259","https://openalex.org/W3089994140","https://openalex.org/W3090219579","https://openalex.org/W3107235539","https://openalex.org/W3108339050","https://openalex.org/W3123744197","https://openalex.org/W3141192839","https://openalex.org/W3174400490","https://openalex.org/W3176686930","https://openalex.org/W3213482711","https://openalex.org/W3215624426","https://openalex.org/W4210400539","https://openalex.org/W4288758078","https://openalex.org/W4301880089","https://openalex.org/W4315486917","https://openalex.org/W4320147968","https://openalex.org/W4320477201","https://openalex.org/W4362714293","https://openalex.org/W4378977274","https://openalex.org/W4385341353","https://openalex.org/W4385688985","https://openalex.org/W4385768289","https://openalex.org/W4387068365","https://openalex.org/W4387485650","https://openalex.org/W4389428567","https://openalex.org/W4389961137","https://openalex.org/W4390497390","https://openalex.org/W4391791430","https://openalex.org/W4393931420","https://openalex.org/W4394013608","https://openalex.org/W4395108770","https://openalex.org/W4399207057","https://openalex.org/W4399381482","https://openalex.org/W4400314861","https://openalex.org/W4400723399","https://openalex.org/W4401546231","https://openalex.org/W4401751497","https://openalex.org/W4401793013","https://openalex.org/W4402563142","https://openalex.org/W4403721651","https://openalex.org/W4403918249","https://openalex.org/W4404682801","https://openalex.org/W4405114336","https://openalex.org/W4405577631","https://openalex.org/W4407544528","https://openalex.org/W4408749968","https://openalex.org/W4408749975","https://openalex.org/W4409103707","https://openalex.org/W4409212923"],"related_works":[],"abstract_inverted_index":{"The":[0,84,124,159],"paper":[1,125,160],"is":[2],"a":[3],"comprehensive":[4],"survey":[5,85],"of":[6,26,63,82,109,122,131,151],"adversarial":[7,35,37,120],"attacks":[8,38],"on":[9,39,102,118],"file":[10,174],"fragment":[11,139,175],"classification":[12,34,176],"(FFC)":[13],"models":[14],"-a":[15],"relatively":[16],"unexplored":[17],"area":[18],"in":[19,50,138,172,179],"digital":[20,154],"forensics,":[21],"given":[22],"the":[23,47,61,68,80,107,119,128,149],"increasing":[24],"application":[25],"machine":[27,152],"learning":[28],"techniques.":[29],"Unlike":[30],"image":[31],"or":[32,55],"text":[33],"attacks,":[36,97],"FFC":[40],"exploit":[41],"statistical":[42],"and":[43,95,98,115,141,157],"structural":[44],"properties":[45,59],"at":[46],"byte":[48,132],"level":[49,133],"systems":[51,177],"that":[52,135],"lack":[53],"semantic":[54],"perceptual":[56],"knowledge.":[57],"Such":[58],"necessitate":[60],"use":[62],"domain-specific":[64,110],"defense":[65,69],"strategies,":[66],"as":[67],"strategies":[70],"adopted":[71],"from":[72],"other":[73],"domains":[74],"are":[75,181],"typically":[76],"not":[77],"effective":[78],"for":[79,147,164,170],"problems":[81],"FFC.":[83,123],"comprehensively":[86],"evaluates":[87],"attack":[88],"mechanisms":[89],"relevant":[90],"to":[91],"FFC,":[92],"including":[93],"evasion":[94],"poisoning":[96],"discusses":[99,127],"their":[100],"impact":[101],"forensic":[103],"reliability.":[104],"It":[105],"highlights":[106],"absence":[108],"benchmarks,":[111],"robust":[112],"evaluation":[113],"protocols,":[114],"systematic":[116],"research":[117,145],"robustness":[121],"also":[126],"different":[129],"types":[130],"perturbations":[134],"can":[136],"happen":[137],"data,":[140],"it":[142],"sets":[143],"specific":[144],"priorities":[146],"raising":[148],"reliability":[150],"learning-based":[153],"evidence":[155],"recovery":[156],"security.":[158],"provides":[161],"building":[162],"blocks":[163],"future":[165],"work,":[166],"offering":[167],"practical":[168],"insights":[169],"development":[171],"ensuring":[173],"utilized":[178],"forensics":[180],"secure.":[182]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-01-21T00:00:00"}
