{"id":"https://openalex.org/W4313546852","doi":"https://doi.org/10.1109/acit57182.2022.9994126","title":"On developing deep learning models with particle swarm optimization in the presence of poisoning attacks","display_name":"On developing deep learning models with particle swarm optimization in the presence of poisoning attacks","publication_year":2022,"publication_date":"2022-11-22","ids":{"openalex":"https://openalex.org/W4313546852","doi":"https://doi.org/10.1109/acit57182.2022.9994126"},"language":"en","primary_location":{"id":"doi:10.1109/acit57182.2022.9994126","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit57182.2022.9994126","pdf_url":null,"source":{"id":"https://openalex.org/S4363608405","display_name":"2022 International Arab Conference on Information Technology (ACIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052028161","display_name":"Majdi Maabreh","orcid":"https://orcid.org/0000-0003-4822-417X"},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Majdi Maabreh","raw_affiliation_strings":["The Hashemite University,Department of Computer Information Systems,Zarqa,Jordan"],"affiliations":[{"raw_affiliation_string":"The Hashemite University,Department of Computer Information Systems,Zarqa,Jordan","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091723521","display_name":"Omar Darwish","orcid":"https://orcid.org/0000-0001-8346-7148"},"institutions":[{"id":"https://openalex.org/I138216421","display_name":"Eastern Michigan University","ror":"https://ror.org/02ehshm78","country_code":"US","type":"education","lineage":["https://openalex.org/I138216421"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Omar Darwish","raw_affiliation_strings":["Eastern Michigan University,Information Security and Applied Computing Department,MI,USA"],"affiliations":[{"raw_affiliation_string":"Eastern Michigan University,Information Security and Applied Computing Department,MI,USA","institution_ids":["https://openalex.org/I138216421"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018501075","display_name":"Ola Karajeh","orcid":"https://orcid.org/0000-0003-2626-4533"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ola Karajeh","raw_affiliation_strings":["Virginia Polytechnic Institute and State University,Department of Computer Science,VA,USA"],"affiliations":[{"raw_affiliation_string":"Virginia Polytechnic Institute and State University,Department of Computer Science,VA,USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009036501","display_name":"Yahya Tashtoush","orcid":"https://orcid.org/0000-0002-4248-8732"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Yahya Tashtoush","raw_affiliation_strings":["Jordan University of Science and Technology,Department of Computer Science,Irbid,Jordan"],"affiliations":[{"raw_affiliation_string":"Jordan University of Science and Technology,Department of Computer Science,Irbid,Jordan","institution_ids":["https://openalex.org/I156983542"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5052028161"],"corresponding_institution_ids":["https://openalex.org/I157392197"],"apc_list":null,"apc_paid":null,"fwci":0.4162,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.60006464,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12535","display_name":"Machine Learning and Data Classification","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.781216025352478},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.7499018907546997},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7057290077209473},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6700050830841064},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6687458753585815},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5956618189811707},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5711984038352966},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5226193070411682},{"id":"https://openalex.org/keywords/multi-swarm-optimization","display_name":"Multi-swarm optimization","score":0.4514920711517334},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.44008031487464905},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.21978020668029785}],"concepts":[{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.781216025352478},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.7499018907546997},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7057290077209473},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6700050830841064},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6687458753585815},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5956618189811707},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5711984038352966},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5226193070411682},{"id":"https://openalex.org/C122357587","wikidata":"https://www.wikidata.org/wiki/Q6934508","display_name":"Multi-swarm optimization","level":3,"score":0.4514920711517334},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.44008031487464905},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.21978020668029785},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit57182.2022.9994126","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit57182.2022.9994126","pdf_url":null,"source":{"id":"https://openalex.org/S4363608405","display_name":"2022 International Arab Conference on Information Technology (ACIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2112507308","https://openalex.org/W2782896555","https://openalex.org/W2789828921","https://openalex.org/W2937997480","https://openalex.org/W2962763344","https://openalex.org/W2963658737","https://openalex.org/W3120847116","https://openalex.org/W3136620885","https://openalex.org/W3138153888","https://openalex.org/W3170976035","https://openalex.org/W3171665710","https://openalex.org/W3175821757","https://openalex.org/W4200103687","https://openalex.org/W4205129187","https://openalex.org/W4205488455","https://openalex.org/W4224300633","https://openalex.org/W4285401252","https://openalex.org/W4285404754","https://openalex.org/W4287981769","https://openalex.org/W4288057793","https://openalex.org/W6605479355","https://openalex.org/W6676935882"],"related_works":["https://openalex.org/W2006324351","https://openalex.org/W2965421953","https://openalex.org/W2349895019","https://openalex.org/W2950423922","https://openalex.org/W2116074880","https://openalex.org/W2121780490","https://openalex.org/W2070977815","https://openalex.org/W2137136732","https://openalex.org/W2132113279","https://openalex.org/W2113224065"],"abstract_inverted_index":{"Deep":[0],"learning":[1,25,31,56,76,96,110,160],"(DL)":[2],"has":[3],"demonstrated":[4],"several":[5],"successes":[6],"in":[7,13,161],"a":[8,23,144],"variety":[9],"of":[10,16,21,37,79,82,114,152,165],"fields,":[11],"particularly":[12],"the":[14,29,35,70,95,112,119,123,150,162,167],"era":[15],"big":[17],"data.":[18],"The":[19,98],"process":[20],"training":[22],"deep":[24,75,109],"model":[26,120,168],"entails":[27],"selecting":[28],"ideal":[30],"parameters":[32],"such":[33],"as":[34],"number":[36],"hidden":[38],"layers":[39],"and":[40,68,127],"neurons.":[41],"Particle":[42],"Swarm":[43],"Optimization":[44],"(PSO)":[45],"is":[46],"one":[47],"useful":[48],"nature-inspired":[49],"algorithm":[50],"to":[51,66,93,134,158],"set":[52],"those":[53,135],"two":[54,61],"influential":[55],"parameters.":[57],"In":[58],"this":[59],"study,":[60],"different":[62,80],"datasets":[63,78],"are":[64],"used":[65],"study":[67],"evaluate":[69],"particle":[71,102],"swarm":[72,103],"optimizer":[73],"with":[74,111],"on":[77,122,137,169],"concentrations":[81],"poisoning":[83],"attack,":[84],"where":[85],"some":[86],"adversarial":[87],"samples":[88],"were":[89],"crafted":[90],"by":[91],"attackers":[92],"ruin":[94],"process.":[97],"results":[99],"showed":[100],"that":[101,117,146],"optimization":[104],"could":[105,128],"find":[106],"settings":[107],"for":[108],"existence":[113,151],"poisoned":[115],"data":[116,153],"maximizes":[118],"accuracy":[121],"unseen":[124],"testing":[125],"dataset,":[126],"also":[129],"offer":[130],"better":[131],"recommendations":[132],"compared":[133],"recommended":[136],"all":[138],"benign":[139],"samples.":[140],"This":[141],"may":[142,156],"introduce":[143],"concern":[145],"optimizers":[147],"might":[148],"conceal":[149],"poisoning,":[154],"which":[155],"lead":[157],"unreliable":[159],"advanced":[163],"stages":[164],"upgrading":[166],"updated":[170],"datasets.":[171]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
