{"id":"https://openalex.org/W4311618438","doi":"https://doi.org/10.1109/bigdata55660.2022.10021026","title":"AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs","display_name":"AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs","publication_year":2022,"publication_date":"2022-12-17","ids":{"openalex":"https://openalex.org/W4311618438","doi":"https://doi.org/10.1109/bigdata55660.2022.10021026"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata55660.2022.10021026","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata55660.2022.10021026","pdf_url":null,"source":{"id":"https://openalex.org/S4363607709","display_name":"2022 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2212.13989","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034502420","display_name":"H\u00e9l\u00e8ne Orsini","orcid":null},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Helene Orsini","raw_affiliation_strings":["INRIA,France","INRIA, France"],"affiliations":[{"raw_affiliation_string":"INRIA,France","institution_ids":["https://openalex.org/I1326498283"]},{"raw_affiliation_string":"INRIA, France","institution_ids":["https://openalex.org/I1326498283"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079383176","display_name":"Hongyan Bao","orcid":null},"institutions":[{"id":"https://openalex.org/I71920554","display_name":"King Abdullah University of Science and Technology","ror":"https://ror.org/01q3tbs38","country_code":"SA","type":"education","lineage":["https://openalex.org/I71920554"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Hongyan Bao","raw_affiliation_strings":["King Abdullah University of Science and Technology,Thuwal,SA","King Abdullah University of Science and Technology, Thuwal, SA"],"affiliations":[{"raw_affiliation_string":"King Abdullah University of Science and Technology,Thuwal,SA","institution_ids":["https://openalex.org/I71920554"]},{"raw_affiliation_string":"King Abdullah University of Science and Technology, Thuwal, SA","institution_ids":["https://openalex.org/I71920554"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101428872","display_name":"Yujun Zhou","orcid":"https://orcid.org/0000-0003-1376-5187"},"institutions":[{"id":"https://openalex.org/I71920554","display_name":"King Abdullah University of Science and Technology","ror":"https://ror.org/01q3tbs38","country_code":"SA","type":"education","lineage":["https://openalex.org/I71920554"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Yujun Zhou","raw_affiliation_strings":["King Abdullah University of Science and Technology,Thuwal,SA","King Abdullah University of Science and Technology, Thuwal, SA"],"affiliations":[{"raw_affiliation_string":"King Abdullah University of Science and Technology,Thuwal,SA","institution_ids":["https://openalex.org/I71920554"]},{"raw_affiliation_string":"King Abdullah University of Science and Technology, Thuwal, SA","institution_ids":["https://openalex.org/I71920554"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002113782","display_name":"Xiangrui Xu","orcid":"https://orcid.org/0000-0003-3759-4706"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangrui Xu","raw_affiliation_strings":["Beijing Jiaotong University,Beijing,CN","Beijing Jiaotong University, Beijing, CN"],"affiliations":[{"raw_affiliation_string":"Beijing Jiaotong University,Beijing,CN","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"Beijing Jiaotong University, Beijing, CN","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071053999","display_name":"Yufei Han","orcid":"https://orcid.org/0000-0002-3492-328X"},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Yufei Han","raw_affiliation_strings":["INRIA,France","INRIA, France"],"affiliations":[{"raw_affiliation_string":"INRIA,France","institution_ids":["https://openalex.org/I1326498283"]},{"raw_affiliation_string":"INRIA, France","institution_ids":["https://openalex.org/I1326498283"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020641129","display_name":"Longyang Yi","orcid":"https://orcid.org/0000-0003-0142-0755"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longyang Yi","raw_affiliation_strings":["Beijing Jiaotong University,Beijing,CN","Beijing Jiaotong University, Beijing, CN"],"affiliations":[{"raw_affiliation_string":"Beijing Jiaotong University,Beijing,CN","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"Beijing Jiaotong University, Beijing, CN","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100777576","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0002-5974-1589"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Beijing Jiaotong University,Beijing,CN","Beijing Jiaotong University, Beijing, CN"],"affiliations":[{"raw_affiliation_string":"Beijing Jiaotong University,Beijing,CN","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"Beijing Jiaotong University, Beijing, CN","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100618900","display_name":"Xin Gao","orcid":"https://orcid.org/0000-0002-7108-3574"},"institutions":[{"id":"https://openalex.org/I71920554","display_name":"King Abdullah University of Science and Technology","ror":"https://ror.org/01q3tbs38","country_code":"SA","type":"education","lineage":["https://openalex.org/I71920554"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Xin Gao","raw_affiliation_strings":["King Abdullah University of Science and Technology,Thuwal,SA","King Abdullah University of Science and Technology, Thuwal, SA"],"affiliations":[{"raw_affiliation_string":"King Abdullah University of Science and Technology,Thuwal,SA","institution_ids":["https://openalex.org/I71920554"]},{"raw_affiliation_string":"King Abdullah University of Science and Technology, Thuwal, SA","institution_ids":["https://openalex.org/I71920554"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000755750","display_name":"Xiangliang Zhang","orcid":"https://orcid.org/0000-0002-3574-5665"},"institutions":[{"id":"https://openalex.org/I107639228","display_name":"University of Notre Dame","ror":"https://ror.org/00mkhxb43","country_code":"US","type":"education","lineage":["https://openalex.org/I107639228"]},{"id":"https://openalex.org/I71920554","display_name":"King Abdullah University of Science and Technology","ror":"https://ror.org/01q3tbs38","country_code":"SA","type":"education","lineage":["https://openalex.org/I71920554"]}],"countries":["SA","US"],"is_corresponding":false,"raw_author_name":"Xiangliang Zhang","raw_affiliation_strings":["King Abdullah University of Science and Technology,Thuwal,SA","University of Notre Dame, Indiana, USA","King Abdullah University of Science and Technology, Thuwal, SA"],"affiliations":[{"raw_affiliation_string":"King Abdullah University of Science and Technology,Thuwal,SA","institution_ids":["https://openalex.org/I71920554"]},{"raw_affiliation_string":"University of Notre Dame, Indiana, USA","institution_ids":["https://openalex.org/I107639228"]},{"raw_affiliation_string":"King Abdullah University of Science and Technology, Thuwal, SA","institution_ids":["https://openalex.org/I71920554"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5034502420"],"corresponding_institution_ids":["https://openalex.org/I1326498283"],"apc_list":null,"apc_paid":null,"fwci":0.2088,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.43589336,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1060","last_page":"1069"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.8737682104110718},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7974979877471924},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.672502875328064},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6154018640518188},{"id":"https://openalex.org/keywords/categorical-variable","display_name":"Categorical variable","score":0.5653924942016602},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.562170147895813},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.47147276997566223},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4525054693222046},{"id":"https://openalex.org/keywords/robustness-testing","display_name":"Robustness testing","score":0.4449785649776459},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.44277533888816833},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36533287167549133},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.325438916683197},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.1785949468612671}],"concepts":[{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.8737682104110718},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7974979877471924},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.672502875328064},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6154018640518188},{"id":"https://openalex.org/C5274069","wikidata":"https://www.wikidata.org/wiki/Q2285707","display_name":"Categorical variable","level":2,"score":0.5653924942016602},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.562170147895813},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.47147276997566223},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4525054693222046},{"id":"https://openalex.org/C137726913","wikidata":"https://www.wikidata.org/wiki/Q7353550","display_name":"Robustness testing","level":3,"score":0.4449785649776459},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44277533888816833},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36533287167549133},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.325438916683197},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.1785949468612671},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1109/bigdata55660.2022.10021026","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata55660.2022.10021026","pdf_url":null,"source":{"id":"https://openalex.org/S4363607709","display_name":"2022 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2212.13989","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2212.13989","pdf_url":"https://arxiv.org/pdf/2212.13989","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"pmh:oai:HAL:hal-03893496v1","is_oa":false,"landing_page_url":"https://inria.hal.science/hal-03893496","pdf_url":null,"source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"BigData 2022 - IEEE International Conference on Big Data, Dec 2022, Osaka, Japan. pp.1-13","raw_type":"Conference papers"},{"id":"pmh:oai:repository.kaust.edu.sa:10754/687388","is_oa":false,"landing_page_url":"http://hdl.handle.net/10754/687388","pdf_url":null,"source":{"id":"https://openalex.org/S4306401596","display_name":"King Abdullah University of Science and Technology Repository (King Abdullah University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I71920554","host_organization_name":"King Abdullah University of Science and Technology","host_organization_lineage":["https://openalex.org/I71920554"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"},{"id":"doi:10.48550/arxiv.2212.13989","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2212.13989","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2212.13989","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2212.13989","pdf_url":"https://arxiv.org/pdf/2212.13989","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"score":0.6100000143051147,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322320","display_name":"King Abdullah University of Science and Technology","ror":"https://ror.org/01q3tbs38"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":58,"referenced_works":["https://openalex.org/W1587647246","https://openalex.org/W1614298861","https://openalex.org/W1945616565","https://openalex.org/W2250539671","https://openalex.org/W2508156266","https://openalex.org/W2618235498","https://openalex.org/W2745565856","https://openalex.org/W2767094836","https://openalex.org/W2896457183","https://openalex.org/W2898193427","https://openalex.org/W2900681891","https://openalex.org/W2902901209","https://openalex.org/W2905526464","https://openalex.org/W2908456139","https://openalex.org/W2922266396","https://openalex.org/W2946297661","https://openalex.org/W2950048339","https://openalex.org/W2962827663","https://openalex.org/W2963126845","https://openalex.org/W2963416784","https://openalex.org/W2963440492","https://openalex.org/W2963859254","https://openalex.org/W2964314169","https://openalex.org/W2966492225","https://openalex.org/W2982412572","https://openalex.org/W2985390828","https://openalex.org/W2988194011","https://openalex.org/W2996851481","https://openalex.org/W3006622081","https://openalex.org/W3009655978","https://openalex.org/W3013371788","https://openalex.org/W3015481738","https://openalex.org/W3031781733","https://openalex.org/W3035736465","https://openalex.org/W3080768351","https://openalex.org/W3101449015","https://openalex.org/W3103934057","https://openalex.org/W3117433489","https://openalex.org/W3153567752","https://openalex.org/W3208933101","https://openalex.org/W3211484264","https://openalex.org/W6636510571","https://openalex.org/W6640425456","https://openalex.org/W6725508424","https://openalex.org/W6738369334","https://openalex.org/W6740761382","https://openalex.org/W6750745550","https://openalex.org/W6752083044","https://openalex.org/W6755207826","https://openalex.org/W6755829279","https://openalex.org/W6756790665","https://openalex.org/W6758684365","https://openalex.org/W6762814303","https://openalex.org/W6763172785","https://openalex.org/W6767526851","https://openalex.org/W6771748797","https://openalex.org/W6774192314","https://openalex.org/W6803084059"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4288019534","https://openalex.org/W4310988119","https://openalex.org/W4285226279"],"abstract_inverted_index":{"Machine":[0,48],"Learning-as-a-Service":[1],"systems":[2],"(MLaaS)":[3],"have":[4],"been":[5],"largely":[6],"developed":[7],"for":[8,34,124],"cybersecurity-critical":[9,130],"applications,":[10],"such":[11],"as":[12,102],"detecting":[13],"network":[14],"intrusions":[15],"and":[16,79,150],"fake":[17,147],"news":[18,148],"campaigns.":[19],"Despite":[20],"effectiveness,":[21],"their":[22],"robustness":[23,45,68,98,121,139],"against":[24,69],"adversarial":[25,44,120],"attacks":[26],"is":[27],"one":[28],"of":[29,46,55,71,128,136],"the":[30,43,47,53,90,97,134,137],"key":[31],"trust":[32],"concerns":[33],"MLaaS":[35],"deployment.":[36],"We":[37,111,132],"are":[38,74],"thus":[39],"motivated":[40],"to":[41,76,89,107],"assess":[42],"Learning":[49],"models":[50],"residing":[51],"at":[52],"core":[54],"these":[56],"securitycritical":[57],"applications":[58],"with":[59,142],"categorical":[60,72],"inputs.":[61],"Previous":[62],"research":[63],"efforts":[64],"on":[65,82,146],"accessing":[66],"model":[67],"manipulation":[70],"inputs":[73],"specific":[75],"use":[77,135],"cases":[78],"heavily":[80],"depend":[81],"domain":[83],"knowledge,":[84],"or":[85],"require":[86],"white-box":[87],"access":[88],"target":[91],"ML":[92],"model.":[93],"Such":[94],"limitations":[95],"prevent":[96],"assessment":[99,122,140],"from":[100],"being":[101],"a":[103,113,125],"domain-agnostic":[104,138],"service":[105],"provided":[106],"various":[108],"real-world":[109],"applications.":[110,131],"propose":[112],"provably":[114],"optimal":[115],"yet":[116],"computationally":[117],"highly":[118],"efficient":[119],"protocol":[123],"wide":[126],"band":[127],"ML-driven":[129],"demonstrate":[133],"method":[141],"substantial":[143],"experimental":[144],"study":[145],"detection":[149,152],"intrusion":[151],"problems.":[153]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2022-12-27T00:00:00"}
