{"id":"https://openalex.org/W4391769252","doi":"https://doi.org/10.1109/ccwc60891.2024.10427598","title":"State of the art: Security Testing of Machine Learning Development Systems","display_name":"State of the art: Security Testing of Machine Learning Development Systems","publication_year":2024,"publication_date":"2024-01-08","ids":{"openalex":"https://openalex.org/W4391769252","doi":"https://doi.org/10.1109/ccwc60891.2024.10427598"},"language":"en","primary_location":{"id":"doi:10.1109/ccwc60891.2024.10427598","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ccwc60891.2024.10427598","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101694872","display_name":"Saikat Das","orcid":"https://orcid.org/0000-0003-1142-8259"},"institutions":[{"id":"https://openalex.org/I197572798","display_name":"Utah Valley University","ror":"https://ror.org/02rxpxc98","country_code":"US","type":"education","lineage":["https://openalex.org/I197572798"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Saikat Das","raw_affiliation_strings":["Utah Valley University,Dept. of Computer Science,Orem,USA","Dept. of Computer Science, Utah Valley University, Orem, USA"],"affiliations":[{"raw_affiliation_string":"Utah Valley University,Dept. of Computer Science,Orem,USA","institution_ids":["https://openalex.org/I197572798"]},{"raw_affiliation_string":"Dept. of Computer Science, Utah Valley University, Orem, USA","institution_ids":["https://openalex.org/I197572798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083732030","display_name":"Bhargavi Krishnamurthy","orcid":null},"institutions":[{"id":"https://openalex.org/I510634243","display_name":"Sri Siddhartha Medical College","ror":"https://ror.org/01zemh668","country_code":"IN","type":"education","lineage":["https://openalex.org/I4403386631","https://openalex.org/I510634243"]},{"id":"https://openalex.org/I4387153738","display_name":"Siddaganga Institute of Technology","ror":"https://ror.org/00wd8c661","country_code":null,"type":"education","lineage":["https://openalex.org/I4387153738"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bhargavi Krishnamurthy","raw_affiliation_strings":["Siddaganga Institute of Technology,Dept. of Computer Science,Tumakuru,Karnataka,India","Dept. of Computer Science, Siddaganga Institute of Technology, Tumakuru, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Siddaganga Institute of Technology,Dept. of Computer Science,Tumakuru,Karnataka,India","institution_ids":["https://openalex.org/I510634243","https://openalex.org/I4387153738"]},{"raw_affiliation_string":"Dept. of Computer Science, Siddaganga Institute of Technology, Tumakuru, Karnataka, India","institution_ids":["https://openalex.org/I4387153738"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020873617","display_name":"Raktim Ranjan Das","orcid":null},"institutions":[{"id":"https://openalex.org/I32883739","display_name":"Stamford University Bangladesh","ror":"https://ror.org/0441jdk54","country_code":"BD","type":"education","lineage":["https://openalex.org/I32883739"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Raktim Ranjan Das","raw_affiliation_strings":["Stamford University Bangladesh,Dept. of Computer Science,Dhaka,Bangladesh","Dept. of Computer Science, Stamford University Bangladesh, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Stamford University Bangladesh,Dept. of Computer Science,Dhaka,Bangladesh","institution_ids":["https://openalex.org/I32883739"]},{"raw_affiliation_string":"Dept. of Computer Science, Stamford University Bangladesh, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I32883739"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012148704","display_name":"Sajjan G. Shiva","orcid":"https://orcid.org/0000-0002-3996-7484"},"institutions":[{"id":"https://openalex.org/I94658018","display_name":"University of Memphis","ror":"https://ror.org/01cq23130","country_code":"US","type":"education","lineage":["https://openalex.org/I94658018"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sajjan G Shiva","raw_affiliation_strings":["University of Memphis,Dept. of Computer Science,Memphis,USA","Dept. of Computer Science, University of Memphis, Memphis, USA"],"affiliations":[{"raw_affiliation_string":"University of Memphis,Dept. of Computer Science,Memphis,USA","institution_ids":["https://openalex.org/I94658018"]},{"raw_affiliation_string":"Dept. of Computer Science, University of Memphis, Memphis, USA","institution_ids":["https://openalex.org/I94658018"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101694872"],"corresponding_institution_ids":["https://openalex.org/I197572798"],"apc_list":null,"apc_paid":null,"fwci":0.3637,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.61136239,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"30","issue":null,"first_page":"0534","last_page":"0540"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9796000123023987,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7902423143386841},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.6946132779121399},{"id":"https://openalex.org/keywords/model-based-testing","display_name":"Model-based testing","score":0.5710259675979614},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5699104070663452},{"id":"https://openalex.org/keywords/dependency","display_name":"Dependency (UML)","score":0.5259433388710022},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.4576529264450073},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4527653455734253},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.44195759296417236},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38545554876327515},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3425399661064148},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.2886272668838501},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2844539284706116},{"id":"https://openalex.org/keywords/test-case","display_name":"Test case","score":0.27945101261138916},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.16807618737220764},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.14062312245368958},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11514821648597717}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7902423143386841},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.6946132779121399},{"id":"https://openalex.org/C165825675","wikidata":"https://www.wikidata.org/wiki/Q1399743","display_name":"Model-based testing","level":4,"score":0.5710259675979614},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5699104070663452},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.5259433388710022},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.4576529264450073},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4527653455734253},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.44195759296417236},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38545554876327515},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3425399661064148},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2886272668838501},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2844539284706116},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.27945101261138916},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.16807618737220764},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.14062312245368958},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11514821648597717},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C152877465","wikidata":"https://www.wikidata.org/wiki/Q208042","display_name":"Regression analysis","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccwc60891.2024.10427598","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ccwc60891.2024.10427598","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W9657784","https://openalex.org/W2765325683","https://openalex.org/W2774423163","https://openalex.org/W2783155279","https://openalex.org/W2809895662","https://openalex.org/W2897749473","https://openalex.org/W2897865027","https://openalex.org/W2920505949","https://openalex.org/W2934843808","https://openalex.org/W2957377429","https://openalex.org/W2963070423","https://openalex.org/W2963844355","https://openalex.org/W2963888996","https://openalex.org/W2966689772","https://openalex.org/W2979590797","https://openalex.org/W2983140679","https://openalex.org/W2996355630","https://openalex.org/W3007157104","https://openalex.org/W3080798771","https://openalex.org/W3103836116","https://openalex.org/W3114686421","https://openalex.org/W3131341263","https://openalex.org/W3153233384","https://openalex.org/W3158735461","https://openalex.org/W3173524712","https://openalex.org/W3174136778","https://openalex.org/W3178326529","https://openalex.org/W3189586864","https://openalex.org/W3203138619","https://openalex.org/W4200499058","https://openalex.org/W4205413245","https://openalex.org/W4206129140","https://openalex.org/W4289364833","https://openalex.org/W4308410483","https://openalex.org/W4313527147","https://openalex.org/W6739088070","https://openalex.org/W6760455298","https://openalex.org/W6779272815"],"related_works":["https://openalex.org/W4287995720","https://openalex.org/W343844859","https://openalex.org/W2108147409","https://openalex.org/W2397931496","https://openalex.org/W2112397448","https://openalex.org/W2017116761","https://openalex.org/W2418642600","https://openalex.org/W2018644264","https://openalex.org/W2883314064","https://openalex.org/W88610236"],"abstract_inverted_index":{"In":[0],"recent":[1],"days,":[2],"machine":[3],"learning":[4],"(ML)":[5],"systems":[6,27,90],"have":[7],"become":[8],"integral":[9],"to":[10,21,46,204],"nearly":[11],"all":[12],"mainstream":[13],"applications.":[14],"Understanding":[15],"the":[16,22,38,66,77,102,114,137,140,143,147,150,165,169,197,200],"underlying":[17],"logic":[18],"that":[19],"contributes":[20],"desired":[23],"behavior":[24],"in":[25,36],"ML":[26,44,53,89,122,151,184],"can":[28],"be":[29],"challenging.":[30],"Humans":[31],"play":[32],"a":[33,69,72,80,93,134],"crucial":[34],"role":[35],"providing":[37],"necessary":[39],"data":[40,61,107],"samples":[41],"for":[42,86],"training":[43,136],"models":[45],"ensure":[47],"accurate":[48],"predictions.":[49],"The":[50,186],"complexity":[51],"of":[52,68,79,117,168,183,196],"testing":[54,82,139],"arises":[55],"from":[56],"various":[57,159],"factors":[58],"such":[59],"as":[60,96],"dependency,":[62],"dynamic":[63,115],"model":[64,123],"behavior,":[65],"absence":[67],"test":[70],"oracle,":[71],"vast":[73],"input":[74],"space,":[75],"and":[76,104,145,174,180,199],"lack":[78],"specific":[81],"life":[83],"cycle":[84],"tailored":[85],"ML.":[87],"Testing":[88],"is":[91,110],"not":[92,98],"straightforward":[94],"process,":[95],"it":[97],"only":[99],"involves":[100],"verifying":[101],"code":[103],"their":[105],"corresponding":[106,201],"but":[108],"also":[109,188],"further":[111],"complicated":[112],"by":[113],"nature":[116],"these":[118],"systems.":[119],"A":[120],"typical":[121],"undergoes":[124],"seven":[125],"stages,":[126],"including":[127],"eliciting":[128],"business":[129],"needs/requirements,":[130],"gathering":[131],"data,":[132,178],"selecting":[133],"model,":[135,138,141,144,179],"deploying":[142],"monitoring":[146],"model.":[148],"Throughout":[149],"Development":[152],"Life":[153],"Cycle":[154],"(MLDLC),":[155],"each":[156,194],"stage":[157,195],"introduces":[158],"security":[160,172,191,202],"risks.":[161],"This":[162],"paper":[163,187],"explores":[164],"current":[166],"state":[167],"literature":[170],"on":[171],"attacks":[173,192],"defense":[175],"approaches":[176],"concerning":[177],"prediction":[181],"output":[182],"models.":[185],"addresses":[189],"potential":[190],"at":[193],"MLDLC":[198],"measures":[203],"mitigate":[205],"those":[206],"attacks.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
