{"id":"https://openalex.org/W4313040981","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy55231.2022.9927842","title":"An XAI-based adversarial training approach for cyber-threat detection","display_name":"An XAI-based adversarial training approach for cyber-threat detection","publication_year":2022,"publication_date":"2022-09-12","ids":{"openalex":"https://openalex.org/W4313040981","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy55231.2022.9927842"},"language":"en","primary_location":{"id":"doi:10.1109/dasc/picom/cbdcom/cy55231.2022.9927842","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy55231.2022.9927842","pdf_url":null,"source":{"id":"https://openalex.org/S4363605495","display_name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079873470","display_name":"Malik AL-Essa","orcid":"https://orcid.org/0000-0002-0892-975X"},"institutions":[{"id":"https://openalex.org/I5561750","display_name":"University of Bari Aldo Moro","ror":"https://ror.org/027ynra39","country_code":"IT","type":"education","lineage":["https://openalex.org/I5561750"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Malik AL-Essa","raw_affiliation_strings":["University of Bari \"Aldo Moro\",Department of Computer Science,Bari,Italy","Department of Computer Science, University of Bari \"Aldo Moro\", Bari, Italy"],"affiliations":[{"raw_affiliation_string":"University of Bari \"Aldo Moro\",Department of Computer Science,Bari,Italy","institution_ids":["https://openalex.org/I5561750"]},{"raw_affiliation_string":"Department of Computer Science, University of Bari \"Aldo Moro\", Bari, Italy","institution_ids":["https://openalex.org/I5561750"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064688726","display_name":"Giuseppina Andresini","orcid":"https://orcid.org/0000-0002-5272-644X"},"institutions":[{"id":"https://openalex.org/I5561750","display_name":"University of Bari Aldo Moro","ror":"https://ror.org/027ynra39","country_code":"IT","type":"education","lineage":["https://openalex.org/I5561750"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giuseppina Andresini","raw_affiliation_strings":["University of Bari \"Aldo Moro\",Department of Computer Science,Bari,Italy","Department of Computer Science, University of Bari \"Aldo Moro\", Bari, Italy"],"affiliations":[{"raw_affiliation_string":"University of Bari \"Aldo Moro\",Department of Computer Science,Bari,Italy","institution_ids":["https://openalex.org/I5561750"]},{"raw_affiliation_string":"Department of Computer Science, University of Bari \"Aldo Moro\", Bari, Italy","institution_ids":["https://openalex.org/I5561750"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055560733","display_name":"Annalisa Appice","orcid":"https://orcid.org/0000-0001-9840-844X"},"institutions":[{"id":"https://openalex.org/I5561750","display_name":"University of Bari Aldo Moro","ror":"https://ror.org/027ynra39","country_code":"IT","type":"education","lineage":["https://openalex.org/I5561750"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Annalisa Appice","raw_affiliation_strings":["University of Bari \"Aldo Moro\",Department of Computer Science,Bari,Italy","Department of Computer Science, University of Bari \"Aldo Moro\", Bari, Italy"],"affiliations":[{"raw_affiliation_string":"University of Bari \"Aldo Moro\",Department of Computer Science,Bari,Italy","institution_ids":["https://openalex.org/I5561750"]},{"raw_affiliation_string":"Department of Computer Science, University of Bari \"Aldo Moro\", Bari, Italy","institution_ids":["https://openalex.org/I5561750"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035789137","display_name":"Donato Malerba","orcid":"https://orcid.org/0000-0001-8432-4608"},"institutions":[{"id":"https://openalex.org/I5561750","display_name":"University of Bari Aldo Moro","ror":"https://ror.org/027ynra39","country_code":"IT","type":"education","lineage":["https://openalex.org/I5561750"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Donato Malerba","raw_affiliation_strings":["University of Bari \"Aldo Moro\",Department of Computer Science,Bari,Italy","Department of Computer Science, University of Bari \"Aldo Moro\", Bari, Italy"],"affiliations":[{"raw_affiliation_string":"University of Bari \"Aldo Moro\",Department of Computer Science,Bari,Italy","institution_ids":["https://openalex.org/I5561750"]},{"raw_affiliation_string":"Department of Computer Science, University of Bari \"Aldo Moro\", Bari, Italy","institution_ids":["https://openalex.org/I5561750"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5079873470"],"corresponding_institution_ids":["https://openalex.org/I5561750"],"apc_list":null,"apc_paid":null,"fwci":1.4552,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.84426848,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.9061101675033569},{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.8833081722259521},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7870402932167053},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7664920687675476},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6454523801803589},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6389389038085938},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6221672892570496},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.6195915341377258},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5355206727981567},{"id":"https://openalex.org/keywords/training-set","display_name":"Training set","score":0.502119779586792},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.47563767433166504},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.42796117067337036}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.9061101675033569},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.8833081722259521},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7870402932167053},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7664920687675476},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6454523801803589},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6389389038085938},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6221672892570496},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.6195915341377258},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5355206727981567},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.502119779586792},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.47563767433166504},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.42796117067337036},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/dasc/picom/cbdcom/cy55231.2022.9927842","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy55231.2022.9927842","pdf_url":null,"source":{"id":"https://openalex.org/S4363605495","display_name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","raw_type":"proceedings-article"},{"id":"pmh:oai:ricerca.uniba.it:11586/429193","is_oa":false,"landing_page_url":"https://hdl.handle.net/11586/429193","pdf_url":null,"source":{"id":"https://openalex.org/S4377196296","display_name":"CINECA IRIS Institutional Research Information System (University of Bari Aldo Moro)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I5561750","host_organization_name":"University of Bari Aldo Moro","host_organization_lineage":["https://openalex.org/I5561750"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1945616565","https://openalex.org/W2612690371","https://openalex.org/W2929803724","https://openalex.org/W2996564870","https://openalex.org/W3000716014","https://openalex.org/W3090540360","https://openalex.org/W3096425977","https://openalex.org/W3096437212","https://openalex.org/W3116057280","https://openalex.org/W3131088496","https://openalex.org/W3153493188","https://openalex.org/W3157331533","https://openalex.org/W3167400801","https://openalex.org/W3180062783","https://openalex.org/W3191453585","https://openalex.org/W3204683301","https://openalex.org/W3207320473","https://openalex.org/W3208097639","https://openalex.org/W3210231570","https://openalex.org/W4210659135","https://openalex.org/W4224243186","https://openalex.org/W4224249813","https://openalex.org/W4293846201","https://openalex.org/W6640425456","https://openalex.org/W6712678549","https://openalex.org/W6739868092","https://openalex.org/W6771809012","https://openalex.org/W6793860773"],"related_works":["https://openalex.org/W2943982549","https://openalex.org/W4297660007","https://openalex.org/W2886918272","https://openalex.org/W4387589990","https://openalex.org/W2346578521","https://openalex.org/W2910028250","https://openalex.org/W2950183588","https://openalex.org/W4241566321","https://openalex.org/W3101055019","https://openalex.org/W3094353829"],"abstract_inverted_index":{"Adversarial":[0],"training":[1,56,88,103,136],"is":[2],"commonly":[3],"used":[4,110],"in":[5,59,174],"the":[6,12,33,63,77,82,86,94,101,119,122,127,130,134,152,156,168,171,175],"artificial":[7,39],"intelligence":[8],"literature":[9],"to":[10,18,31,61,80,92,111,150],"improve":[11,32,151],"robustness":[13],"of":[14,37,65,97,121,129,155,170,178],"deep":[15,43,66,157],"neural":[16,44,67,158],"models":[17,68],"adversarial":[19,55,83,87,102,135],"samples.":[20],"In":[21,46,73],"addition,":[22],"eXplainable":[23],"Artificial":[24],"Intelligence":[25],"(XAI)":[26],"has":[27],"been":[28],"recently":[29],"investigated":[30],"interpretability":[34],"and":[35,57,90],"explainability":[36],"black-box":[38],"systems":[40],"such":[41],"as":[42],"models.":[45],"this":[47,139],"study,":[48],"we":[49,75,142],"propose":[50],"a":[51,113,144],"methodology":[52,173],"that":[53,117],"combines":[54],"XAI,":[58],"order":[60],"increase":[62],"accuracy":[64,153],"trained":[69],"for":[70,85],"cyber-threat":[71],"detection.":[72],"particular,":[74],"use":[76],"FGSM":[78],"technique":[79],"generate":[81],"samples":[84],"stage,":[89],"SHAP":[91],"produce":[93,112],"local":[95,106],"explanations":[96,107],"decisions":[98],"made":[99],"during":[100,133],"stage.":[104,137],"These":[105],"are,":[108],"subsequently,":[109],"new":[114],"feature":[115],"set":[116],"describes":[118],"effect":[120],"original":[123],"cyber-data":[124],"characteristics":[125],"on":[126,162],"classifications":[128],"examples":[131],"processed":[132],"Leveraging":[138],"XAI-based":[140],"information,":[141],"apply":[143],"transfer":[145],"learning":[146],"strategy,":[147],"namely":[148],"fine-tuning,":[149],"performance":[154],"model.":[159],"Experiments":[160],"conducted":[161],"two":[163],"benchmark":[164],"cybersecurity":[165],"datasets":[166],"prove":[167],"effectiveness":[169],"proposed":[172],"multi-class":[176],"classification":[177],"cyber-data.":[179]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
