{"id":"https://openalex.org/W3109241147","doi":"https://doi.org/10.1109/icce-taiwan49838.2020.9258068","title":"Vulnerability Assessment for Machine Learning Based Network Anomaly Detection System","display_name":"Vulnerability Assessment for Machine Learning Based Network Anomaly Detection System","publication_year":2020,"publication_date":"2020-09-28","ids":{"openalex":"https://openalex.org/W3109241147","doi":"https://doi.org/10.1109/icce-taiwan49838.2020.9258068","mag":"3109241147"},"language":"en","primary_location":{"id":"doi:10.1109/icce-taiwan49838.2020.9258068","is_oa":false,"landing_page_url":"http://doi.org/10.1109/icce-taiwan49838.2020.9258068","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048847716","display_name":"Yuji Ogawa","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yuji Ogawa","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079640692","display_name":"Tomotaka Kimura","orcid":"https://orcid.org/0000-0003-0677-9767"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tomotaka Kimura","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5065201436","display_name":"Jun Cheng","orcid":"https://orcid.org/0000-0002-7771-2132"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jun Cheng","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5048847716"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5302,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.73702577,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6890532970428467},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6673337817192078},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6084295511245728},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5376812815666199},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.44555073976516724},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4434163570404053},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.36938685178756714},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21356019377708435}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6890532970428467},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6673337817192078},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6084295511245728},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5376812815666199},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.44555073976516724},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4434163570404053},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.36938685178756714},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21356019377708435},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icce-taiwan49838.2020.9258068","is_oa":false,"landing_page_url":"http://doi.org/10.1109/icce-taiwan49838.2020.9258068","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5400000214576721}],"awards":[{"id":"https://openalex.org/G6959361241","display_name":null,"funder_award_id":"20H04184","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2099471712","https://openalex.org/W2765424254","https://openalex.org/W2900774199","https://openalex.org/W2962700793","https://openalex.org/W3103557498","https://openalex.org/W4285719527","https://openalex.org/W4320013936","https://openalex.org/W6756599296"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2961085424","https://openalex.org/W2806741695","https://openalex.org/W4306674287","https://openalex.org/W3210364259","https://openalex.org/W4224009465","https://openalex.org/W3044458868","https://openalex.org/W4285195761","https://openalex.org/W2379513284","https://openalex.org/W2900108648"],"abstract_inverted_index":{"In":[0],"this":[1,87],"paper,":[2],"we":[3,89],"assess":[4],"the":[5,18,39,58,65,82],"vulnerability":[6,92],"of":[7,20,32,41,54,60,94],"network":[8,22,66,97],"anomaly":[9,23,67,98],"detection":[10,24,68,93,99],"systems":[11,25],"that":[12,31],"use":[13,40],"machine":[14,36,42,61,95],"learning":[15,37,43,62,96],"methods.":[16],"Although":[17],"performance":[19],"these":[21],"is":[26,48],"high":[27],"in":[28,64,81,86],"comparison":[29],"to":[30,79],"existing":[33],"methods":[34,44,100],"without":[35],"methods,":[38],"for":[45],"detecting":[46],"vulnerabilities":[47,59],"a":[49],"growing":[50],"concern":[51],"among":[52],"researchers":[53],"image":[55],"processing.":[56],"If":[57],"used":[63],"method":[69],"are":[70,77],"exploited":[71],"by":[72],"attackers,":[73],"large":[74],"security":[75],"threats":[76],"likely":[78],"emerge":[80],"near":[83],"future.":[84],"Therefore,":[85],"paper":[88],"clarify":[90],"how":[91],"affects":[101],"their":[102],"performance.":[103]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
