{"id":"https://openalex.org/W3048525077","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162699","title":"U-ASG: A Universal Method to Perform Adversarial Attack on Autoencoder based Network Anomaly Detection Systems","display_name":"U-ASG: A Universal Method to Perform Adversarial Attack on Autoencoder based Network Anomaly Detection Systems","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3048525077","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162699","mag":"3048525077"},"language":"en","primary_location":{"id":"doi:10.1109/infocomwkshps50562.2020.9162699","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162699","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027471859","display_name":"Chenming Yang","orcid":"https://orcid.org/0000-0003-3391-2316"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chenming Yang","raw_affiliation_strings":["National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, P. R. China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, P. R. China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021327800","display_name":"Liang Zhou","orcid":"https://orcid.org/0000-0002-9453-3734"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Zhou","raw_affiliation_strings":["National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, P. R. China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, P. R. China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079575403","display_name":"Hui Wen","orcid":"https://orcid.org/0000-0003-0854-4152"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Wen","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, P. R. China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, P. R. China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101567641","display_name":"Yue Wu","orcid":"https://orcid.org/0000-0002-5832-0037"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Wu","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, P. R. China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, P. R. China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5027471859"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.7954,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.78370727,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"68","last_page":"73"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.9435983896255493},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7350755929946899},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6409567594528198},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6382277607917786},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6223106980323792},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6206757426261902},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4904124438762665},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.46536707878112793},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.4558206796646118},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.41303062438964844},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4003103971481323}],"concepts":[{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.9435983896255493},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7350755929946899},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6409567594528198},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6382277607917786},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6223106980323792},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6206757426261902},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4904124438762665},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.46536707878112793},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.4558206796646118},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.41303062438964844},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4003103971481323},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocomwkshps50562.2020.9162699","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162699","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W1959608418","https://openalex.org/W1966809779","https://openalex.org/W2005126631","https://openalex.org/W2060037683","https://openalex.org/W2122361470","https://openalex.org/W2122646361","https://openalex.org/W2127979711","https://openalex.org/W2145094598","https://openalex.org/W2559944883","https://openalex.org/W2599354622","https://openalex.org/W2786088545","https://openalex.org/W2808173987","https://openalex.org/W2963045681","https://openalex.org/W2963207607","https://openalex.org/W2963542245","https://openalex.org/W2964121744","https://openalex.org/W2964153729","https://openalex.org/W2997574889","https://openalex.org/W3120740533","https://openalex.org/W3153872861","https://openalex.org/W4289146964","https://openalex.org/W4391602018","https://openalex.org/W6631190155","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6640963894","https://openalex.org/W6681096077","https://openalex.org/W6719080892","https://openalex.org/W6748102297","https://openalex.org/W7016021835"],"related_works":["https://openalex.org/W3186512740","https://openalex.org/W2669956259","https://openalex.org/W3048732067","https://openalex.org/W4249005693","https://openalex.org/W3194885736","https://openalex.org/W4383468834","https://openalex.org/W4363671829","https://openalex.org/W4392946183","https://openalex.org/W3088732000","https://openalex.org/W4283221438"],"abstract_inverted_index":{"Semi-supervised":[0],"machine":[1],"learning":[2],"models,":[3],"especially":[4],"deep":[5],"neural":[6],"networks,":[7],"have":[8],"been":[9],"widely":[10],"used":[11],"in":[12,22,98],"network":[13,58],"anomaly":[14,59],"detection":[15,60],"for":[16],"their":[17,36],"capability":[18],"of":[19,65,91,105,170],"capturing":[20],"patterns":[21],"normal":[23],"data.":[24],"However,":[25],"the":[26,84,88,102,106,110,121,125,152,158,168,171],"models":[27],"face":[28],"security":[29],"challenges":[30],"when":[31],"an":[32,95],"attacker":[33],"has":[34],"obtained":[35],"full":[37],"details.":[38],"In":[39],"this":[40],"paper,":[41],"we":[42,100,138],"propose":[43],"a":[44,140,148],"universal":[45],"adversarial":[46,53,66,72,92,107,159],"sample":[47],"generator":[48],"(U-ASG),":[49],"to":[50,69,77,81,116,119,132,142,151],"perform":[51],"white-box":[52],"attacks":[54,67,160],"on":[55],"autoencoder-based":[56,172],"semi-supervised":[57],"(SSNAD)":[61],"systems.":[62,174],"The":[63],"purpose":[64],"is":[68,130],"generate":[70],"small":[71],"perturbations":[73,93,134],"and":[74,113],"add":[75],"them":[76],"targeted":[78],"anomalous":[79],"samples":[80,108],"fly":[82],"under":[83],"radar.":[85],"We":[86],"model":[87],"generation":[89],"process":[90],"as":[94],"optimization":[96],"problem,":[97],"which":[99,129],"minimize":[101],"reconstruction":[103],"errors":[104],"through":[109,135],"trained":[111],"autoencoder":[112,127],"approximate":[114],"it":[115],"solve.":[117],"Furthermore,":[118],"improve":[120],"attack":[122],"performance":[123,169],"against":[124],"variational":[126],"(VAE),":[128],"robust":[131],"tiny":[133],"uncertainty":[136],"modeling,":[137],"design":[139],"mechanism":[141],"weaken":[143],"its":[144],"robustness":[145],"by":[146,162],"introducing":[147],"variance":[149],"regularizer":[150],"optimization.":[153],"Simulation":[154],"results":[155],"show":[156],"that":[157],"generated":[161],"our":[163],"U-ASG":[164],"can":[165],"effectively":[166],"degrade":[167],"SSNAD":[173]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
