{"id":"https://openalex.org/W4320031220","doi":"https://doi.org/10.1109/milcom55135.2022.10017615","title":"Formal Adversarial Analysis of Machine Learning based Cyber Physical Authentication Systems","display_name":"Formal Adversarial Analysis of Machine Learning based Cyber Physical Authentication Systems","publication_year":2022,"publication_date":"2022-11-28","ids":{"openalex":"https://openalex.org/W4320031220","doi":"https://doi.org/10.1109/milcom55135.2022.10017615"},"language":"en","primary_location":{"id":"doi:10.1109/milcom55135.2022.10017615","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/milcom55135.2022.10017615","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084516795","display_name":"Koosha Sadeghi","orcid":"https://orcid.org/0000-0002-1246-2494"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Koosha Sadeghi","raw_affiliation_strings":["SCAI, Arizona State University"],"affiliations":[{"raw_affiliation_string":"SCAI, Arizona State University","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100606339","display_name":"Ayan Banerjee","orcid":"https://orcid.org/0000-0001-6529-1644"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ayan Banerjee","raw_affiliation_strings":["SCAI, Arizona State University"],"affiliations":[{"raw_affiliation_string":"SCAI, Arizona State University","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100601792","display_name":"Sandeep K. S. Gupta","orcid":"https://orcid.org/0000-0002-6108-5584"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sandeep K.S. Gupta","raw_affiliation_strings":["SCAI, Arizona State University"],"affiliations":[{"raw_affiliation_string":"SCAI, Arizona State University","institution_ids":["https://openalex.org/I55732556"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5084516795"],"corresponding_institution_ids":["https://openalex.org/I55732556"],"apc_list":null,"apc_paid":null,"fwci":0.202,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.41908714,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1005","last_page":"1010"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10429","display_name":"EEG and Brain-Computer Interfaces","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/2805","display_name":"Cognitive Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T10429","display_name":"EEG and Brain-Computer Interfaces","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/2805","display_name":"Cognitive Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9771000146865845,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9697999954223633,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7725400328636169},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.7570058107376099},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7364310026168823},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6052584648132324},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5979951620101929},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5569350123405457},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.546613335609436},{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.5398740768432617},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4941876232624054},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.4333272874355316},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.36587411165237427},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3618242144584656},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34243494272232056}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7725400328636169},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.7570058107376099},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7364310026168823},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6052584648132324},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5979951620101929},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5569350123405457},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.546613335609436},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.5398740768432617},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4941876232624054},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.4333272874355316},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.36587411165237427},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3618242144584656},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34243494272232056},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom55135.2022.10017615","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/milcom55135.2022.10017615","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W6316837","https://openalex.org/W182695033","https://openalex.org/W1482432820","https://openalex.org/W1978293524","https://openalex.org/W1980833697","https://openalex.org/W2008386015","https://openalex.org/W2028729143","https://openalex.org/W2039846342","https://openalex.org/W2041935121","https://openalex.org/W2055603681","https://openalex.org/W2075183129","https://openalex.org/W2128377844","https://openalex.org/W2134577338","https://openalex.org/W2136365570","https://openalex.org/W2146108785","https://openalex.org/W2154574840","https://openalex.org/W2160621778","https://openalex.org/W2215117879","https://openalex.org/W2548628141"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W4384648009","https://openalex.org/W4303645823","https://openalex.org/W4285263558","https://openalex.org/W2900159906","https://openalex.org/W4287828318","https://openalex.org/W2406556600","https://openalex.org/W4283221438","https://openalex.org/W2899811703"],"abstract_inverted_index":{"Advent":[0],"of":[1,6,20,57,87,116,152],"non-invasive":[2],"sensors":[3],"enables":[4],"development":[5],"data":[7],"driven":[8],"authentication":[9,12,95,104],"systems.":[10,96],"For":[11],"purposes,":[13],"sensor":[14],"signal":[15,29,47],"samples":[16],"and":[17,38,121,137,149],"claimed":[18],"identity":[19],"a":[21,82],"user":[22,49],"are":[23,42,110,129],"required":[24],"to":[25,44,71,112],"indicate":[26],"whether":[27],"the":[28,31,114,122,138],"matches":[30],"identity.":[32],"In":[33,77,106],"this":[34,78],"sense,":[35],"feature":[36],"extraction":[37],"machine":[39,88],"learning":[40,89],"techniques":[41,90],"used":[43,91],"categorize":[45],"EEG":[46,102],"as":[48,60],"or":[50],"non-user":[51],"data,":[52],"respectively.":[53],"But,":[54],"chaotic":[55],"nature":[56],"signals":[58],"such":[59],"brain":[61],"electroencephalograms":[62],"(EEG)":[63],"prevent":[64],"us":[65],"from":[66,134],"perfect":[67],"classification":[68],"that":[69],"leads":[70],"various":[72],"accuracies":[73],"(other":[74],"than":[75],"100%).":[76],"research,":[79],"we":[80],"provide":[81],"framework":[83],"for":[84,101,119,146],"adversarial":[85],"analysis":[86,109,136],"in":[92],"cyber":[93],"physical":[94],"We":[97],"show":[98],"its":[99],"usage":[100],"based":[103],"system.":[105],"theory,":[107],"geometrical":[108],"performed":[111],"compare":[113],"space":[115],"valid":[117,147],"choices":[118],"attacker":[120,153],"total":[123],"choosing":[124],"space.":[125],"The":[126],"obtained":[127],"results":[128,133],"compared":[130],"with":[131],"expected":[132],"theoretical":[135],"trade-off":[139],"between":[140],"security":[141],"system":[142],"performance":[143],"(acceptance":[144],"rate":[145],"users)":[148],"robustness":[150],"(number":[151],"efforts)":[154],"is":[155],"thoroughly":[156],"analyzed.":[157]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
