{"id":"https://openalex.org/W7126017991","doi":"https://doi.org/10.1109/nfv-sdn66355.2025.11349410","title":"Cloud-based Platform-agnostic Adversarial AI Defence framework","display_name":"Cloud-based Platform-agnostic Adversarial AI Defence framework","publication_year":2025,"publication_date":"2025-11-10","ids":{"openalex":"https://openalex.org/W7126017991","doi":"https://doi.org/10.1109/nfv-sdn66355.2025.11349410"},"language":null,"primary_location":{"id":"doi:10.1109/nfv-sdn66355.2025.11349410","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nfv-sdn66355.2025.11349410","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Conference on Network Function Virtualization and Software-Defined Networking (NFV-SDN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101448557","display_name":"George Petihakis","orcid":"https://orcid.org/0009-0005-8037-6378"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"George Petihakis","raw_affiliation_strings":["University of Piraeus,Greece"],"affiliations":[{"raw_affiliation_string":"University of Piraeus,Greece","institution_ids":["https://openalex.org/I154757721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077018501","display_name":"Aristeidis Farao","orcid":"https://orcid.org/0000-0001-6954-0791"},"institutions":[{"id":"https://openalex.org/I4210091604","display_name":"Health Innovations (United States)","ror":"https://ror.org/00darzp70","country_code":"US","type":"company","lineage":["https://openalex.org/I4210091604"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aristeidis Farao","raw_affiliation_strings":["InQbit Innovations SRL.,Romania"],"affiliations":[{"raw_affiliation_string":"InQbit Innovations SRL.,Romania","institution_ids":["https://openalex.org/I4210091604"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014882973","display_name":"Vaios Bolgouras","orcid":"https://orcid.org/0000-0002-4934-7625"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Vaios Bolgouras","raw_affiliation_strings":["Unisystems Luxembourg S&#x00E1;rl,Luxembourg"],"affiliations":[{"raw_affiliation_string":"Unisystems Luxembourg S&#x00E1;rl,Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061112638","display_name":"Panagiotis Bountakas","orcid":"https://orcid.org/0000-0001-8155-1784"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Panagiotis Bountakas","raw_affiliation_strings":["University of Piraeus,Greece"],"affiliations":[{"raw_affiliation_string":"University of Piraeus,Greece","institution_ids":["https://openalex.org/I154757721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008204584","display_name":"Aggeliki Panou","orcid":null},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Aggeliki Panou","raw_affiliation_strings":["University of Piraeus,Greece"],"affiliations":[{"raw_affiliation_string":"University of Piraeus,Greece","institution_ids":["https://openalex.org/I154757721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067892665","display_name":"Evangelos Floros","orcid":"https://orcid.org/0000-0002-2745-1958"},"institutions":[{"id":"https://openalex.org/I13045471","display_name":"Kikkoman (Japan)","ror":"https://ror.org/00z0d6447","country_code":"JP","type":"company","lineage":["https://openalex.org/I13045471"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Evangelos Floros","raw_affiliation_strings":["Panepistimiako Geniko Nosokomeio Irakleiou,Greece"],"affiliations":[{"raw_affiliation_string":"Panepistimiako Geniko Nosokomeio Irakleiou,Greece","institution_ids":["https://openalex.org/I13045471"]}]},{"author_position":"middle","author":{"id":null,"display_name":"John C. Polley","orcid":null},"institutions":[{"id":"https://openalex.org/I48168531","display_name":"South University","ror":"https://ror.org/01rjfjt94","country_code":"US","type":"education","lineage":["https://openalex.org/I48168531"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"John C. Polley","raw_affiliation_strings":["University of South California,USA"],"affiliations":[{"raw_affiliation_string":"University of South California,USA","institution_ids":["https://openalex.org/I48168531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032247032","display_name":"Christos Xenakis","orcid":"https://orcid.org/0000-0001-6718-122X"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Christos Xenakis","raw_affiliation_strings":["University of Piraeus,Greece"],"affiliations":[{"raw_affiliation_string":"University of Piraeus,Greece","institution_ids":["https://openalex.org/I154757721"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5101448557"],"corresponding_institution_ids":["https://openalex.org/I154757721"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.85189786,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9420999884605408,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9420999884605408,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.007000000216066837,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.0044999998062849045,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.9610000252723694},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.39169999957084656},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.3621000051498413},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.34860000014305115},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3253999948501587},{"id":"https://openalex.org/keywords/applications-of-artificial-intelligence","display_name":"Applications of artificial intelligence","score":0.303600013256073}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.9610000252723694},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.578499972820282},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5640000104904175},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5156000256538391},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.39169999957084656},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3621000051498413},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.34860000014305115},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3253999948501587},{"id":"https://openalex.org/C157170001","wikidata":"https://www.wikidata.org/wiki/Q4781507","display_name":"Applications of artificial intelligence","level":2,"score":0.303600013256073},{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.29660001397132874},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.29030001163482666},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.2757999897003174},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2551000118255615},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.25429999828338623}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/nfv-sdn66355.2025.11349410","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nfv-sdn66355.2025.11349410","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Conference on Network Function Virtualization and Software-Defined Networking (NFV-SDN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Sustainable cities and communities","id":"https://metadata.un.org/sdg/11","score":0.5348071455955505}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2180612164","https://openalex.org/W2243397390","https://openalex.org/W2295440748","https://openalex.org/W2809977055","https://openalex.org/W2963857521","https://openalex.org/W3002416713","https://openalex.org/W3017217726","https://openalex.org/W3102836279","https://openalex.org/W3107328291","https://openalex.org/W3153968739","https://openalex.org/W3168587836","https://openalex.org/W3202547399","https://openalex.org/W3205330927","https://openalex.org/W4214850956","https://openalex.org/W4214899824","https://openalex.org/W4286331441","https://openalex.org/W4292158698","https://openalex.org/W4310863204","https://openalex.org/W4380997773","https://openalex.org/W4384025135","https://openalex.org/W4385452929","https://openalex.org/W4385713380","https://openalex.org/W4386003845","https://openalex.org/W4386168902","https://openalex.org/W4400976693","https://openalex.org/W4400977424","https://openalex.org/W4408287568"],"related_works":[],"abstract_inverted_index":{"The":[0,70],"exponential":[1],"growth":[2],"of":[3,67,128],"Artificial":[4],"Intelligence":[5],"(AI)":[6],"technologies":[7],"has":[8,23],"significantly":[9],"enhanced":[10],"various":[11],"domains,":[12],"from":[13],"smart":[14],"cities":[15],"to":[16,30,33,59],"medical":[17],"devices.":[18],"However,":[19],"this":[20],"rapid":[21],"advancement":[22],"also":[24],"broadened":[25],"the":[26,103,107,117,123],"attack":[27],"surface,":[28],"leading":[29],"increased":[31],"exposure":[32],"adversarial":[34,68],"threats":[35],"such":[36],"as":[37],"poisoning,":[38],"evasion,":[39],"inference,":[40],"and":[41,84,97,113,126,134],"extraction":[42],"attacks.":[43,69],"To":[44],"address":[45],"these":[46],"challenges,":[47],"we":[48],"propose":[49],"cPAID,":[50,129],"a":[51,64],"Cloud-based":[52],"Platform-Agnostic":[53],"Adversarial":[54,79,98],"AI":[55,61,91,99,118,138],"Defense":[56],"framework":[57,72],"designed":[58],"fortify":[60],"systems":[62],"against":[63],"wide":[65],"range":[66],"proposed":[71],"integrates":[73],"multiple":[74],"defensive":[75],"mechanisms,":[76],"including":[77],"Generative":[78],"AI,":[80],"AI-assisted":[81],"Intrusion":[82],"Detection":[83],"Prevention":[85],"Systems":[86],"(AIPS),":[87],"Risk":[88],"Management":[89],"for":[90],"(RIMA),":[92],"Data":[93],"Fabric,":[94],"Meta-SIEM":[95],"(mSIEM),":[96],"Cyber":[100],"Range.":[101],"Furthermore,":[102],"cPAID":[104],"platform":[105],"employs":[106],"MLPrivSecOps":[108],"methodology,":[109],"embedding":[110],"security-,":[111],"privacy-,":[112],"trust-by-design":[114],"principles":[115],"throughout":[116],"lifecycle.":[119],"This":[120],"paper":[121],"presents":[122],"architecture,":[124],"methodologies,":[125],"components":[127],"emphasizing":[130],"its":[131],"scalability,":[132],"robustness,":[133],"compliance":[135],"with":[136],"ethical":[137],"principles.":[139]},"counts_by_year":[],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2026-01-30T00:00:00"}
