{"id":"https://openalex.org/W4406353841","doi":"https://doi.org/10.1109/tdsc.2025.3528993","title":"Poisoning Attacks and Defenses to Learned Bloom Filters for Malicious URL Detection","display_name":"Poisoning Attacks and Defenses to Learned Bloom Filters for Malicious URL Detection","publication_year":2025,"publication_date":"2025-01-14","ids":{"openalex":"https://openalex.org/W4406353841","doi":"https://doi.org/10.1109/tdsc.2025.3528993"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3528993","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3528993","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108710298","display_name":"Fangming Dong","orcid":"https://orcid.org/0000-0003-1846-4236"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fangming Dong","raw_affiliation_strings":["MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022240408","display_name":"Pinghui Wang","orcid":"https://orcid.org/0000-0001-5779-6108"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pinghui Wang","raw_affiliation_strings":["MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101780303","display_name":"Rundong Li","orcid":"https://orcid.org/0000-0003-0354-9536"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rundong Li","raw_affiliation_strings":["MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064336982","display_name":"Xu Cui","orcid":"https://orcid.org/0000-0002-6937-6191"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xueyao Cui","raw_affiliation_strings":["MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007402211","display_name":"Junzhou Zhao","orcid":"https://orcid.org/0000-0003-3476-8248"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junzhou Zhao","raw_affiliation_strings":["MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102768294","display_name":"Jing Tao","orcid":"https://orcid.org/0000-0002-1779-6290"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Tao","raw_affiliation_strings":["MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Chen Zhang","orcid":"https://orcid.org/0000-0001-8706-1372"},"institutions":[{"id":"https://openalex.org/I4210164767","display_name":"GCI Science & Technology (China)","ror":"https://ror.org/05tj2eg80","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210164767"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Zhang","raw_affiliation_strings":["Zhejiang CreateLink Technology Company Ltd, Guangzhou, Guangdong, China","Zhejiang CreateLink Technology Co. Ltd, Guangzhou, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang CreateLink Technology Company Ltd, Guangzhou, Guangdong, China","institution_ids":["https://openalex.org/I4210164767"]},{"raw_affiliation_string":"Zhejiang CreateLink Technology Co. Ltd, Guangzhou, Guangdong, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075845093","display_name":"Xiaohong Guan","orcid":"https://orcid.org/0000-0002-8826-0362"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohong Guan","raw_affiliation_strings":["MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5108710298"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":9.2896,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.96904733,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"22","issue":"4","first_page":"3275","last_page":"3288"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.8353811502456665},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7439731359481812},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7114181518554688},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4262458086013794},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.374741792678833},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33064258098602295}],"concepts":[{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.8353811502456665},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7439731359481812},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7114181518554688},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4262458086013794},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.374741792678833},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33064258098602295}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3528993","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3528993","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2455875836","display_name":null,"funder_award_id":"62272372","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G296553909","display_name":null,"funder_award_id":"U22B2019","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8176576550","display_name":null,"funder_award_id":"62272379","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W42204834","https://openalex.org/W1524340365","https://openalex.org/W1967373117","https://openalex.org/W1993006466","https://openalex.org/W1993284846","https://openalex.org/W2081533422","https://openalex.org/W2123845384","https://openalex.org/W2124792617","https://openalex.org/W2125908420","https://openalex.org/W2126540423","https://openalex.org/W2131355670","https://openalex.org/W2167071579","https://openalex.org/W2171003402","https://openalex.org/W2401693723","https://openalex.org/W2790664081","https://openalex.org/W2903162282","https://openalex.org/W2962763344","https://openalex.org/W2962771342","https://openalex.org/W2983374155","https://openalex.org/W3000203302","https://openalex.org/W3003545752","https://openalex.org/W3026864867","https://openalex.org/W3082379938","https://openalex.org/W3098757341","https://openalex.org/W3109740061","https://openalex.org/W3119448165","https://openalex.org/W3160685084","https://openalex.org/W3170572542","https://openalex.org/W3186527989","https://openalex.org/W3214399478","https://openalex.org/W4200518950","https://openalex.org/W4214910385","https://openalex.org/W4224322166","https://openalex.org/W4236793779","https://openalex.org/W6676935882","https://openalex.org/W6739088070","https://openalex.org/W6748656701","https://openalex.org/W6760021216","https://openalex.org/W6774177702","https://openalex.org/W6784833035","https://openalex.org/W6785903013","https://openalex.org/W6790828031"],"related_works":["https://openalex.org/W2086572746","https://openalex.org/W2157216338","https://openalex.org/W2604468458","https://openalex.org/W121740227","https://openalex.org/W1662107788","https://openalex.org/W3082379938","https://openalex.org/W2135966669","https://openalex.org/W2594143027","https://openalex.org/W2732769800","https://openalex.org/W2924589531"],"abstract_inverted_index":{"Approximate":[0],"membership":[1],"query":[2],"(AMQ)":[3],"structures":[4],"represented":[5],"by":[6,122],"the":[7,45,57,60,77,82,91,97,112,125,165],"Bloom":[8,130,160,180],"Filter":[9,161],"and":[10,35,39,72,104,170],"its":[11],"variants":[12],"have":[13,21,81],"been":[14],"popularly":[15],"researched":[16],"in":[17,48,86,144],"recent":[18],"years.":[19],"Researchers":[20],"recently":[22],"combined":[23],"machine":[24,64],"learning":[25,65],"with":[26,44],"this":[27,87,150],"type":[28],"of":[29,59,100,167,178],"structure":[30],"to":[31,55,69,89,110,132,140,148,163,176],"reduce":[32],"space":[33,49],"consumption":[34],"computation":[36],"overhead":[37],"further":[38],"make":[40,133],"remarkable":[41],"progress.":[42],"However,":[43],"booming":[46],"performance":[47,174],"or":[50],"other":[51],"metrics,":[52],"researchers":[53],"tend":[54],"ignore":[56],"security":[58,113],"trained":[61],"model.":[62],"The":[63],"model":[66],"is":[67,108],"vulnerable":[68],"poisoning":[70,169],"attacks,":[71],"naturally,":[73],"we":[74,152],"infer":[75],"that":[76,106,121],"learning-based":[78,117],"filters":[79],"also":[80],"same":[83],"deficiencies.":[84],"Hence,":[85],"article,":[88],"confirm":[90],"inference":[92],"mentioned":[93],"above,":[94],"experiments":[95],"on":[96],"real-world":[98],"datasets":[99],"URLs":[101],"are":[102],"conducted":[103],"prove":[105],"it":[107],"necessary":[109],"consider":[111],"issue":[114],"when":[115],"using":[116],"filters.":[118],"We":[119],"show":[120],"data":[123,168],"poisoning,":[124],"attacker":[126],"can":[127,138],"deflect":[128],"learned":[129,179],"Filters":[131],"a":[134,141,155,172],"false":[135],"identification,":[136],"which":[137],"lead":[139],"significant":[142],"loss":[143],"some":[145],"cases.":[146],"Aiming":[147],"solve":[149],"issue,":[151],"put":[153],"forward":[154],"method":[156],"named":[157],"Defensive":[158],"Learned":[159],"(DLBF)":[162],"diminish":[164],"influence":[166],"achieve":[171],"better":[173],"compared":[175],"types":[177],"Filters.":[181]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
