{"id":"https://openalex.org/W3011215250","doi":"https://doi.org/10.1109/wifs47025.2019.9034980","title":"Information Security Meets Adversarial Examples","display_name":"Information Security Meets Adversarial Examples","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3011215250","doi":"https://doi.org/10.1109/wifs47025.2019.9034980","mag":"3011215250"},"language":"en","primary_location":{"id":"doi:10.1109/wifs47025.2019.9034980","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs47025.2019.9034980","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050075918","display_name":"Matthias Kirchner","orcid":"https://orcid.org/0000-0003-3379-7522"},"institutions":[{"id":"https://openalex.org/I74786994","display_name":"Kitware (United States)","ror":"https://ror.org/02s2acn37","country_code":"US","type":"company","lineage":["https://openalex.org/I74786994"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Matthias Kirchner","raw_affiliation_strings":["Kitware, Inc"],"affiliations":[{"raw_affiliation_string":"Kitware, Inc","institution_ids":["https://openalex.org/I74786994"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087688702","display_name":"Cecilia Pasquini","orcid":"https://orcid.org/0000-0002-2125-6983"},"institutions":[{"id":"https://openalex.org/I74786994","display_name":"Kitware (United States)","ror":"https://ror.org/02s2acn37","country_code":"US","type":"company","lineage":["https://openalex.org/I74786994"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cecilia Pasquini","raw_affiliation_strings":["Kitware, Inc"],"affiliations":[{"raw_affiliation_string":"Kitware, Inc","institution_ids":["https://openalex.org/I74786994"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069844959","display_name":"Ilia Shumailov","orcid":"https://orcid.org/0000-0003-3100-0727"},"institutions":[{"id":"https://openalex.org/I74786994","display_name":"Kitware (United States)","ror":"https://ror.org/02s2acn37","country_code":"US","type":"company","lineage":["https://openalex.org/I74786994"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ilia Shumailov","raw_affiliation_strings":["Kitware, Inc"],"affiliations":[{"raw_affiliation_string":"Kitware, Inc","institution_ids":["https://openalex.org/I74786994"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050075918"],"corresponding_institution_ids":["https://openalex.org/I74786994"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20819965,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"abs 1901 8121","issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8746501207351685},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8001223802566528},{"id":"https://openalex.org/keywords/dependability","display_name":"Dependability","score":0.7019599676132202},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.6297627687454224},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.5884630680084229},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5525411367416382},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4611284136772156},{"id":"https://openalex.org/keywords/core","display_name":"Core (optical fiber)","score":0.42743921279907227},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.32199570536613464},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2759382128715515},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.21189960837364197},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1074034571647644}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8746501207351685},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8001223802566528},{"id":"https://openalex.org/C77019957","wikidata":"https://www.wikidata.org/wiki/Q2689057","display_name":"Dependability","level":2,"score":0.7019599676132202},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.6297627687454224},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.5884630680084229},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5525411367416382},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4611284136772156},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.42743921279907227},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.32199570536613464},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2759382128715515},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.21189960837364197},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1074034571647644},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/wifs47025.2019.9034980","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs47025.2019.9034980","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},{"id":"pmh:oai:iris.unitn.it:11572/277562","is_oa":false,"landing_page_url":"http://hdl.handle.net/11572/277562","pdf_url":null,"source":{"id":"https://openalex.org/S4306401913","display_name":"Institutional Research Information System (Universit\u00e0 degli Studi di Trento)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I193223587","host_organization_name":"University of Trento","host_organization_lineage":["https://openalex.org/I193223587"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6899999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W1673923490","https://openalex.org/W1996360405","https://openalex.org/W2125908420","https://openalex.org/W2134396947","https://openalex.org/W2167008044","https://openalex.org/W2751202750","https://openalex.org/W2771036112","https://openalex.org/W2773446523","https://openalex.org/W2794584741","https://openalex.org/W2796791899","https://openalex.org/W2809443788","https://openalex.org/W2819317140","https://openalex.org/W2879765882","https://openalex.org/W2883233582","https://openalex.org/W2890640722","https://openalex.org/W2893359234","https://openalex.org/W2901566135","https://openalex.org/W2902905500","https://openalex.org/W2903428617","https://openalex.org/W2907295878","https://openalex.org/W2913091356","https://openalex.org/W2914110731","https://openalex.org/W2943961047","https://openalex.org/W2959409678","https://openalex.org/W2962269719","https://openalex.org/W2962700793","https://openalex.org/W2962738629","https://openalex.org/W2964195110","https://openalex.org/W2971682216","https://openalex.org/W2982058372","https://openalex.org/W3037475485","https://openalex.org/W3046802982","https://openalex.org/W3083319190","https://openalex.org/W3103940881","https://openalex.org/W3105479728","https://openalex.org/W4232836212","https://openalex.org/W4247200422","https://openalex.org/W6637162671","https://openalex.org/W6746523225","https://openalex.org/W6755305800","https://openalex.org/W6755833485","https://openalex.org/W6756500968","https://openalex.org/W6758610939","https://openalex.org/W6759064128","https://openalex.org/W6762310696","https://openalex.org/W6763504945","https://openalex.org/W6767408864","https://openalex.org/W6786639168"],"related_works":["https://openalex.org/W4252527915","https://openalex.org/W2409287660","https://openalex.org/W2233357156","https://openalex.org/W1976489385","https://openalex.org/W4256317220","https://openalex.org/W1506225852","https://openalex.org/W2141414364","https://openalex.org/W2376514150","https://openalex.org/W1523265213","https://openalex.org/W2363668972"],"abstract_inverted_index":{"Machine":[0],"learning":[1,93],"(ML)":[2],"plays":[3],"a":[4,9,55],"pivotal":[5],"role":[6],"in":[7,29,46,71],"supporting":[8],"variety":[10],"of":[11,17,86],"research":[12],"problems":[13],"at":[14,62],"the":[15,64,72],"core":[16],"information":[18],"security":[19,101],"and":[20,34,68,75,87],"forensics":[21],"(IFS).":[22],"ML-based":[23],"systems":[24],"have":[25],"improved":[26],"overall":[27],"performance":[28],"many":[30],"applications,":[31],"replacing":[32],"more":[33,35],"deterministic":[36],"rule-based":[37],"approaches":[38],"with":[39],"data-driven":[40],"ones.":[41],"Yet,":[42],"enforcing":[43],"their":[44],"dependability":[45],"typical":[47],"IFS":[48,76],"scenarios":[49],"that":[50],"include":[51],"strategic":[52],"adversaries":[53],"is":[54,97],"challenging":[56],"open":[57],"problem.This":[58],"special":[59],"session":[60],"aims":[61],"strengthening":[63],"link":[65],"between":[66],"concepts":[67],"methods":[69],"developed":[70],"adversarial":[73,90],"ML":[74],"domains.":[77],"To":[78],"this":[79],"end,":[80],"it":[81],"gathers":[82],"contributions":[83],"exploring":[84],"implications":[85],"countermeasures":[88],"to":[89],"attacks":[91],"against":[92],"systems.":[94],"Special":[95],"emphasis":[96],"placed":[98],"on":[99],"media":[100],"applications.":[102]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
