{"id":"https://openalex.org/W4390189957","doi":"https://doi.org/10.1109/milcom58377.2023.10356253","title":"An Improved Nested Training Approach to Mitigate Clean-label Attacks against Malware Classifiers","display_name":"An Improved Nested Training Approach to Mitigate Clean-label Attacks against Malware Classifiers","publication_year":2023,"publication_date":"2023-10-30","ids":{"openalex":"https://openalex.org/W4390189957","doi":"https://doi.org/10.1109/milcom58377.2023.10356253"},"language":"en","primary_location":{"id":"doi:10.1109/milcom58377.2023.10356253","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/milcom58377.2023.10356253","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086703347","display_name":"Achyut Reddy","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Achyut Reddy","raw_affiliation_strings":["Peraton Labs Inc.,Basking Ridge,NJ,USA","Peraton Labs Inc., Basking Ridge, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Peraton Labs Inc.,Basking Ridge,NJ,USA","institution_ids":[]},{"raw_affiliation_string":"Peraton Labs Inc., Basking Ridge, NJ, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109412228","display_name":"Sridhar Venkatesan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sridhar Venkatesan","raw_affiliation_strings":["Peraton Labs Inc.,Basking Ridge,NJ,USA","Peraton Labs Inc., Basking Ridge, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Peraton Labs Inc.,Basking Ridge,NJ,USA","institution_ids":[]},{"raw_affiliation_string":"Peraton Labs Inc., Basking Ridge, NJ, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078482977","display_name":"Rauf Izmailov","orcid":"https://orcid.org/0000-0002-7326-669X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rauf Izmailov","raw_affiliation_strings":["Peraton Labs Inc.,Basking Ridge,NJ,USA","Peraton Labs Inc., Basking Ridge, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Peraton Labs Inc.,Basking Ridge,NJ,USA","institution_ids":[]},{"raw_affiliation_string":"Peraton Labs Inc., Basking Ridge, NJ, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035574749","display_name":"Alina Oprea","orcid":"https://orcid.org/0000-0002-4979-5292"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alina Oprea","raw_affiliation_strings":["Northeastern University,Boston,NJ,USA","Northeastern University, Boston, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Northeastern University,Boston,NJ,USA","institution_ids":["https://openalex.org/I12912129"]},{"raw_affiliation_string":"Northeastern University, Boston, NJ, USA","institution_ids":["https://openalex.org/I12912129"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5086703347"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2038,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.48945227,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"56","issue":null,"first_page":"703","last_page":"709"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8528310060501099},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7292093634605408},{"id":"https://openalex.org/keywords/training","display_name":"Training (meteorology)","score":0.5804860591888428},{"id":"https://openalex.org/keywords/training-set","display_name":"Training set","score":0.47407403588294983},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4088192284107208},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.378218412399292},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3645537495613098}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8528310060501099},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7292093634605408},{"id":"https://openalex.org/C2777211547","wikidata":"https://www.wikidata.org/wiki/Q17141490","display_name":"Training (meteorology)","level":2,"score":0.5804860591888428},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.47407403588294983},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4088192284107208},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.378218412399292},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3645537495613098},{"id":"https://openalex.org/C153294291","wikidata":"https://www.wikidata.org/wiki/Q25261","display_name":"Meteorology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom58377.2023.10356253","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/milcom58377.2023.10356253","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320316514","display_name":"Arm","ror":"https://ror.org/04mmhzs81"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1552056088","https://openalex.org/W2007562169","https://openalex.org/W2033368661","https://openalex.org/W2105037940","https://openalex.org/W2122672392","https://openalex.org/W2747329762","https://openalex.org/W2748789698","https://openalex.org/W2962763344","https://openalex.org/W2963857521","https://openalex.org/W3116515605","https://openalex.org/W4205093476","https://openalex.org/W4205214903","https://openalex.org/W4281293216","https://openalex.org/W4281997778","https://openalex.org/W4298140072","https://openalex.org/W4300687693","https://openalex.org/W4311165833","https://openalex.org/W4317928098","https://openalex.org/W6637162671","https://openalex.org/W6676935882","https://openalex.org/W6684011098","https://openalex.org/W6743581629","https://openalex.org/W6750318962","https://openalex.org/W6750462152","https://openalex.org/W6782718173","https://openalex.org/W6787959460","https://openalex.org/W6838325008"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W2249809453","https://openalex.org/W4394050964","https://openalex.org/W2551249631"],"abstract_inverted_index":{"Machine":[0,179],"Learning":[1,180],"(ML)":[2],"models":[3,24,36,107],"are":[4,37],"being":[5],"adopted":[6],"as":[7,126],"state":[8],"of":[9,30,60,66,101,105,136,141,163,170],"the":[10,56,99,113,117,134,139,150,161,164,168],"art":[11],"tools":[12],"to":[13,27,47,79,121,166,175],"defend":[14],"systems":[15],"against":[16],"cybersecurity":[17],"threats.":[18],"Despite":[19],"their":[20],"high":[21],"accuracy,":[22],"such":[23,67,125],"remain":[25],"vulnerable":[26],"various":[28,122],"types":[29],"adversarial":[31],"attacks.":[32,63],"In":[33,112],"cybersecurity,":[34],"ML":[35],"frequently":[38],"trained":[39,82],"on":[40,108],"crowd-sourced":[41],"datasets,":[42],"which":[43,133],"naturally":[44],"allows":[45],"attackers":[46,78],"introduce":[48],"backdoor":[49,68],"samples":[50,69,94],"into":[51],"malware":[52],"detectors":[53],"by":[54,77,95],"using":[55],"recently":[57],"proposed":[58],"class":[59],"clean-label":[61,171],"poisoning":[62,142],"The":[64],"presence":[65],"in":[70,132],"training":[71,109],"datasets":[72],"can":[73],"later":[74],"be":[75],"used":[76],"modify":[80],"a":[81,102],"model\u2019s":[83,181],"behavior.":[84],"Nested":[85,118,153],"Training":[86,119,154],"is":[87],"an":[88,177],"ensemble-based":[89],"method":[90],"for":[91],"detecting":[92],"poisoned":[93,172],"leveraging":[96],"disagreements":[97],"within":[98],"outputs":[100],"diverse":[103],"set":[104],"ensemble":[106],"data":[110,137],"points.":[111],"paper,":[114],"we":[115],"adapt":[116],"approach":[120,155,165],"cyber":[123],"domains":[124],"Android":[127],"APKs":[128],"and":[129,138,159,174],"PDF":[130],"Files,":[131],"distributions":[135],"effects":[140,169],"have":[143],"quite":[144],"different":[145],"properties.":[146],"We":[147],"then":[148],"compare":[149],"resulting":[151],"improved":[152],"with":[156],"existing":[157],"methods":[158],"demonstrate":[160],"ability":[162],"mitigate":[167],"attacks":[173],"recover":[176],"original":[178],"accuracy.":[182]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
