{"id":"https://openalex.org/W2536441385","doi":"https://doi.org/10.1145/2976749.2976753","title":"Adversarial Data Mining","display_name":"Adversarial Data Mining","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2536441385","doi":"https://doi.org/10.1145/2976749.2976753","mag":"2536441385"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2976753","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2976749.2976753","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2976753&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=2976753&type=pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087192873","display_name":"Murat Kantarc\u0131o\u011flu","orcid":"https://orcid.org/0000-0001-9795-9063"},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Murat Kantarcioglu","raw_affiliation_strings":["University of Texas at Dallas, Richardson, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at Dallas, Richardson, TX, USA","institution_ids":["https://openalex.org/I162577319"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003668302","display_name":"Bowei Xi","orcid":"https://orcid.org/0000-0001-7304-9903"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bowei Xi","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087192873"],"corresponding_institution_ids":["https://openalex.org/I162577319"],"apc_list":null,"apc_paid":null,"fwci":1.0183,"has_fulltext":true,"cited_by_count":16,"citation_normalized_percentile":{"value":0.77846694,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1866","last_page":"1867"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7678972482681274},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.6766050457954407},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6022290587425232},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.5379311442375183},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5369828343391418},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.48435720801353455},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4597480595111847},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45633572340011597},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.43976449966430664},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22669684886932373}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7678972482681274},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.6766050457954407},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6022290587425232},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5379311442375183},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5369828343391418},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.48435720801353455},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4597480595111847},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45633572340011597},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.43976449966430664},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22669684886932373}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2976753","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2976749.2976753","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2976753&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/2976749.2976753","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2976749.2976753","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2976753&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.5400000214576721,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1417307646","display_name":null,"funder_award_id":"1R0-1LM009989","funder_id":"https://openalex.org/F4320332161","funder_display_name":"National Institutes of Health"},{"id":"https://openalex.org/G1780551223","display_name":"TWC: Medium: Collaborative Proposal: Policy Compliant Integration of Linked Data","funder_award_id":"1228198","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G1834196295","display_name":null,"funder_award_id":"CICI-1547324","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2061222322","display_name":null,"funder_award_id":"CICI-1547324","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G2232386463","display_name":null,"funder_award_id":"W911NF-12-1-0558","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G2691498851","display_name":null,"funder_award_id":"CNS-1228198","funder_id":"https://openalex.org/F4320332161","funder_display_name":"National Institutes of Health"},{"id":"https://openalex.org/G2757503570","display_name":null,"funder_award_id":"CNS-1111529","funder_id":"https://openalex.org/F4320332161","funder_display_name":"National Institutes of Health"},{"id":"https://openalex.org/G3377689878","display_name":null,"funder_award_id":"CNS-1111529","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4634185362","display_name":null,"funder_award_id":"CICI-1547324","funder_id":"https://openalex.org/F4320332161","funder_display_name":"National Institutes of Health"},{"id":"https://openalex.org/G6103539371","display_name":null,"funder_award_id":"CNS-1228198","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6249472072","display_name":null,"funder_award_id":"CNS-1228198","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G7452299184","display_name":null,"funder_award_id":"W911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G847777369","display_name":null,"funder_award_id":"CNS-1111529","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G8998121839","display_name":null,"funder_award_id":"911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G926199259","display_name":"TC: Large: Collaborative Research: Privacy-Enhanced Secure Data Provenance","funder_award_id":"1111529","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320332161","display_name":"National Institutes of Health","ror":"https://ror.org/01cwqze88"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2536441385.pdf","grobid_xml":"https://content.openalex.org/works/W2536441385.grobid-xml"},"referenced_works_count":8,"referenced_works":["https://openalex.org/W1570963478","https://openalex.org/W1964241047","https://openalex.org/W1985987493","https://openalex.org/W2014054353","https://openalex.org/W2109300365","https://openalex.org/W2132874238","https://openalex.org/W2146211964","https://openalex.org/W2293768274"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W4288019534"],"abstract_inverted_index":{"As":[0],"more":[1,3,211],"and":[2,72,131,152,181,204,223,252],"cyber":[4,26,42,94,116,129,243],"security":[5,27,43,55,95,117,130,244],"incident":[6],"data":[7,22,32,60,67,79,126,134,156,162,178,182,206,224,253],"ranging":[8],"from":[9,49,102],"systems":[10],"logs":[11],"to":[12,23,84,92,115,148,153,167,176,213],"vulnerability":[13],"scan":[14],"results":[15],"are":[16,35,165,217,247],"collected,":[17],"manually":[18],"analyzing":[19],"these":[20,195],"collected":[21],"detect":[24],"important":[25,123],"events":[28],"become":[29],"impossible.":[30],"Hence,":[31],"mining":[33,127,135,157,163,183,207,225,254],"techniques":[34,114,164,208,255],"becoming":[36,57],"an":[37,85],"essential":[38],"tool":[39],"for":[40,74,128,242],"real-world":[41],"applications.":[44],"For":[45],"example,":[46],"a":[47,58,82,188,233],"report":[48],"Gartner":[50],"[gartner12]":[51],"claims":[52],"that":[53,143,229],"\"Information":[54],"is":[56,81,91,137,210],"big":[59,103],"analytics":[61],"problem,":[62],"where":[63,87],"massive":[64],"amounts":[65],"of":[66,120,140,201,235],"will":[68],"be":[69,240],"correlated,":[70],"analyzed":[71],"mined":[73],"meaningful":[75],"patterns\".":[76],"Of":[77],"course,":[78],"mining/analytics":[80],"means":[83],"end":[86],"the":[88,107,121,138,155,177,198],"ultimate":[89],"goal":[90],"provide":[93],"analysts":[96],"with":[97],"prioritized":[98],"actionable":[99],"insights":[100],"derived":[101],"data.":[104],"This":[105],"raises":[106],"question,":[108],"can":[109],"we":[110],"directly":[111],"apply":[112],"existing":[113],"applications?":[118],"One":[119],"most":[122],"differences":[124],"between":[125],"many":[132],"other":[133],"applications":[136],"existence":[139],"malicious":[141],"adversaries":[142,174],"continuously":[144],"adapt":[145,175],"their":[146,150],"behavior":[147,216],"hide":[149],"actions":[151],"make":[154],"models":[158],"ineffective.":[159],"Unfortunately,":[160],"traditional":[161],"insufficient":[166],"handle":[168],"such":[169,214],"adversarial":[170,215],"problems":[171],"directly.":[172],"The":[173],"miner's":[179],"reactions,":[180],"algorithms":[184],"constructed":[185],"based":[186],"on":[187],"training":[189],"dataset":[190],"degrades":[191],"quickly.":[192],"To":[193],"address":[194],"concerns,":[196],"over":[197],"last":[199],"couple":[200],"years":[202],"new":[203],"novel":[205],"which":[209],"resilient":[212],"being":[218],"developed":[219],"in":[220,256],"machine":[221,250],"learning":[222,251],"community.":[226],"We":[227],"believe":[228],"lessons":[230],"learned":[231],"as":[232],"part":[234],"this":[236],"research":[237],"direction":[238],"would":[239],"beneficial":[241],"researchers":[245],"who":[246],"increasingly":[248],"applying":[249],"practice.":[257]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
