{"id":"https://openalex.org/W2805969103","doi":"https://doi.org/10.1145/3196494.3196539","title":"A Data-driven Attack against Support Vectors of SVM","display_name":"A Data-driven Attack against Support Vectors of SVM","publication_year":2018,"publication_date":"2018-05-29","ids":{"openalex":"https://openalex.org/W2805969103","doi":"https://doi.org/10.1145/3196494.3196539","mag":"2805969103"},"language":"en","primary_location":{"id":"doi:10.1145/3196494.3196539","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3196539","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/conference_contribution/A_data-driven_attack_against_support_vectors_of_SVM/20799385","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030973483","display_name":"Shigang Liu","orcid":"https://orcid.org/0000-0003-0162-3595"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Shigang Liu","raw_affiliation_strings":["Swinburne University of Technology, Hawthorn, Australia"],"affiliations":[{"raw_affiliation_string":"Swinburne University of Technology, Hawthorn, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044019139","display_name":"Jun Zhang","orcid":"https://orcid.org/0000-0002-2189-7801"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jun Zhang","raw_affiliation_strings":["Swinburne University of Technology, Hawthorn, Australia"],"affiliations":[{"raw_affiliation_string":"Swinburne University of Technology, Hawthorn, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100445311","display_name":"Yu Wang","orcid":"https://orcid.org/0000-0002-9807-2293"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Wang","raw_affiliation_strings":["Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051406984","display_name":"Wanlei Zhou","orcid":"https://orcid.org/0000-0002-1680-2521"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Wanlei Zhou","raw_affiliation_strings":["Deakin University, Burwood, Australia"],"affiliations":[{"raw_affiliation_string":"Deakin University, Burwood, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["Swinburne University of Technology, Hawthorn, Australia"],"affiliations":[{"raw_affiliation_string":"Swinburne University of Technology, Hawthorn, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026180696","display_name":"Olivier De Vel","orcid":"https://orcid.org/0000-0001-5179-3707"},"institutions":[{"id":"https://openalex.org/I1303474014","display_name":"Defence Science and Technology Group","ror":"https://ror.org/05ddrvt52","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1303474014","https://openalex.org/I2801453606","https://openalex.org/I3139952251"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Olivier De Vel.","raw_affiliation_strings":["Defence Science &amp;Technology Group, Edinburgh , Australia"],"affiliations":[{"raw_affiliation_string":"Defence Science &amp;Technology Group, Edinburgh , Australia","institution_ids":["https://openalex.org/I1303474014"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5030973483"],"corresponding_institution_ids":["https://openalex.org/I57093077"],"apc_list":null,"apc_paid":null,"fwci":0.6769,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.77195058,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"723","last_page":"734"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8071023225784302},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.7915576696395874},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7823219299316406},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6712309122085571},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.5644052028656006},{"id":"https://openalex.org/keywords/margin","display_name":"Margin (machine learning)","score":0.5233228206634521},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5207757353782654},{"id":"https://openalex.org/keywords/decision-boundary","display_name":"Decision boundary","score":0.4918856620788574},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.48378631472587585},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4788943827152252},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4394860863685608},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.41323548555374146},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.3625675439834595},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09468129277229309}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8071023225784302},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.7915576696395874},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7823219299316406},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6712309122085571},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.5644052028656006},{"id":"https://openalex.org/C774472","wikidata":"https://www.wikidata.org/wiki/Q6760393","display_name":"Margin (machine learning)","level":2,"score":0.5233228206634521},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5207757353782654},{"id":"https://openalex.org/C42023084","wikidata":"https://www.wikidata.org/wiki/Q5249231","display_name":"Decision boundary","level":3,"score":0.4918856620788574},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.48378631472587585},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4788943827152252},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4394860863685608},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.41323548555374146},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.3625675439834595},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09468129277229309}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1145/3196494.3196539","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3196539","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30113176","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"},{"id":"pmh:oai:figshare.com:article/20799385","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/A_data-driven_attack_against_support_vectors_of_SVM/20799385","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/132996","is_oa":false,"landing_page_url":"http://hdl.handle.net/10453/132996","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"},{"id":"pmh:oai:researchbank.swinburne.edu.au:2a927e1d-8145-4e00-adc7-45c45b4fa079/1","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.3/444204","pdf_url":null,"source":{"id":"https://openalex.org/S4306401157","display_name":"Swinburne Research Bank (Swinburne University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I57093077","host_organization_name":"Swinburne University of Technology","host_organization_lineage":["https://openalex.org/I57093077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security (ASIACCS 2018), Incheon, South Korea, 4-8 June 2018, pp. 723-734","raw_type":""}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20799385","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/A_data-driven_attack_against_support_vectors_of_SVM/20799385","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W9657784","https://openalex.org/W33933511","https://openalex.org/W1486317198","https://openalex.org/W1494192115","https://openalex.org/W1528620860","https://openalex.org/W1552056088","https://openalex.org/W1563088657","https://openalex.org/W1589713274","https://openalex.org/W1599976521","https://openalex.org/W1690919088","https://openalex.org/W1698155719","https://openalex.org/W1790627065","https://openalex.org/W1839190380","https://openalex.org/W1851422430","https://openalex.org/W1965857701","https://openalex.org/W1978152814","https://openalex.org/W2035720976","https://openalex.org/W2037026906","https://openalex.org/W2038296020","https://openalex.org/W2064208261","https://openalex.org/W2070371464","https://openalex.org/W2095195675","https://openalex.org/W2095577883","https://openalex.org/W2107397716","https://openalex.org/W2108807072","https://openalex.org/W2124415900","https://openalex.org/W2125908420","https://openalex.org/W2130789388","https://openalex.org/W2144906988","https://openalex.org/W2151298633","https://openalex.org/W2162552722","https://openalex.org/W2187013920","https://openalex.org/W2224750461","https://openalex.org/W2254050631","https://openalex.org/W2293768274","https://openalex.org/W2293844262","https://openalex.org/W2336566325","https://openalex.org/W2343637459","https://openalex.org/W2344469686","https://openalex.org/W2398905593","https://openalex.org/W2483945477","https://openalex.org/W2538462707","https://openalex.org/W2567149662","https://openalex.org/W2575251587","https://openalex.org/W2766041905","https://openalex.org/W2768729901","https://openalex.org/W2919115771","https://openalex.org/W2949506549","https://openalex.org/W2962777143","https://openalex.org/W2963777745","https://openalex.org/W2964082701","https://openalex.org/W2993845287","https://openalex.org/W2998520482","https://openalex.org/W3103836116","https://openalex.org/W3111818035","https://openalex.org/W4252078918","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W2900159906","https://openalex.org/W4384648009","https://openalex.org/W4283221438","https://openalex.org/W4287828318","https://openalex.org/W2406556600","https://openalex.org/W4380352238","https://openalex.org/W3126470649","https://openalex.org/W2899811703"],"abstract_inverted_index":{"Machine":[0,109],"learning":[1,68,78],"(ML)":[2],"is":[3,52],"commonly":[4],"used":[5],"in":[6,83,98,139],"multiple":[7],"disciplines":[8],"and":[9,20,128,150],"real-world":[10,141],"applications,":[11],"such":[12],"as":[13,60,62],"information":[14],"retrieval,":[15],"financial":[16],"systems,":[17],"health,":[18],"biometrics":[19],"online":[21],"social":[22,144],"networks.":[23],"However,":[24],"their":[25],"security":[26,58,158],"profiles":[27],"against":[28,65],"deliberate":[29],"attacks":[30,64],"have":[31],"not":[32],"often":[33],"been":[34,112],"considered.":[35],"Sophisticated":[36],"adversaries":[37],"can":[38,79,120,161],"exploit":[39],"specific":[40],"vulnerabilities":[41],"exposed":[42],"by":[43,164],"classical":[44],"ML":[45,104],"algorithms":[46],"to":[47,54,74,100],"deceive":[48],"intelligent":[49],"systems.":[50],"It":[51],"emerging":[53],"perform":[55],"a":[56,102,166],"thorough":[57],"evaluation":[59],"well":[61],"potential":[63],"the":[66,106,122,125,130,136,157],"machine":[67,77],"techniques":[69],"before":[70],"developing":[71],"novel":[72],"methods":[73],"guarantee":[75],"that":[76,156],"be":[80,162],"securely":[81],"applied":[82],"adversarial":[84],"setting.":[85],"In":[86],"this":[87],"paper,":[88],"an":[89],"effective":[90],"attack":[91,101,119,138],"strategy":[92],"for":[93],"crafting":[94],"foreign":[95],"support":[96,170],"vectors":[97],"order":[99],"classic":[103],"algorithm,":[105],"Support":[107],"Vector":[108],"(SVM)":[110],"has":[111],"proposed":[113],"with":[114],"mathematical":[115],"proof.":[116],"The":[117],"new":[118,137],"minimize":[121],"margin":[123],"around":[124],"decision":[126],"boundary":[127],"maximize":[129],"hinge":[131],"loss":[132],"simultaneously.":[133],"We":[134],"evaluate":[135],"different":[140],"applications":[142],"including":[143],"spam":[145],"detection,":[146],"Internet":[147],"traffic":[148],"classification":[149],"image":[151],"recognition.":[152],"Experimental":[153],"results":[154],"highlight":[155],"of":[159,169],"classifiers":[160],"worsened":[163],"poisoning":[165],"small":[167],"group":[168],"vectors.":[171]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-23T09:07:50.710637","created_date":"2025-10-10T00:00:00"}
