{"id":"https://openalex.org/W2809376420","doi":"https://doi.org/10.1145/3219819.3220027","title":"Adversarial Detection with Model Interpretation","display_name":"Adversarial Detection with Model Interpretation","publication_year":2018,"publication_date":"2018-07-19","ids":{"openalex":"https://openalex.org/W2809376420","doi":"https://doi.org/10.1145/3219819.3220027","mag":"2809376420"},"language":"en","primary_location":{"id":"doi:10.1145/3219819.3220027","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3219819.3220027","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007489034","display_name":"Ninghao Liu","orcid":"https://orcid.org/0000-0002-9170-2424"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ninghao Liu","raw_affiliation_strings":["Texas A&amp;M University, College Station, TX, USA"],"affiliations":[{"raw_affiliation_string":"Texas A&amp;M University, College Station, TX, USA","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082599714","display_name":"Hongxia Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongxia Yang","raw_affiliation_strings":["Alibaba Group, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Alibaba Group, Hangzhou, China","institution_ids":["https://openalex.org/I45928872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068477431","display_name":"Xia Hu","orcid":"https://orcid.org/0000-0003-2234-3226"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xia Hu","raw_affiliation_strings":["Texas A&amp;M University, College Station, TX, USA"],"affiliations":[{"raw_affiliation_string":"Texas A&amp;M University, College Station, TX, USA","institution_ids":["https://openalex.org/I91045830"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5007489034"],"corresponding_institution_ids":["https://openalex.org/I91045830"],"apc_list":null,"apc_paid":null,"fwci":5.8635,"has_fulltext":false,"cited_by_count":61,"citation_normalized_percentile":{"value":0.96878954,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1803","last_page":"1811"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8830617666244507},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8154741525650024},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7136013507843018},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6732921600341797},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6144587993621826},{"id":"https://openalex.org/keywords/interpretation","display_name":"Interpretation (philosophy)","score":0.556444525718689},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5349223613739014},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35196900367736816},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24957972764968872}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8830617666244507},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8154741525650024},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7136013507843018},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6732921600341797},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6144587993621826},{"id":"https://openalex.org/C527412718","wikidata":"https://www.wikidata.org/wiki/Q855395","display_name":"Interpretation (philosophy)","level":2,"score":0.556444525718689},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5349223613739014},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35196900367736816},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24957972764968872},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3219819.3220027","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3219819.3220027","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7900000214576721,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W9223698","https://openalex.org/W9657784","https://openalex.org/W176212337","https://openalex.org/W1233141674","https://openalex.org/W1673923490","https://openalex.org/W1775665607","https://openalex.org/W1821462560","https://openalex.org/W1882350379","https://openalex.org/W1966912382","https://openalex.org/W2005556331","https://openalex.org/W2047756776","https://openalex.org/W2084591134","https://openalex.org/W2091004778","https://openalex.org/W2097860933","https://openalex.org/W2097895487","https://openalex.org/W2103063352","https://openalex.org/W2133591726","https://openalex.org/W2144906988","https://openalex.org/W2146211964","https://openalex.org/W2150165932","https://openalex.org/W2171837816","https://openalex.org/W2180612164","https://openalex.org/W2187013920","https://openalex.org/W2194321275","https://openalex.org/W2243397390","https://openalex.org/W2293768274","https://openalex.org/W2294370754","https://openalex.org/W2367397349","https://openalex.org/W2408141691","https://openalex.org/W2516809705","https://openalex.org/W2551974706","https://openalex.org/W2557044351","https://openalex.org/W2570685808","https://openalex.org/W2574797807","https://openalex.org/W2605076822","https://openalex.org/W2607219512","https://openalex.org/W2743198957","https://openalex.org/W2754049786","https://openalex.org/W2773303230","https://openalex.org/W2796096336","https://openalex.org/W2808923352","https://openalex.org/W2903158431","https://openalex.org/W2963271116","https://openalex.org/W2963673242","https://openalex.org/W2963857521","https://openalex.org/W2964082701","https://openalex.org/W2964136807","https://openalex.org/W2964318098","https://openalex.org/W3103836116","https://openalex.org/W3111818035"],"related_works":["https://openalex.org/W4290859889","https://openalex.org/W2230740169","https://openalex.org/W2978686724","https://openalex.org/W4225161019","https://openalex.org/W4312326921","https://openalex.org/W3193369220","https://openalex.org/W2924591601","https://openalex.org/W3092605210","https://openalex.org/W4221147656","https://openalex.org/W4317664613"],"abstract_inverted_index":{"Machine":[0],"learning":[1],"(ML)":[2],"systems":[3],"have":[4,23],"been":[5],"increasingly":[6],"applied":[7,55,191],"in":[8,81,99,181],"web":[9],"security":[10],"applications":[11,22,61],"such":[12,62],"as":[13,63],"spammer":[14],"detection,":[15],"malware":[16],"detection":[17,120],"and":[18,188,211],"fraud":[19],"detection.":[20,113],"These":[21],"an":[24],"intrinsic":[25],"adversarial":[26,112,153,163,167],"nature":[27],"where":[28],"intelligent":[29],"attackers":[30],"can":[31,189],"adaptively":[32],"change":[33],"their":[34,93],"behaviors":[35],"to":[36,104,175,192],"avoid":[37],"being":[38],"detected":[39],"by":[40,51,78,122],"the":[41,52,59,67,87,97,124,133,137,166,206,219],"deployed":[42],"detectors.":[43],"Existing":[44],"efforts":[45],"against":[46],"adversaries":[47,180],"are":[48],"usually":[49,73],"limited":[50],"type":[53],"of":[54,70,89,126,135,157,179,195,208,221],"ML":[56,71,127,139],"models":[57,72,90],"or":[58],"specific":[60],"image":[64],"classification.":[65],"Additionally,":[66],"working":[68],"mechanisms":[69],"cannot":[74],"be":[75,190],"well":[76],"understood":[77],"users,":[79],"which":[80],"turn":[82],"impede":[83],"them":[84],"from":[85],"understanding":[86],"vulnerabilities":[88],"nor":[91],"improving":[92],"robustness.":[94],"To":[95],"bridge":[96],"gap,":[98],"this":[100],"paper,":[101],"we":[102,115],"propose":[103],"investigate":[105],"whether":[106],"model":[107,140],"interpretation":[108,125,130],"could":[109],"potentially":[110],"help":[111],"Specifically,":[114],"develop":[116],"a":[117,144],"novel":[118],"adversary-resistant":[119],"framework":[121],"utilizing":[123],"models.":[128,197],"The":[129,155],"process":[131],"explains":[132],"mechanism":[134],"how":[136,212],"target":[138],"makes":[141],"prediction":[142],"for":[143,151],"given":[145],"instance,":[146],"thus":[147],"providing":[148],"more":[149],"insights":[150],"crafting":[152],"samples.":[154,168],"robustness":[156],"detectors":[158],"is":[159,172,186],"then":[160],"improved":[161],"through":[162],"training":[164],"with":[165],"A":[169],"data-driven":[170],"method":[171],"also":[173],"developed":[174],"empirically":[176],"estimate":[177],"costs":[178],"feature":[182,214],"manipulation.":[183],"Our":[184,198],"approach":[185],"model-agnostic":[187],"various":[193],"types":[194],"classification":[196],"experimental":[199],"results":[200],"on":[201],"two":[202],"real-world":[203],"datasets":[204],"demonstrate":[205],"effectiveness":[207],"interpretation-based":[209],"attacks":[210],"estimated":[213],"manipulation":[215],"cost":[216],"would":[217],"affect":[218],"behavior":[220],"adversaries.":[222]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":11},{"year":2018,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
