{"id":"https://openalex.org/W3160351437","doi":"https://doi.org/10.1145/3460120.3484570","title":"On the Robustness of Domain Constraints","display_name":"On the Robustness of Domain Constraints","publication_year":2021,"publication_date":"2021-11-12","ids":{"openalex":"https://openalex.org/W3160351437","doi":"https://doi.org/10.1145/3460120.3484570","mag":"3160351437"},"language":"en","primary_location":{"id":"doi:10.1145/3460120.3484570","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3460120.3484570","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3460120.3484570","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3460120.3484570","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056794879","display_name":"Ryan Sheatsley","orcid":"https://orcid.org/0000-0001-8447-602X"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ryan Sheatsley","raw_affiliation_strings":["The Pennsylvania State University, State College, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088915686","display_name":"Blaine Hoak","orcid":"https://orcid.org/0000-0003-2960-0686"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Blaine Hoak","raw_affiliation_strings":["The Pennsylvania State University, State College, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023371126","display_name":"Eric Pauley","orcid":"https://orcid.org/0000-0002-2197-9137"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eric Pauley","raw_affiliation_strings":["The Pennsylvania State University, State College, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007771274","display_name":"Yohan Beugin","orcid":"https://orcid.org/0000-0003-0991-7926"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yohan Beugin","raw_affiliation_strings":["The Pennsylvania State University, State College, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037788450","display_name":"Michael J. Weisman","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael J. Weisman","raw_affiliation_strings":["United States Army Research Laboratory, Adelphi, MD, USA","United States Army Research Laboratory, Adelphi, MD USA"],"affiliations":[{"raw_affiliation_string":"United States Army Research Laboratory, Adelphi, MD, USA","institution_ids":["https://openalex.org/I166416128"]},{"raw_affiliation_string":"United States Army Research Laboratory, Adelphi, MD USA","institution_ids":["https://openalex.org/I166416128"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055368149","display_name":"Patrick McDaniel","orcid":"https://orcid.org/0000-0003-2091-7484"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Patrick McDaniel","raw_affiliation_strings":["The Pennsylvania State University, State College, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5056794879"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":0.28,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.62460758,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"495","last_page":"515"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9779999852180481,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.959949791431427},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.8172123432159424},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7738510370254517},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.6562818884849548},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.6562302112579346},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6022061705589294},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5508737564086914},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4758577048778534},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3547798991203308},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.340135782957077},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3208138346672058},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1307738721370697}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.959949791431427},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.8172123432159424},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7738510370254517},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.6562818884849548},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.6562302112579346},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6022061705589294},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5508737564086914},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4758577048778534},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3547798991203308},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.340135782957077},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3208138346672058},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1307738721370697},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3460120.3484570","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3460120.3484570","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3460120.3484570","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2105.08619","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2105.08619","pdf_url":"https://arxiv.org/pdf/2105.08619","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"mag:3160351437","is_oa":true,"landing_page_url":"http://export.arxiv.org/pdf/2105.08619","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.2105.08619","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2105.08619","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.1145/3460120.3484570","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3460120.3484570","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3460120.3484570","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2043895709","display_name":null,"funder_award_id":"W911NF-13-2-0045","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"},{"id":"https://openalex.org/G3542758912","display_name":"SaTC: CORE: Frontier: Collaborative: End-to-End Trustworthiness of Machine-Learning Systems","funder_award_id":"1805310","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3693556586","display_name":null,"funder_award_id":"2-004","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3732666562","display_name":null,"funder_award_id":"W911NF-13","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"},{"id":"https://openalex.org/G4307486606","display_name":null,"funder_award_id":"W911NF-13-2-0045 (ARL Cyber Security CRA)","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"},{"id":"https://openalex.org/G5259331294","display_name":null,"funder_award_id":"W911NF","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"},{"id":"https://openalex.org/G7579331807","display_name":null,"funder_award_id":"CNS-1805310","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8727049869","display_name":null,"funder_award_id":"W911NF-13","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8763038417","display_name":null,"funder_award_id":"Cooperative Agreement Number W911NF-13-2-0045","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320315784","display_name":"U.S. Army Combat Capabilities Development Command Soldier Center","ror":"https://ror.org/02rdkx920"},{"id":"https://openalex.org/F4320338295","display_name":"Army Research Laboratory","ror":"https://ror.org/011hc8f90"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3160351437.pdf","grobid_xml":"https://content.openalex.org/works/W3160351437.grobid-xml"},"referenced_works_count":73,"referenced_works":["https://openalex.org/W145069693","https://openalex.org/W1559060276","https://openalex.org/W1585854823","https://openalex.org/W1596721799","https://openalex.org/W1673923490","https://openalex.org/W1968998685","https://openalex.org/W1970837734","https://openalex.org/W1984670829","https://openalex.org/W1998103163","https://openalex.org/W2019363670","https://openalex.org/W2022775778","https://openalex.org/W2062897452","https://openalex.org/W2099471712","https://openalex.org/W2099940443","https://openalex.org/W2122672392","https://openalex.org/W2160642098","https://openalex.org/W2167287136","https://openalex.org/W2180612164","https://openalex.org/W2244109919","https://openalex.org/W2279310754","https://openalex.org/W2342408547","https://openalex.org/W2408141691","https://openalex.org/W2460937040","https://openalex.org/W2528914598","https://openalex.org/W2535873859","https://openalex.org/W2557044351","https://openalex.org/W2590523583","https://openalex.org/W2594867206","https://openalex.org/W2603766943","https://openalex.org/W2607219512","https://openalex.org/W2612637113","https://openalex.org/W2640329709","https://openalex.org/W2728257130","https://openalex.org/W2744095836","https://openalex.org/W2765424254","https://openalex.org/W2766462876","https://openalex.org/W2770717476","https://openalex.org/W2773446523","https://openalex.org/W2774423163","https://openalex.org/W2786163515","https://openalex.org/W2798302089","https://openalex.org/W2798801120","https://openalex.org/W2806039192","https://openalex.org/W2889836475","https://openalex.org/W2905810301","https://openalex.org/W2908403421","https://openalex.org/W2914801588","https://openalex.org/W2932026309","https://openalex.org/W2950864148","https://openalex.org/W2963070423","https://openalex.org/W2963165251","https://openalex.org/W2963207607","https://openalex.org/W2963389226","https://openalex.org/W2963496101","https://openalex.org/W2963564844","https://openalex.org/W2963834268","https://openalex.org/W2963857521","https://openalex.org/W2963888996","https://openalex.org/W2964301649","https://openalex.org/W2969542116","https://openalex.org/W2970971581","https://openalex.org/W2982682021","https://openalex.org/W2992532659","https://openalex.org/W3011838635","https://openalex.org/W3015571647","https://openalex.org/W3103557498","https://openalex.org/W3107126131","https://openalex.org/W4237171445","https://openalex.org/W4238893454","https://openalex.org/W4247105055","https://openalex.org/W4247200422","https://openalex.org/W4255466416","https://openalex.org/W6637162671"],"related_works":["https://openalex.org/W2775102793","https://openalex.org/W3045689383","https://openalex.org/W3025658176","https://openalex.org/W2967048734","https://openalex.org/W3041291325","https://openalex.org/W2597490979","https://openalex.org/W3083580741","https://openalex.org/W3213189432","https://openalex.org/W2769055007","https://openalex.org/W2924591601","https://openalex.org/W3195683449","https://openalex.org/W3186629482","https://openalex.org/W3108534877","https://openalex.org/W3166307649","https://openalex.org/W2951020182","https://openalex.org/W3128290735","https://openalex.org/W2113027404","https://openalex.org/W2790361445","https://openalex.org/W2993044575","https://openalex.org/W2901743858"],"abstract_inverted_index":{"Machine":[0],"learning":[1],"is":[2,16],"vulnerable":[3],"to":[4,8,11,49,54,76,86,123,141,154,165],"adversarial":[5,19,67,103,126,142,178],"examples--inputs":[6],"designed":[7],"cause":[9],"models":[10],"perform":[12],"poorly.":[13],"However,":[14],"it":[15],"unclear":[17],"if":[18],"examples":[20,127,179],"represent":[21],"realistic":[22,78],"inputs":[23,164],"in":[24,113,149],"the":[25,95,102,108,174],"modeled":[26],"domains.":[27],"Diverse":[28],"domains":[29],"such":[30],"as":[31],"networks":[32],"and":[33,69,92,116,119],"phishing":[34,117],"have":[35],"domain":[36,64,88,134,137,167],"constraints--complex":[37],"relationships":[38],"between":[39],"features":[40],"that":[41,160,170],"an":[42,47,147],"adversary":[43],"must":[44,162],"satisfy":[45,166],"for":[46],"attack":[48],"be":[50,99],"realized":[51],"(in":[52],"addition":[53],"any":[55],"adversary-specific":[56],"goals).":[57],"In":[58,81],"this":[59],"paper,":[60],"we":[61,83],"explore":[62],"how":[63,70,94],"constraints":[65,89,97,138,145,172],"limit":[66],"capabilities":[68],"adversaries":[71,161],"can":[72,98],"adapt":[73],"their":[74],"strategies":[75],"create":[77],"(constraint-compliant)":[79],"examples.":[80],"this,":[82],"develop":[84],"techniques":[85],"learn":[87],"from":[90],"data,":[91],"show":[93],"learned":[96],"integrated":[100],"into":[101],"crafting":[104,131],"process.":[105],"We":[106,156],"evaluate":[107],"efficacy":[109],"of":[110,125,176],"our":[111],"approach":[112],"network":[114],"intrusion":[115],"datasets":[118],"find:":[120],"(1)":[121],"up":[122,153],"82%":[124],"produced":[128],"by":[129,152],"state-of-the-art":[130],"algorithms":[132],"violate":[133],"constraints,":[135,168],"(2)":[136],"are":[139],"robust":[140],"examples;":[143],"enforcing":[144],"yields":[146],"increase":[148],"model":[150],"accuracy":[151],"34%.":[155],"observe":[157],"not":[158],"only":[159],"alter":[163],"but":[169],"these":[171],"make":[173],"generation":[175],"valid":[177],"far":[180],"more":[181],"challenging.":[182]},"counts_by_year":[{"year":2021,"cited_by_count":2}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
