{"id":"https://openalex.org/W4388867306","doi":"https://doi.org/10.1145/3576915.3623177","title":"Attack Some while Protecting Others: Selective Attack Strategies for Attacking and Protecting Multiple Concepts","display_name":"Attack Some while Protecting Others: Selective Attack Strategies for Attacking and Protecting Multiple Concepts","publication_year":2023,"publication_date":"2023-11-15","ids":{"openalex":"https://openalex.org/W4388867306","doi":"https://doi.org/10.1145/3576915.3623177"},"language":"en","primary_location":{"id":"doi:10.1145/3576915.3623177","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3576915.3623177","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3576915.3623177","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3576915.3623177","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069713931","display_name":"Vibha Belavadi","orcid":"https://orcid.org/0000-0002-1244-7702"},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Vibha Belavadi","raw_affiliation_strings":["University of Texas at Dallas, Richardson, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at Dallas, Richardson, TX, USA","institution_ids":["https://openalex.org/I162577319"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100680321","display_name":"Yan Zhou","orcid":"https://orcid.org/0000-0002-2134-2531"},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yan Zhou","raw_affiliation_strings":["University of Texas at Dallas, Richardson, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at Dallas, Richardson, TX, USA","institution_ids":["https://openalex.org/I162577319"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087192873","display_name":"Murat Kantarc\u0131o\u011flu","orcid":"https://orcid.org/0000-0001-9795-9063"},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Murat Kantarcioglu","raw_affiliation_strings":["University of Texas at Dallas, Richardson, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at Dallas, Richardson, TX, USA","institution_ids":["https://openalex.org/I162577319"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072193842","display_name":"Bhavani Thuraisingham","orcid":"https://orcid.org/0000-0003-4653-2080"},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bhavani Thuraisingham","raw_affiliation_strings":["University of Texas Dallas, Richardson, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas Dallas, Richardson, TX, USA","institution_ids":["https://openalex.org/I162577319"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5069713931"],"corresponding_institution_ids":["https://openalex.org/I162577319"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15511713,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"801","last_page":"814"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9812999963760376,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9556999802589417,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7720867395401001},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7329718470573425},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5615971088409424},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.5601015686988831},{"id":"https://openalex.org/keywords/attractiveness","display_name":"Attractiveness","score":0.5456186532974243},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.542816162109375},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.5374956727027893},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.5231099128723145},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5165594816207886},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5100582242012024},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5004656314849854},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4517133831977844},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09428679943084717},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.07569405436515808}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7720867395401001},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7329718470573425},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5615971088409424},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.5601015686988831},{"id":"https://openalex.org/C31173074","wikidata":"https://www.wikidata.org/wiki/Q2632514","display_name":"Attractiveness","level":2,"score":0.5456186532974243},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.542816162109375},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.5374956727027893},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.5231099128723145},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5165594816207886},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5100582242012024},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5004656314849854},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4517133831977844},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09428679943084717},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.07569405436515808},{"id":"https://openalex.org/C11171543","wikidata":"https://www.wikidata.org/wiki/Q41630","display_name":"Psychoanalysis","level":1,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3576915.3623177","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3576915.3623177","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3576915.3623177","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3576915.3623177","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3576915.3623177","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3576915.3623177","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1902524020","display_name":"CICI: UCSS: Blockchain Based Assured Open Scientific Data Sharing and Governance","funder_award_id":"2115094","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2401480377","display_name":null,"funder_award_id":"OAC-1828467","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2877791454","display_name":null,"funder_award_id":"1925346","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3314294675","display_name":"MRI: Development of An Instrument for Secure Cyber Physical Systems Analytics","funder_award_id":"1828467","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4077122005","display_name":null,"funder_award_id":"W911NF-17-1-0356","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4154900115","display_name":null,"funder_award_id":"OAC-2115094","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4423323639","display_name":null,"funder_award_id":"OAC-1828467, DMS-1925346, CNS-2029661, OAC-2115094","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5321078674","display_name":null,"funder_award_id":"W911NF-17-1-0356","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G7452299184","display_name":null,"funder_award_id":"W911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G7810535112","display_name":"RAPID: Collaborative: A Privacy Risk Assessment Framework for Person-Level Data Sharing During Pandemics","funder_award_id":"2029661","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8998121839","display_name":null,"funder_award_id":"911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320307791","display_name":"Cisco Systems","ror":"https://ror.org/03yt1ez60"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4388867306.pdf","grobid_xml":"https://content.openalex.org/works/W4388867306.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W1583837637","https://openalex.org/W1834627138","https://openalex.org/W2054475056","https://openalex.org/W2091346122","https://openalex.org/W2100717205","https://openalex.org/W2194775991","https://openalex.org/W2243397390","https://openalex.org/W2576686289","https://openalex.org/W2592232824","https://openalex.org/W2747329762","https://openalex.org/W2760600531","https://openalex.org/W2781265533","https://openalex.org/W2912083425","https://openalex.org/W2963003451","https://openalex.org/W2963163009","https://openalex.org/W2963857521","https://openalex.org/W2979924562","https://openalex.org/W3013520104","https://openalex.org/W3090494374","https://openalex.org/W3119628700"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W2900159906","https://openalex.org/W4384648009","https://openalex.org/W4283221438","https://openalex.org/W4287828318","https://openalex.org/W2406556600","https://openalex.org/W4380352238","https://openalex.org/W3126470649","https://openalex.org/W2899811703"],"abstract_inverted_index":{"Machine":[0],"learning":[1,22,74,80],"models":[2],"are":[3],"vulnerable":[4],"to":[5,31,52,96],"adversarial":[6],"attacks.":[7],"Existing":[8],"research":[9,91],"focuses":[10],"on":[11,83,107],"attack-only":[12],"scenarios.":[13],"In":[14,62],"practice,":[15],"one":[16,73,98],"dataset":[17],"may":[18,28,76],"be":[19,29],"used":[20],"for":[21,48,72],"different":[23],"concepts,":[24],"and":[25],"the":[26,37,41,49,56,70,84,104,108],"attacker":[27,42],"incentivized":[30],"attack":[32,97],"some":[33],"concepts":[34],"but":[35],"protect":[36],"others.":[38],"For":[39],"example,":[40],"might":[43],"tamper":[44],"a":[45],"profile":[46],"image":[47],"\"age''":[50],"model":[51,58],"predict":[53],"\"young'',":[54],"while":[55,102],"\"attractiveness''":[57],"still":[59],"predicts":[60],"\"pretty''.":[61],"this":[63],"work,":[64],"we":[65],"empirically":[66],"demonstrate":[67],"that":[68],"attacking":[69],"classifier":[71],"task":[75],"negatively":[77],"impact":[78],"classifiers":[79,101],"other":[81],"tasks":[82],"same":[85,109],"data.":[86],"This":[87],"raises":[88],"an":[89],"interesting":[90],"question:":[92],"is":[93],"it":[94],"possible":[95],"set":[99],"of":[100],"protecting":[103],"others":[105],"trained":[106],"data?":[110]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
