{"id":"https://openalex.org/W2990347604","doi":"https://doi.org/10.1155/2019/1953839","title":"Detection of Trojaning Attack on Neural Networks via Cost of Sample Classification","display_name":"Detection of Trojaning Attack on Neural Networks via Cost of Sample Classification","publication_year":2019,"publication_date":"2019-11-29","ids":{"openalex":"https://openalex.org/W2990347604","doi":"https://doi.org/10.1155/2019/1953839","mag":"2990347604"},"language":"en","primary_location":{"id":"doi:10.1155/2019/1953839","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/1953839","pdf_url":"http://downloads.hindawi.com/journals/scn/2019/1953839.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://downloads.hindawi.com/journals/scn/2019/1953839.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101441785","display_name":"Hui Gao","orcid":"https://orcid.org/0000-0002-2793-9953"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Gao","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu 210023, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu 210023, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101457707","display_name":"Yunfang Chen","orcid":"https://orcid.org/0000-0002-6759-6342"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunfang Chen","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu 210023, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu 210023, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084565580","display_name":"Wei Zhang","orcid":"https://orcid.org/0000-0002-1658-0236"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Zhang","raw_affiliation_strings":["Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu 210023, China","School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu 210023, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu 210023, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu 210023, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5084565580"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.5781,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.76712591,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10320","display_name":"Neural Networks and Applications","score":0.9757000207901001,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8851203918457031},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.7025059461593628},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.691015362739563},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5726457834243774},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.5053737759590149},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.47410422563552856},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.45862430334091187},{"id":"https://openalex.org/keywords/sample","display_name":"Sample (material)","score":0.4396369159221649},{"id":"https://openalex.org/keywords/resource-consumption","display_name":"Resource consumption","score":0.43909168243408203},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.4235674738883972},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.41194140911102295},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4093725085258484},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.336617648601532}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8851203918457031},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.7025059461593628},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.691015362739563},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5726457834243774},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.5053737759590149},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47410422563552856},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45862430334091187},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.4396369159221649},{"id":"https://openalex.org/C2777480716","wikidata":"https://www.wikidata.org/wiki/Q23582796","display_name":"Resource consumption","level":2,"score":0.43909168243408203},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.4235674738883972},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.41194140911102295},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4093725085258484},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.336617648601532},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2019/1953839","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/1953839","pdf_url":"http://downloads.hindawi.com/journals/scn/2019/1953839.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:8ba6d821c7194eb2bbec0aafbdabb63c","is_oa":true,"landing_page_url":"https://doaj.org/article/8ba6d821c7194eb2bbec0aafbdabb63c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2019 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2019/1953839","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/1953839","pdf_url":"http://downloads.hindawi.com/journals/scn/2019/1953839.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.5099999904632568,"display_name":"Decent work and economic growth"}],"awards":[{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7033253288","display_name":null,"funder_award_id":"Grants","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7058848123","display_name":null,"funder_award_id":"61672297","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8369219007","display_name":null,"funder_award_id":"2019YFB2101704","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2990347604.pdf","grobid_xml":"https://content.openalex.org/works/W2990347604.grobid-xml"},"referenced_works_count":5,"referenced_works":["https://openalex.org/W1534499320","https://openalex.org/W1571074146","https://openalex.org/W2064476459","https://openalex.org/W2077709713","https://openalex.org/W4289256795"],"related_works":["https://openalex.org/W4253721122","https://openalex.org/W1671033612","https://openalex.org/W4389527383","https://openalex.org/W4206524843","https://openalex.org/W2139923244","https://openalex.org/W2237899707","https://openalex.org/W576137284","https://openalex.org/W2116135171","https://openalex.org/W2057970756","https://openalex.org/W3124616678"],"abstract_inverted_index":{"To":[0],"overcome":[1],"huge":[2],"resource":[3],"consumption":[4],"of":[5,47,65,100,107,116,131,177],"neural":[6,79,108,145,161],"networks":[7,109,162],"training,":[8,110],"MLaaS":[9,178],"(Machine":[10],"Learning":[11],"as":[12,24,29,35,149],"a":[13,25,30,36,83,97],"Service)":[14,37],"has":[15],"become":[16],"an":[17],"irresistible":[18],"trend,":[19],"just":[20],"like":[21],"SaaS":[22],"(Software":[23],"Service),":[26,31],"PaaS":[27],"(Platform":[28],"and":[32,96,168],"IaaS":[33],"(Infrastructure":[34],"have":[38],"been.":[39],"But":[40],"it":[41],"comes":[42],"with":[43],"some":[44],"security":[45,176],"issues":[46],"untrustworthy":[48],"third-party":[49],"services.":[50],"Especially":[51],"machine":[52],"learning":[53],"providers":[54],"may":[55,171],"deploy":[56],"trojan":[57],"backdoors":[58],"in":[59,143,165,179],"provided":[60],"models":[61],"for":[62],"the":[63,73,90,114,128,140,144,152,155,175],"pursuit":[64],"extra":[66],"profit":[67],"or":[68],"other":[69],"illegal":[70],"purposes.":[71],"Against":[72],"redundant":[74],"nodes-based":[75],"trojaning":[76,158],"attack":[77,159],"on":[78,134,154,160,174],"networks,":[80],"we":[81,111,137,150],"proposed":[82],"novel":[84],"detecting":[85],"method,":[86],"which":[87],"only":[88],"requires":[89],"untrusted":[91],"model":[92],"to":[93],"be":[94],"tested":[95],"small":[98],"batch":[99],"legitimate":[101],"dataset.":[102],"By":[103],"comparing":[104],"different":[105],"processes":[106],"found":[112],"that":[113],"embedding":[115],"malicious":[117],"nodes":[118,142],"will":[119],"make":[120],"their":[121],"parameter":[122],"configuration":[123],"abnormal.":[124],"Moreover,":[125],"by":[126],"analysing":[127],"cost":[129],"distribution":[130],"test":[132],"dataset":[133],"network":[135],"nodes,":[136],"successfully":[138],"detect":[139],"trojaned":[141],"networks.":[146],"As":[147],"far":[148],"know,":[151],"research":[153,170],"defence":[156],"against":[157],"is":[163],"still":[164],"its":[166],"infancy,":[167],"our":[169],"shed":[172],"light":[173],"real-life":[180],"scenarios.":[181]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
