{"id":"https://openalex.org/W7131268574","doi":"https://doi.org/10.3103/s0146411625700981","title":"Study of Adversarial Attacks on Classical Machine Learning Models in the Context of Network Threat Detection","display_name":"Study of Adversarial Attacks on Classical Machine Learning Models in the Context of Network Threat Detection","publication_year":2025,"publication_date":"2025-12-01","ids":{"openalex":"https://openalex.org/W7131268574","doi":"https://doi.org/10.3103/s0146411625700981"},"language":"en","primary_location":{"id":"doi:10.3103/s0146411625700981","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411625700981","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126738078","display_name":"P. E. Yugai","orcid":null},"institutions":[{"id":"https://openalex.org/I212220629","display_name":"Peter the Great St. Petersburg Polytechnic University","ror":"https://ror.org/02x91aj62","country_code":"RU","type":"education","lineage":["https://openalex.org/I212220629"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"P. E. Yugai","raw_affiliation_strings":["Peter the Great St. Petersburg Polytechnic University, 195251, St. Petersburg, Russia"],"affiliations":[{"raw_affiliation_string":"Peter the Great St. Petersburg Polytechnic University, 195251, St. Petersburg, Russia","institution_ids":["https://openalex.org/I212220629"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5126738078"],"corresponding_institution_ids":["https://openalex.org/I212220629"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.88660827,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"59","issue":"8","first_page":"1426","last_page":"1439"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.2223999947309494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.2223999947309494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.16419999301433563,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13181","display_name":"Economic and Technological Systems Analysis","score":0.06689999997615814,"subfield":{"id":"https://openalex.org/subfields/1405","display_name":"Management of Technology and Innovation"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8841999769210815},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.7257999777793884},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6480000019073486},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5950000286102295},{"id":"https://openalex.org/keywords/online-machine-learning","display_name":"Online machine learning","score":0.3903999924659729},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.36059999465942383},{"id":"https://openalex.org/keywords/traffic-sign-recognition","display_name":"Traffic sign recognition","score":0.35199999809265137}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8841999769210815},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8743000030517578},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.7257999777793884},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7124000191688538},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6991000175476074},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6480000019073486},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5950000286102295},{"id":"https://openalex.org/C115903097","wikidata":"https://www.wikidata.org/wiki/Q7094097","display_name":"Online machine learning","level":3,"score":0.3903999924659729},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.36059999465942383},{"id":"https://openalex.org/C6528762","wikidata":"https://www.wikidata.org/wiki/Q1574298","display_name":"Traffic sign recognition","level":4,"score":0.35199999809265137},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3472999930381775},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3248000144958496},{"id":"https://openalex.org/C139676723","wikidata":"https://www.wikidata.org/wiki/Q1193832","display_name":"Sign (mathematics)","level":2,"score":0.3188999891281128},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.30730000138282776},{"id":"https://openalex.org/C125168437","wikidata":"https://www.wikidata.org/wiki/Q7625184","display_name":"Structured support vector machine","level":3,"score":0.3012000024318695},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.295199990272522},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.26179999113082886},{"id":"https://openalex.org/C50292564","wikidata":"https://www.wikidata.org/wiki/Q2462783","display_name":"Computational learning theory","level":3,"score":0.2565999925136566}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3103/s0146411625700981","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411625700981","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W3000056432","https://openalex.org/W3022802582","https://openalex.org/W3115025749","https://openalex.org/W3129480485","https://openalex.org/W3203507230","https://openalex.org/W4205720394","https://openalex.org/W4214506203","https://openalex.org/W4283373641","https://openalex.org/W4297821027","https://openalex.org/W4300167250","https://openalex.org/W4411172912"],"related_works":[],"abstract_inverted_index":{"A":[0,39],"study":[1],"of":[2,14,22,42,53,59,110],"adversarial":[3,54,112],"attacks":[4,82,113],"on":[5,104,115],"classical":[6,66,117],"machine":[7,67,118],"learning":[8,68,119],"(ML)":[9],"algorithms":[10,120],"in":[11,32],"the":[12,43,60,85,111],"context":[13],"network":[15,34,57],"threat":[16,44],"detection":[17],"is":[18,37,46,121],"presented.":[19,38],"An":[20],"overview":[21],"ML":[23,106],"models":[24],"that":[25],"are":[26,102],"used":[27],"to":[28],"perform":[29],"various":[30],"tasks":[31],"computer":[33],"security":[35],"systems":[36],"formal":[40],"description":[41],"model":[45],"provided,":[47],"as":[48,50,84],"well":[49],"a":[51],"classification":[52],"attacks.":[55],"The":[56,108],"traffic":[58],"WEB-IDS23":[61],"dataset":[62],"was":[63],"classified":[64],"using":[65],"models:":[69],"k-nearest":[70],"neighbors":[71],"(KNN),":[72],"Random":[73],"Forest":[74],"(RF),":[75],"and":[76,100],"Support":[77],"Vector":[78],"Machine":[79],"(SVM).":[80],"Adversarial":[81],"such":[83],"fast":[86],"gradient":[87,92],"sign":[88],"method":[89],"(FGSM),":[90],"projected":[91],"descent,":[93],"Carlini":[94],"&":[95,98],"Wagner":[96],"(C":[97],"W),":[99],"DeepFool":[101],"implemented":[103,114],"these":[105],"algorithms.":[107],"impact":[109],"listed":[116],"analyzed.":[122]},"counts_by_year":[],"updated_date":"2026-02-25T06:22:25.187761","created_date":"2026-02-25T00:00:00"}
