{"id":"https://openalex.org/W4221064655","doi":"https://doi.org/10.3390/jcp2010010","title":"Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey","display_name":"Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey","publication_year":2022,"publication_date":"2022-03-17","ids":{"openalex":"https://openalex.org/W4221064655","doi":"https://doi.org/10.3390/jcp2010010"},"language":"en","primary_location":{"id":"doi:10.3390/jcp2010010","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp2010010","pdf_url":"https://www.mdpi.com/2624-800X/2/1/10/pdf?version=1647919586","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/2/1/10/pdf?version=1647919586","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013294831","display_name":"Andrew McCarthy","orcid":"https://orcid.org/0000-0001-8054-0776"},"institutions":[{"id":"https://openalex.org/I178535277","display_name":"University of the West of England","ror":"https://ror.org/02nwg5t34","country_code":"GB","type":"education","lineage":["https://openalex.org/I178535277"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Andrew McCarthy","raw_affiliation_strings":["Computer Science Research Centre, University of the West of England, Bristol BS16 1QY, UK"],"raw_orcid":"https://orcid.org/0000-0001-8054-0776","affiliations":[{"raw_affiliation_string":"Computer Science Research Centre, University of the West of England, Bristol BS16 1QY, UK","institution_ids":["https://openalex.org/I178535277"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062799629","display_name":"Essam Ghadafi","orcid":"https://orcid.org/0000-0003-4897-0180"},"institutions":[{"id":"https://openalex.org/I178535277","display_name":"University of the West of England","ror":"https://ror.org/02nwg5t34","country_code":"GB","type":"education","lineage":["https://openalex.org/I178535277"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Essam Ghadafi","raw_affiliation_strings":["Computer Science Research Centre, University of the West of England, Bristol BS16 1QY, UK"],"raw_orcid":"https://orcid.org/0000-0003-4897-0180","affiliations":[{"raw_affiliation_string":"Computer Science Research Centre, University of the West of England, Bristol BS16 1QY, UK","institution_ids":["https://openalex.org/I178535277"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034683400","display_name":"Panagiotis Andriotis","orcid":"https://orcid.org/0000-0002-3490-3123"},"institutions":[{"id":"https://openalex.org/I178535277","display_name":"University of the West of England","ror":"https://ror.org/02nwg5t34","country_code":"GB","type":"education","lineage":["https://openalex.org/I178535277"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Panagiotis Andriotis","raw_affiliation_strings":["Computer Science Research Centre, University of the West of England, Bristol BS16 1QY, UK"],"raw_orcid":"https://orcid.org/0000-0002-3490-3123","affiliations":[{"raw_affiliation_string":"Computer Science Research Centre, University of the West of England, Bristol BS16 1QY, UK","institution_ids":["https://openalex.org/I178535277"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053235466","display_name":"Phil Legg","orcid":"https://orcid.org/0000-0003-3460-5609"},"institutions":[{"id":"https://openalex.org/I178535277","display_name":"University of the West of England","ror":"https://ror.org/02nwg5t34","country_code":"GB","type":"education","lineage":["https://openalex.org/I178535277"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Phil Legg","raw_affiliation_strings":["Computer Science Research Centre, University of the West of England, Bristol BS16 1QY, UK"],"raw_orcid":"https://orcid.org/0000-0003-3460-5609","affiliations":[{"raw_affiliation_string":"Computer Science Research Centre, University of the West of England, Bristol BS16 1QY, UK","institution_ids":["https://openalex.org/I178535277"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5013294831","https://openalex.org/A5053235466"],"corresponding_institution_ids":["https://openalex.org/I178535277"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":9.3019,"has_fulltext":false,"cited_by_count":74,"citation_normalized_percentile":{"value":0.98264511,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"2","issue":"1","first_page":"154","last_page":"190"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8406503200531006},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.7763892412185669},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7529380321502686},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.7377379536628723},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7084015607833862},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6815301775932312},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6191501617431641},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5905806422233582},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.45299527049064636},{"id":"https://openalex.org/keywords/open-research","display_name":"Open research","score":0.44263461232185364},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4371999204158783},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4353031814098358},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.41693830490112305},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12846589088439941}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8406503200531006},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7763892412185669},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7529380321502686},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.7377379536628723},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7084015607833862},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6815301775932312},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6191501617431641},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5905806422233582},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.45299527049064636},{"id":"https://openalex.org/C2778464652","wikidata":"https://www.wikidata.org/wiki/Q309849","display_name":"Open research","level":2,"score":0.44263461232185364},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4371999204158783},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4353031814098358},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.41693830490112305},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12846589088439941},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/jcp2010010","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp2010010","pdf_url":"https://www.mdpi.com/2624-800X/2/1/10/pdf?version=1647919586","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:7e1c07fbd5a047ebbb7678ac38deb15b","is_oa":false,"landing_page_url":"https://doaj.org/article/7e1c07fbd5a047ebbb7678ac38deb15b","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, Vol 2, Iss 1, Pp 154-190 (2022)","raw_type":"article"},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/e6fc5b42-40f8-4b1d-b00f-4f900faf28e5","is_oa":true,"landing_page_url":"https://research.birmingham.ac.uk/en/publications/e6fc5b42-40f8-4b1d-b00f-4f900faf28e5","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"McCarthy, A, Ghadafi, E, Andriotis, P & Legg, P 2022, 'Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains : a survey', Journal of Cybersecurity and Privacy, vol. 2, no. 1, pp. 154-190. https://doi.org/10.3390/jcp2010010","raw_type":"article"},{"id":"pmh:oai:pure.atira.dk:publications/e6fc5b42-40f8-4b1d-b00f-4f900faf28e5","is_oa":true,"landing_page_url":"https://birmingham.elsevierpure.com/en/publications/e6fc5b42-40f8-4b1d-b00f-4f900faf28e5","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"McCarthy , A , Ghadafi , E , Andriotis , P & Legg , P 2022 , ' Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains : a survey ' , Journal of Cybersecurity and Privacy , vol. 2 , no. 1 , pp. 154-190 . https://doi.org/10.3390/jcp2010010","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/jcp2010010","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp2010010","pdf_url":"https://www.mdpi.com/2624-800X/2/1/10/pdf?version=1647919586","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4221064655.pdf","grobid_xml":"https://content.openalex.org/works/W4221064655.grobid-xml"},"referenced_works_count":129,"referenced_works":["https://openalex.org/W9657784","https://openalex.org/W1988918299","https://openalex.org/W2008224380","https://openalex.org/W2026258420","https://openalex.org/W2077488147","https://openalex.org/W2099940443","https://openalex.org/W2109394932","https://openalex.org/W2128561763","https://openalex.org/W2161470437","https://openalex.org/W2180612164","https://openalex.org/W2189162242","https://openalex.org/W2243397390","https://openalex.org/W2287408518","https://openalex.org/W2296509296","https://openalex.org/W2343828539","https://openalex.org/W2461943168","https://openalex.org/W2525336835","https://openalex.org/W2538525524","https://openalex.org/W2543927648","https://openalex.org/W2552631155","https://openalex.org/W2552737632","https://openalex.org/W2572504188","https://openalex.org/W2591712613","https://openalex.org/W2607219512","https://openalex.org/W2616028256","https://openalex.org/W2618043096","https://openalex.org/W2618219509","https://openalex.org/W2620038827","https://openalex.org/W2753704268","https://openalex.org/W2765424254","https://openalex.org/W2776884785","https://openalex.org/W2789828921","https://openalex.org/W2795727551","https://openalex.org/W2800244495","https://openalex.org/W2853623529","https://openalex.org/W2888307014","https://openalex.org/W2889645991","https://openalex.org/W2891828758","https://openalex.org/W2892090366","https://openalex.org/W2897320933","https://openalex.org/W2908403421","https://openalex.org/W2914051825","https://openalex.org/W2932026309","https://openalex.org/W2933433744","https://openalex.org/W2936503027","https://openalex.org/W2941205169","https://openalex.org/W2962061624","https://openalex.org/W2963197901","https://openalex.org/W2963391384","https://openalex.org/W2963416329","https://openalex.org/W2963564844","https://openalex.org/W2963748489","https://openalex.org/W2963834268","https://openalex.org/W2963857521","https://openalex.org/W2963969878","https://openalex.org/W2964059111","https://openalex.org/W2964082701","https://openalex.org/W2964286909","https://openalex.org/W2968455244","https://openalex.org/W2969568306","https://openalex.org/W2982725903","https://openalex.org/W2983734430","https://openalex.org/W2991408690","https://openalex.org/W2995671208","https://openalex.org/W3001147583","https://openalex.org/W3005346446","https://openalex.org/W3007481080","https://openalex.org/W3008365266","https://openalex.org/W3009195050","https://openalex.org/W3014071235","https://openalex.org/W3019321885","https://openalex.org/W3021340315","https://openalex.org/W3032638893","https://openalex.org/W3036517673","https://openalex.org/W3037141777","https://openalex.org/W3042565595","https://openalex.org/W3081274009","https://openalex.org/W3082712634","https://openalex.org/W3082772432","https://openalex.org/W3084291879","https://openalex.org/W3090219579","https://openalex.org/W3095379301","https://openalex.org/W3101155090","https://openalex.org/W3102720581","https://openalex.org/W3103557498","https://openalex.org/W3103836116","https://openalex.org/W3109241147","https://openalex.org/W3111088413","https://openalex.org/W3111563271","https://openalex.org/W3113708632","https://openalex.org/W3115028727","https://openalex.org/W3123705133","https://openalex.org/W3125713917","https://openalex.org/W3127943761","https://openalex.org/W3131060461","https://openalex.org/W3138043834","https://openalex.org/W3138883064","https://openalex.org/W3146142859","https://openalex.org/W3153848163","https://openalex.org/W3155427574","https://openalex.org/W3158507034","https://openalex.org/W3164220323","https://openalex.org/W3165880105","https://openalex.org/W3168005866","https://openalex.org/W3168146198","https://openalex.org/W3176065393","https://openalex.org/W3180153815","https://openalex.org/W3180544503","https://openalex.org/W3182399361","https://openalex.org/W3191453585","https://openalex.org/W3192149658","https://openalex.org/W3196382900","https://openalex.org/W3197410585","https://openalex.org/W3198511875","https://openalex.org/W3208097639","https://openalex.org/W4230863428","https://openalex.org/W4247200422","https://openalex.org/W4250664506","https://openalex.org/W6637162671","https://openalex.org/W6696151112","https://openalex.org/W6743493502","https://openalex.org/W6745847742","https://openalex.org/W6748503732","https://openalex.org/W6752654261","https://openalex.org/W6754691863","https://openalex.org/W6766301176","https://openalex.org/W6775058991","https://openalex.org/W6787815814","https://openalex.org/W6910334465"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W4283221438","https://openalex.org/W2900159906","https://openalex.org/W4384648009","https://openalex.org/W4287828318","https://openalex.org/W2406556600","https://openalex.org/W4380352238","https://openalex.org/W3126470649","https://openalex.org/W2930249865"],"abstract_inverted_index":{"Machine":[0],"learning":[1,33,65,101,168,176,222],"has":[2,66,91],"become":[3],"widely":[4],"adopted":[5,105],"as":[6,99],"a":[7,12,39,43,61,68,73,148,151,250,258,283,318],"strategy":[8],"for":[9,71,209,223],"dealing":[10],"with":[11,228,282,381],"variety":[13],"of":[14,48,84,125,165,174,260,266,321,327,335,359,374,377],"cybersecurity":[15,180,224],"issues,":[16],"ranging":[17],"from":[18],"insider":[19],"threat":[20],"detection":[21,183,227],"to":[22,38,95,103,114,127,131,161,202,217,253,288,310,316,324],"intrusion":[23,182,226],"and":[24,58,75,170,181,197,290,301,342,344,353],"malware":[25],"detection.":[26],"However,":[27],"by":[28,147,274,366],"their":[29],"very":[30],"nature,":[31],"machine":[32,64,100,167,175,221],"systems":[34],"can":[35,138],"introduce":[36],"vulnerabilities":[37,118],"security":[40],"defence":[41],"whereby":[42],"learnt":[44],"model":[45],"is":[46,76,112,160,257],"unaware":[47],"so-called":[49],"adversarial":[50,89,166,220],"examples":[51,90],"that":[52,119,134,206,237,248,350],"may":[53,120],"intentionally":[54],"result":[55],"in":[56,106,178,190,194,219,263,379],"mis-classification":[57],"therefore":[59],"bypass":[60],"system.":[62],"Adversarial":[63],"been":[67],"research":[69,87,204,363],"topic":[70,357],"over":[72],"decade":[74],"now":[77],"an":[78],"accepted":[79],"but":[80],"open":[81,208],"problem.":[82],"Much":[83],"the":[85,116,141,163,172,179,187,195,203,254,264,279,322,325,336,356,367,372,375],"early":[86],"on":[88,347],"addressed":[92],"issues":[93],"related":[94,216],"computer":[96,285],"vision,":[97],"yet":[98,240],"continues":[102],"be":[104],"other":[107],"domains,":[108],"then":[109],"likewise":[110],"it":[111],"important":[113],"assess":[115],"potential":[117],"occur.":[121],"A":[122],"key":[123,188],"part":[124],"transferring":[126],"new":[128],"domains":[129,358],"relates":[130],"functionality-preservation,":[132],"such":[133],"any":[135],"crafted":[136],"attack":[137],"still":[139],"execute":[140],"original":[142],"intended":[143],"functionality":[144],"when":[145],"inspected":[146],"human":[149],"and/or":[150],"machine.":[152],"In":[153],"this":[154,271,360],"literature":[155,305],"survey,":[156],"our":[157,328,339],"main":[158],"objective":[159],"address":[162],"domain":[164,323],"attacks":[169],"examine":[171],"robustness":[173],"models":[177],"domains.":[184],"We":[185,277,313,330],"identify":[186],"trends":[189],"current":[191],"work":[192],"observed":[193],"literature,":[196,337],"explore":[198],"how":[199],"these":[200],"relate":[201],"challenges":[205],"remain":[207],"future":[210],"works.":[211],"Inclusion":[212],"criteria":[213],"were:":[214],"articles":[215],"functionality-preservation":[218],"or":[225],"insight":[229],"into":[230],"robust":[231],"classification.":[232],"Generally,":[233],"we":[234,243],"excluded":[235],"works":[236],"are":[238],"not":[239],"peer-reviewed;":[241],"however,":[242,270],"included":[244],"some":[245],"significant":[246],"papers":[247],"make":[249],"clear":[251],"contribution":[252],"domain.":[255],"There":[256],"risk":[259],"subjective":[261],"bias":[262],"selection":[265],"non-peer":[267],"reviewed":[268],"articles;":[269],"was":[272,307,364],"mitigated":[273],"co-author":[275],"review.":[276,361],"selected":[278],"following":[280,345],"databases":[281],"sizeable":[284],"science":[286],"element":[287],"search":[289,306,340],"retrieve":[291],"literature:":[292],"IEEE":[293],"Xplore,":[294],"ACM":[295],"Digital":[296],"Library,":[297],"ScienceDirect,":[298],"Scopus,":[299],"SpringerLink,":[300],"Google":[302],"Scholar.":[303],"The":[304],"conducted":[308],"up":[309,346],"January":[311],"2022.":[312],"have":[314,331],"striven":[315],"ensure":[317],"comprehensive":[319],"coverage":[320],"best":[326],"knowledge.":[329],"performed":[332],"systematic":[333],"searches":[334],"noting":[338],"terms":[341],"results,":[343],"all":[348],"materials":[349],"appear":[351],"relevant":[352],"fit":[354],"within":[355],"This":[362],"funded":[365],"Partnership":[368],"PhD":[369],"scheme":[370],"at":[371],"University":[373],"West":[376],"England":[378],"collaboration":[380],"Techmodal":[382],"Ltd.":[383]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":30},{"year":2024,"cited_by_count":19},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":4}],"updated_date":"2026-05-08T15:41:06.802602","created_date":"2025-10-10T00:00:00"}
