IDS-Anta: An open-source code with a defense mechanism to detect adversarial attacks for intrusion detection system Article Swipe
Kousik Barik
,
Sanjay Misra
·
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.1016/j.simpa.2024.100664
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.1016/j.simpa.2024.100664
An intrusion detection system (IDS) is critical in protecting organizations from cyber threats. The susceptibility of Machine Learning and Deep Learning-based IDSs against adversarial attacks arises from malicious actors' deliberate construction of adversarial samples. This study proposes a Python-based open-source code repository named IDS-Anta with a robust defence mechanism to identify adversarial attacks without compromising IDS performance. It uses Multi-Armed Bandits with Thomson Sampling, Ant Colony Optimization (ACO), and adversarial attack generation methods and is validated using three public benchmark datasets. This code repository can be readily applied and replicated on IDS datasets against adversarial attacks.
Related Topics
Concepts
Adversarial system
Computer science
Python (programming language)
Open source
Source code
Intrusion detection system
Code (set theory)
Benchmark (surveying)
Computer security
Artificial intelligence
Machine learning
Operating system
Programming language
Software
Set (abstract data type)
Geography
Geodesy
Metadata
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1016/j.simpa.2024.100664
- OA Status
- gold
- Cited By
- 9
- References
- 31
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4397023789
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4397023789Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1016/j.simpa.2024.100664Digital Object Identifier
- Title
-
IDS-Anta: An open-source code with a defense mechanism to detect adversarial attacks for intrusion detection systemWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2024Year of publication
- Publication date
-
2024-05-17Full publication date if available
- Authors
-
Kousik Barik, Sanjay MisraList of authors in order
- Landing page
-
https://doi.org/10.1016/j.simpa.2024.100664Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1016/j.simpa.2024.100664Direct OA link when available
- Concepts
-
Adversarial system, Computer science, Python (programming language), Open source, Source code, Intrusion detection system, Code (set theory), Benchmark (surveying), Computer security, Artificial intelligence, Machine learning, Operating system, Programming language, Software, Set (abstract data type), Geography, GeodesyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
9Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 6, 2024: 3Per-year citation counts (last 5 years)
- References (count)
-
31Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4397023789 |
|---|---|
| doi | https://doi.org/10.1016/j.simpa.2024.100664 |
| ids.doi | https://doi.org/10.1016/j.simpa.2024.100664 |
| ids.openalex | https://openalex.org/W4397023789 |
| fwci | 7.53179491 |
| type | article |
| title | IDS-Anta: An open-source code with a defense mechanism to detect adversarial attacks for intrusion detection system |
| biblio.issue | |
| biblio.volume | 21 |
| biblio.last_page | 100664 |
| biblio.first_page | 100664 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9998999834060669 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T11241 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9997000098228455 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1711 |
| topics[1].subfield.display_name | Signal Processing |
| topics[1].display_name | Advanced Malware Detection Techniques |
| topics[2].id | https://openalex.org/T11512 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9855999946594238 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Anomaly Detection Techniques and Applications |
| is_xpac | False |
| apc_list.value | 450 |
| apc_list.currency | USD |
| apc_list.value_usd | 450 |
| apc_paid.value | 450 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 450 |
| concepts[0].id | https://openalex.org/C37736160 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8939058780670166 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q1801315 |
| concepts[0].display_name | Adversarial system |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.7452486157417297 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C519991488 |
| concepts[2].level | 2 |
| concepts[2].score | 0.7319610118865967 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q28865 |
| concepts[2].display_name | Python (programming language) |
| concepts[3].id | https://openalex.org/C3018397939 |
| concepts[3].level | 3 |
| concepts[3].score | 0.6918737888336182 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3644502 |
| concepts[3].display_name | Open source |
| concepts[4].id | https://openalex.org/C43126263 |
| concepts[4].level | 2 |
| concepts[4].score | 0.6250112652778625 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q128751 |
| concepts[4].display_name | Source code |
| concepts[5].id | https://openalex.org/C35525427 |
| concepts[5].level | 2 |
| concepts[5].score | 0.6222566962242126 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[5].display_name | Intrusion detection system |
| concepts[6].id | https://openalex.org/C2776760102 |
| concepts[6].level | 3 |
| concepts[6].score | 0.5393208861351013 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q5139990 |
| concepts[6].display_name | Code (set theory) |
| concepts[7].id | https://openalex.org/C185798385 |
| concepts[7].level | 2 |
| concepts[7].score | 0.5258106589317322 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q1161707 |
| concepts[7].display_name | Benchmark (surveying) |
| concepts[8].id | https://openalex.org/C38652104 |
| concepts[8].level | 1 |
| concepts[8].score | 0.5183123350143433 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[8].display_name | Computer security |
| concepts[9].id | https://openalex.org/C154945302 |
| concepts[9].level | 1 |
| concepts[9].score | 0.3774053156375885 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[9].display_name | Artificial intelligence |
| concepts[10].id | https://openalex.org/C119857082 |
| concepts[10].level | 1 |
| concepts[10].score | 0.3484872877597809 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q2539 |
| concepts[10].display_name | Machine learning |
| concepts[11].id | https://openalex.org/C111919701 |
| concepts[11].level | 1 |
| concepts[11].score | 0.16060656309127808 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[11].display_name | Operating system |
| concepts[12].id | https://openalex.org/C199360897 |
| concepts[12].level | 1 |
| concepts[12].score | 0.14423048496246338 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q9143 |
| concepts[12].display_name | Programming language |
| concepts[13].id | https://openalex.org/C2777904410 |
| concepts[13].level | 2 |
| concepts[13].score | 0.11813998222351074 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q7397 |
| concepts[13].display_name | Software |
| concepts[14].id | https://openalex.org/C177264268 |
| concepts[14].level | 2 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q1514741 |
| concepts[14].display_name | Set (abstract data type) |
| concepts[15].id | https://openalex.org/C205649164 |
| concepts[15].level | 0 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q1071 |
| concepts[15].display_name | Geography |
| concepts[16].id | https://openalex.org/C13280743 |
| concepts[16].level | 1 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q131089 |
| concepts[16].display_name | Geodesy |
| keywords[0].id | https://openalex.org/keywords/adversarial-system |
| keywords[0].score | 0.8939058780670166 |
| keywords[0].display_name | Adversarial system |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.7452486157417297 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/python |
| keywords[2].score | 0.7319610118865967 |
| keywords[2].display_name | Python (programming language) |
| keywords[3].id | https://openalex.org/keywords/open-source |
| keywords[3].score | 0.6918737888336182 |
| keywords[3].display_name | Open source |
| keywords[4].id | https://openalex.org/keywords/source-code |
| keywords[4].score | 0.6250112652778625 |
| keywords[4].display_name | Source code |
| keywords[5].id | https://openalex.org/keywords/intrusion-detection-system |
| keywords[5].score | 0.6222566962242126 |
| keywords[5].display_name | Intrusion detection system |
| keywords[6].id | https://openalex.org/keywords/code |
| keywords[6].score | 0.5393208861351013 |
| keywords[6].display_name | Code (set theory) |
| keywords[7].id | https://openalex.org/keywords/benchmark |
| keywords[7].score | 0.5258106589317322 |
| keywords[7].display_name | Benchmark (surveying) |
| keywords[8].id | https://openalex.org/keywords/computer-security |
| keywords[8].score | 0.5183123350143433 |
| keywords[8].display_name | Computer security |
| keywords[9].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[9].score | 0.3774053156375885 |
| keywords[9].display_name | Artificial intelligence |
| keywords[10].id | https://openalex.org/keywords/machine-learning |
| keywords[10].score | 0.3484872877597809 |
| keywords[10].display_name | Machine learning |
| keywords[11].id | https://openalex.org/keywords/operating-system |
| keywords[11].score | 0.16060656309127808 |
| keywords[11].display_name | Operating system |
| keywords[12].id | https://openalex.org/keywords/programming-language |
| keywords[12].score | 0.14423048496246338 |
| keywords[12].display_name | Programming language |
| keywords[13].id | https://openalex.org/keywords/software |
| keywords[13].score | 0.11813998222351074 |
| keywords[13].display_name | Software |
| language | en |
| locations[0].id | doi:10.1016/j.simpa.2024.100664 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210180398 |
| locations[0].source.issn | 2665-9638 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2665-9638 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Software Impacts |
| locations[0].source.host_organization | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_name | Elsevier BV |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_lineage_names | Elsevier BV |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Software Impacts |
| locations[0].landing_page_url | https://doi.org/10.1016/j.simpa.2024.100664 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5010619713 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-9296-9561 |
| authorships[0].author.display_name | Kousik Barik |
| authorships[0].countries | ES |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I189268942 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Computer Science, University of Alcala, Madrid, Spain |
| authorships[0].institutions[0].id | https://openalex.org/I189268942 |
| authorships[0].institutions[0].ror | https://ror.org/04pmn0e78 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I189268942 |
| authorships[0].institutions[0].country_code | ES |
| authorships[0].institutions[0].display_name | Universidad de Alcalá |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Kousik Barik |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | Department of Computer Science, University of Alcala, Madrid, Spain |
| authorships[1].author.id | https://openalex.org/A5064136287 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-3556-9331 |
| authorships[1].author.display_name | Sanjay Misra |
| authorships[1].countries | NO |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I19923696 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Computer Science and Communication, Østfold University College, Halden, Norway |
| authorships[1].affiliations[1].institution_ids | https://openalex.org/I3130438513 |
| authorships[1].affiliations[1].raw_affiliation_string | Department of Applied Data Science, Institute for Energy Technology, Halden, Norway |
| authorships[1].institutions[0].id | https://openalex.org/I3130438513 |
| authorships[1].institutions[0].ror | https://ror.org/02jqtg033 |
| authorships[1].institutions[0].type | facility |
| authorships[1].institutions[0].lineage | https://openalex.org/I3130438513 |
| authorships[1].institutions[0].country_code | NO |
| authorships[1].institutions[0].display_name | Institute for Energy Technology |
| authorships[1].institutions[1].id | https://openalex.org/I19923696 |
| authorships[1].institutions[1].ror | https://ror.org/04gf7fp41 |
| authorships[1].institutions[1].type | education |
| authorships[1].institutions[1].lineage | https://openalex.org/I19923696 |
| authorships[1].institutions[1].country_code | NO |
| authorships[1].institutions[1].display_name | Østfold University College |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Sanjay Misra |
| authorships[1].is_corresponding | True |
| authorships[1].raw_affiliation_strings | Department of Applied Data Science, Institute for Energy Technology, Halden, Norway, Department of Computer Science and Communication, Østfold University College, Halden, Norway |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1016/j.simpa.2024.100664 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | IDS-Anta: An open-source code with a defense mechanism to detect adversarial attacks for intrusion detection system |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9998999834060669 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W3080200277, https://openalex.org/W4401741136, https://openalex.org/W2557718140, https://openalex.org/W4399490472, https://openalex.org/W67092138, https://openalex.org/W2789551765, https://openalex.org/W2113128227, https://openalex.org/W632256878, https://openalex.org/W2491403535, https://openalex.org/W2479811461 |
| cited_by_count | 9 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 6 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 3 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1016/j.simpa.2024.100664 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210180398 |
| best_oa_location.source.issn | 2665-9638 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2665-9638 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Software Impacts |
| best_oa_location.source.host_organization | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_name | Elsevier BV |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_lineage_names | Elsevier BV |
| best_oa_location.license | |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Software Impacts |
| best_oa_location.landing_page_url | https://doi.org/10.1016/j.simpa.2024.100664 |
| primary_location.id | doi:10.1016/j.simpa.2024.100664 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210180398 |
| primary_location.source.issn | 2665-9638 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2665-9638 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Software Impacts |
| primary_location.source.host_organization | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_name | Elsevier BV |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_lineage_names | Elsevier BV |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Software Impacts |
| primary_location.landing_page_url | https://doi.org/10.1016/j.simpa.2024.100664 |
| publication_date | 2024-05-17 |
| publication_year | 2024 |
| referenced_works | https://openalex.org/W2958285686, https://openalex.org/W6847646082, https://openalex.org/W4309939034, https://openalex.org/W4306650020, https://openalex.org/W4386741428, https://openalex.org/W4391407086, https://openalex.org/W4309693681, https://openalex.org/W4220762966, https://openalex.org/W6855670404, https://openalex.org/W4367313930, https://openalex.org/W4394755835, https://openalex.org/W4387806828, https://openalex.org/W6857188396, https://openalex.org/W4323545679, https://openalex.org/W4388573952, https://openalex.org/W6847857455, https://openalex.org/W4376460718, https://openalex.org/W3130106680, https://openalex.org/W6841823096, https://openalex.org/W4322775381, https://openalex.org/W4391731090, https://openalex.org/W4300167448, https://openalex.org/W3119693685, https://openalex.org/W4210779665, https://openalex.org/W4392804858, https://openalex.org/W4385768289, https://openalex.org/W4387817744, https://openalex.org/W4311462070, https://openalex.org/W4311839437, https://openalex.org/W2946445608, https://openalex.org/W4292411716 |
| referenced_works_count | 31 |
| abstract_inverted_index.a | 37, 45 |
| abstract_inverted_index.An | 0 |
| abstract_inverted_index.It | 57 |
| abstract_inverted_index.be | 85 |
| abstract_inverted_index.in | 7 |
| abstract_inverted_index.is | 5, 74 |
| abstract_inverted_index.of | 15, 31 |
| abstract_inverted_index.on | 90 |
| abstract_inverted_index.to | 49 |
| abstract_inverted_index.Ant | 64 |
| abstract_inverted_index.IDS | 55, 91 |
| abstract_inverted_index.The | 13 |
| abstract_inverted_index.and | 18, 68, 73, 88 |
| abstract_inverted_index.can | 84 |
| abstract_inverted_index.Deep | 19 |
| abstract_inverted_index.IDSs | 21 |
| abstract_inverted_index.This | 34, 81 |
| abstract_inverted_index.code | 40, 82 |
| abstract_inverted_index.from | 10, 26 |
| abstract_inverted_index.uses | 58 |
| abstract_inverted_index.with | 44, 61 |
| abstract_inverted_index.(IDS) | 4 |
| abstract_inverted_index.cyber | 11 |
| abstract_inverted_index.named | 42 |
| abstract_inverted_index.study | 35 |
| abstract_inverted_index.three | 77 |
| abstract_inverted_index.using | 76 |
| abstract_inverted_index.(ACO), | 67 |
| abstract_inverted_index.Colony | 65 |
| abstract_inverted_index.arises | 25 |
| abstract_inverted_index.attack | 70 |
| abstract_inverted_index.public | 78 |
| abstract_inverted_index.robust | 46 |
| abstract_inverted_index.system | 3 |
| abstract_inverted_index.Bandits | 60 |
| abstract_inverted_index.Machine | 16 |
| abstract_inverted_index.Thomson | 62 |
| abstract_inverted_index.actors' | 28 |
| abstract_inverted_index.against | 22, 93 |
| abstract_inverted_index.applied | 87 |
| abstract_inverted_index.attacks | 24, 52 |
| abstract_inverted_index.defence | 47 |
| abstract_inverted_index.methods | 72 |
| abstract_inverted_index.readily | 86 |
| abstract_inverted_index.without | 53 |
| abstract_inverted_index.IDS-Anta | 43 |
| abstract_inverted_index.Learning | 17 |
| abstract_inverted_index.attacks. | 95 |
| abstract_inverted_index.critical | 6 |
| abstract_inverted_index.datasets | 92 |
| abstract_inverted_index.identify | 50 |
| abstract_inverted_index.proposes | 36 |
| abstract_inverted_index.samples. | 33 |
| abstract_inverted_index.threats. | 12 |
| abstract_inverted_index.Sampling, | 63 |
| abstract_inverted_index.benchmark | 79 |
| abstract_inverted_index.datasets. | 80 |
| abstract_inverted_index.detection | 2 |
| abstract_inverted_index.intrusion | 1 |
| abstract_inverted_index.malicious | 27 |
| abstract_inverted_index.mechanism | 48 |
| abstract_inverted_index.validated | 75 |
| abstract_inverted_index.deliberate | 29 |
| abstract_inverted_index.generation | 71 |
| abstract_inverted_index.protecting | 8 |
| abstract_inverted_index.replicated | 89 |
| abstract_inverted_index.repository | 41, 83 |
| abstract_inverted_index.Multi-Armed | 59 |
| abstract_inverted_index.adversarial | 23, 32, 51, 69, 94 |
| abstract_inverted_index.open-source | 39 |
| abstract_inverted_index.Optimization | 66 |
| abstract_inverted_index.Python-based | 38 |
| abstract_inverted_index.compromising | 54 |
| abstract_inverted_index.construction | 30 |
| abstract_inverted_index.performance. | 56 |
| abstract_inverted_index.organizations | 9 |
| abstract_inverted_index.Learning-based | 20 |
| abstract_inverted_index.susceptibility | 14 |
| cited_by_percentile_year.max | 99 |
| cited_by_percentile_year.min | 96 |
| corresponding_author_ids | https://openalex.org/A5064136287, https://openalex.org/A5010619713 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 2 |
| corresponding_institution_ids | https://openalex.org/I189268942, https://openalex.org/I19923696, https://openalex.org/I3130438513 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.7900000214576721 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.94670346 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |