{"id":"https://openalex.org/W4410776366","doi":"https://doi.org/10.1145/3704724","title":"Malicious AI Models Undermine Software Supply-Chain Security","display_name":"Malicious AI Models Undermine Software Supply-Chain Security","publication_year":2025,"publication_date":"2025-05-27","ids":{"openalex":"https://openalex.org/W4410776366","doi":"https://doi.org/10.1145/3704724"},"language":"en","primary_location":{"id":"doi:10.1145/3704724","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3704724","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3704724","source":{"id":"https://openalex.org/S103482838","display_name":"Communications of the ACM","issn_l":"0001-0782","issn":["0001-0782","1557-7317"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications of the ACM","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3704724","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104000386","display_name":"Aditya K. Sood","orcid":"https://orcid.org/0000-0002-7738-2890"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Aditya K. Sood","raw_affiliation_strings":["Aryaka, Security Engineering and AI Strategy, Santa Clara, California, United States"],"affiliations":[{"raw_affiliation_string":"Aryaka, Security Engineering and AI Strategy, Santa Clara, California, United States","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002810652","display_name":"Sherali Zeadally","orcid":"https://orcid.org/0000-0002-5982-8190"},"institutions":[{"id":"https://openalex.org/I143302722","display_name":"University of Kentucky","ror":"https://ror.org/02k3smh20","country_code":"US","type":"education","lineage":["https://openalex.org/I143302722"]},{"id":"https://openalex.org/I35928602","display_name":"Kyung Hee University","ror":"https://ror.org/01zqcg218","country_code":"KR","type":"education","lineage":["https://openalex.org/I35928602"]}],"countries":["KR","US"],"is_corresponding":false,"raw_author_name":"Sherali Zeadally","raw_affiliation_strings":["Kyung Hee University, Department of Electronic Engineering, Seoul, Republic of Korea","University of Kentucky, College of Communication and Information, Lexington, Kentucky, United States"],"affiliations":[{"raw_affiliation_string":"Kyung Hee University, Department of Electronic Engineering, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I35928602"]},{"raw_affiliation_string":"University of Kentucky, College of Communication and Information, Lexington, Kentucky, United States","institution_ids":["https://openalex.org/I143302722"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5104000386"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":7.0294,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.96424679,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11636","display_name":"Artificial Intelligence in Healthcare and Education","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/2718","display_name":"Health Informatics"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6767669916152954},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.6396450400352478},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5842313170433044},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5805850028991699},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.48073554039001465},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2772158980369568},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2609991431236267},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1425265073776245},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.1360691487789154},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.06672036647796631}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6767669916152954},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.6396450400352478},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5842313170433044},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5805850028991699},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.48073554039001465},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2772158980369568},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2609991431236267},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1425265073776245},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.1360691487789154},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.06672036647796631}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3704724","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3704724","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3704724","source":{"id":"https://openalex.org/S103482838","display_name":"Communications of the ACM","issn_l":"0001-0782","issn":["0001-0782","1557-7317"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications of the ACM","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3704724","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3704724","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3704724","source":{"id":"https://openalex.org/S103482838","display_name":"Communications of the ACM","issn_l":"0001-0782","issn":["0001-0782","1557-7317"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications of the ACM","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G547830083","display_name":null,"funder_award_id":"Johannesburg","funder_id":"https://openalex.org/F4320323959","funder_display_name":"University of Johannesburg"}],"funders":[{"id":"https://openalex.org/F4320323959","display_name":"University of Johannesburg","ror":"https://ror.org/04z6c2n17"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4410776366.pdf","grobid_xml":"https://content.openalex.org/works/W4410776366.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W2051267297","https://openalex.org/W2052854541","https://openalex.org/W2089560940","https://openalex.org/W2529444969","https://openalex.org/W2535690855","https://openalex.org/W2748789698","https://openalex.org/W2753783305","https://openalex.org/W3135023248","https://openalex.org/W3208113910","https://openalex.org/W4224316517","https://openalex.org/W4229003819","https://openalex.org/W4247200422","https://openalex.org/W4283212640","https://openalex.org/W4308643064","https://openalex.org/W4319150656","https://openalex.org/W4385687882","https://openalex.org/W4386977908","https://openalex.org/W4389164790","https://openalex.org/W4390604801","https://openalex.org/W4395661237","https://openalex.org/W4398766352","https://openalex.org/W4399631463"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Unveiling":[0],"the":[1],"dark":[2],"side.":[3]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
