{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:10:02Z","timestamp":1743127802595,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578831"},{"type":"electronic","value":"9783030578848"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57884-8_1","type":"book-chapter","created":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T13:44:40Z","timestamp":1598881480000},"page":"3-13","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Method of Multi-feature Fusion Based on Attention Mechanism in Malicious Software Detection"],"prefix":"10.1007","author":[{"given":"Yabo","family":"Wang","sequence":"first","affiliation":[]},{"given":"Shuning","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,1]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.future.2018.11.021","volume":"94","author":"P Vinod","year":"2019","unstructured":"Vinod, P., Zemmari, A., Conti, M.: A machine learning based approach to detect malicious android apps using discriminant system calls. Future Gener. Comput. Syst. 94, 333\u2013350 (2019)","journal-title":"Future Gener. Comput. Syst."},{"issue":"04","key":"1_CR2","first-page":"8","volume":"38","author":"H Yang","year":"2017","unstructured":"Yang, H., Xu, J.: Android malware detection based on improved random forest algorithm. J. Commun. 38(04), 8\u201316 (2017)","journal-title":"J. Commun."},{"doi-asserted-by":"crossref","unstructured":"Dahl, G.E., Stokes, J.W., Deng, L., et al.: Large-scale malware classification using random projections and neural networks. In: 38th IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3422\u20133426. IEEE Press, New York (2013)","key":"1_CR3","DOI":"10.1109\/ICASSP.2013.6638293"},{"doi-asserted-by":"crossref","unstructured":"Saxe, J., Berlin, K.: Deep neural network based malware detection using two dimensional binary program features. In: 10th International Conference on Malicious and Unwanted Software, pp. 11\u201320. IEEE Press, New York (2015)","key":"1_CR4","DOI":"10.1109\/MALWARE.2015.7413680"},{"doi-asserted-by":"crossref","unstructured":"Sami, A., Yadegari, B., Rahimi, H., Peiravian, N., Hashemi, S., Hamze, A.: Malware detection based on mining API calls. In: 25th Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 1020\u20131025. ACM Press, New York (2010)","key":"1_CR5","DOI":"10.1145\/1774088.1774303"},{"doi-asserted-by":"crossref","unstructured":"Alazab, M., Venkataraman, S., Watters, P.: Towards understanding malware behaviour by the extraction of API calls. In: 2nd 2010 Second Cybercrime and Trustworthy Computing Workshop, pp. 52\u201359. IEEE Press, New York (2010)","key":"1_CR6","DOI":"10.1109\/CTC.2010.8"},{"unstructured":"Vaswani, A., Shazeer, N., Parmar, N., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, pp. 5998\u20136008 (2017)","key":"1_CR7"},{"doi-asserted-by":"crossref","unstructured":"Bahdanau, D., Chorowski, J., Serdyuk, D., Brakel, P., Bengio, Y.: End-to-end attention-based large vocabulary speech recognition. In: 13th 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4945\u20134949. IEEE Press, New York (2016)","key":"1_CR8","DOI":"10.1109\/ICASSP.2016.7472618"},{"doi-asserted-by":"crossref","unstructured":"Cho, K., Van Merrienboer, B., Gulcehre, C., Bahdanau, D., Bougares, F., Schwenk, H., et al.: Learning phrase representations using RNN encoder-decoder for statistical machine translation. In: Conference on Empirical Methods in Natural Language Processing (2014)","key":"1_CR9","DOI":"10.3115\/v1\/D14-1179"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"112588","DOI":"10.1109\/ACCESS.2019.2934012","volume":"7","author":"Y Dai","year":"2019","unstructured":"Dai, Y., Li, H., Qian, Y., Yang, R., Zheng, M.: SMASH: a malware detection method based on multi-feature ensemble learning. IEEE Access 7, 112588\u2013112597 (2019)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Yakura, H., Shinozaki, S., Nishimura, R., Oyama, Y., Sakuma, J.: Malware analysis of imaged binary samples by convolutional neural network with attention mechanism. In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, pp. 127\u2013134. ACM Press, New York (2018)","key":"1_CR11","DOI":"10.1145\/3176258.3176335"},{"doi-asserted-by":"crossref","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. In: Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1746\u20131751 (2014)","key":"1_CR12","DOI":"10.3115\/v1\/D14-1181"},{"doi-asserted-by":"crossref","unstructured":"Cho, K., Van Merrienboer, B., Gulcehre, C., Bahdanau, D., Bougares, F., Schwenk, H., et al.: Learning phrase representations using RNN encoder-decoder for statistical machine translation. In: Conference on Empirical Methods in Natural Language Processing(EMNLP) (2014)","key":"1_CR13","DOI":"10.3115\/v1\/D14-1179"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1007\/978-3-662-44848-9_34","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"C Gulcehre","year":"2014","unstructured":"Gulcehre, C., Cho, K., Pascanu, R., Bengio, Y.: Learned-norm pooling for deep Feedforward and recurrent neural networks. In: Calders, T., Esposito, F., H\u00fcllermeier, E., Meo, R. (eds.) ECML PKDD 2014. LNCS (LNAI), vol. 8724, pp. 530\u2013546. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-44848-9_34"},{"issue":"5","key":"1_CR15","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1109\/TMI.2016.2528162","volume":"35","author":"HC Shin","year":"2016","unstructured":"Shin, H.C., Roth, H.R., Gao, M., et al.: Deep convolutional neural networks for computer-aided detection: CNN architectures, dataset characteristics and transfer learning. IEEE Trans. Med. Imaging 35(5), 1285\u20131298 (2016)","journal-title":"IEEE Trans. Med. Imaging"},{"issue":"3","key":"1_CR16","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.32604\/cmc.2019.05605","volume":"60","author":"H Ling","year":"2019","unstructured":"Ling, H., Wu, J., Li, P., et al.: Attention-aware network with latent semantic analysis for clothing invariant gait recognition. Comput. Mater. Continua 60(3), 1041\u20131054 (2019)","journal-title":"Comput. Mater. Continua"},{"issue":"2","key":"1_CR17","first-page":"213","volume":"55","author":"Z Xiong","year":"2018","unstructured":"Xiong, Z., Shen, Q., Wang, Y., et al.: Paragraph vector representation based on word to vector and CNN learning. Comput. Mater. Continua 55(2), 213\u2013227 (2018)","journal-title":"Comput. Mater. Continua"},{"issue":"2","key":"1_CR18","doi-asserted-by":"publisher","first-page":"547","DOI":"10.32604\/cmc.2019.05892","volume":"59","author":"J Qiu","year":"2019","unstructured":"Qiu, J., et al.: Dependency-based local attention approach to neural machine translation. Comput. Mater. Continua 59(2), 547\u2013562 (2019)","journal-title":"Comput. Mater. Continua"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57884-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T13:47:09Z","timestamp":1598881629000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57884-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030578831","9783030578848"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57884-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hohhot","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}