{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:06:46Z","timestamp":1743048406508,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031217524"},{"type":"electronic","value":"9783031217531"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-21753-1_39","type":"book-chapter","created":{"date-parts":[[2022,11,20]],"date-time":"2022-11-20T10:02:32Z","timestamp":1668938552000},"page":"399-410","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Using GANs to\u00a0Improve the\u00a0Accuracy of\u00a0Machine Learning Models for\u00a0Malware Detection"],"prefix":"10.1007","author":[{"given":"Ciprian-Alin","family":"Simion","sequence":"first","affiliation":[]},{"given":"Gheorghe","family":"Balan","sequence":"additional","affiliation":[]},{"given":"Drago\u015f Teodor","family":"Gavrilu\u0163","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,21]]},"reference":[{"key":"39_CR1","doi-asserted-by":"publisher","unstructured":"Al-Dujaili, A., Huang, A., Hemberg, E., O\u2019Reilly, U.M.: Adversarial deep learning for robust detection of binary encoded malware (2018). https:\/\/doi.org\/10.48550\/ARXIV.1801.02950, https:\/\/arxiv.org\/abs\/1801.02950","DOI":"10.48550\/ARXIV.1801.02950"},{"key":"39_CR2","unstructured":"Anderson, H.S., Kharkar, A., Filar, B., Evans, D., Roth, P.: Learning to evade static pe machine learning malware models via reinforcement learning (2018). 10.48550\/ARXIV.1801.08917, https:\/\/arxiv.org\/abs\/1801.08917"},{"key":"39_CR3","doi-asserted-by":"publisher","unstructured":"Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein GAN (2017). https:\/\/doi.org\/10.48550\/ARXIV.1701.07875, https:\/\/arxiv.org\/abs\/1701.07875","DOI":"10.48550\/ARXIV.1701.07875"},{"key":"39_CR4","doi-asserted-by":"publisher","unstructured":"Che, T., et al. Maximum-likelihood augmented discrete generative adversarial networks (2017). https:\/\/doi.org\/10.48550\/ARXIV.1702.07983, https:\/\/arxiv.org\/abs\/1702.07983","DOI":"10.48550\/ARXIV.1702.07983"},{"key":"39_CR5","doi-asserted-by":"publisher","unstructured":"Chen, Y.W., Lin, C.J.: Combining SVMs with various feature selection strategies. In: Guyon, I., Nikravesh, M., Gunn, S., Zadeh, L.A. (eds.) Feature Extraction. Studies in Fuzziness and Soft Computing, vol. 207, pp 315\u2013324. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/978-3-540-35488-8_13","DOI":"10.1007\/978-3-540-35488-8_13"},{"key":"39_CR6","unstructured":"Kingma, D., Ba, J.: Adam: a method for stochastic optimization. In: International Conference on Learning Representations, December 2014"},{"key":"39_CR7","doi-asserted-by":"publisher","unstructured":"Gavrilut, D., Benchea, R., Vatamanu, C.: Optimized zero false positives perceptron training for malware detection. In: 2012 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, pp. 247\u2013253 (2012). https:\/\/doi.org\/10.1109\/SYNASC.2012.34","DOI":"10.1109\/SYNASC.2012.34"},{"key":"39_CR8","doi-asserted-by":"publisher","unstructured":"Hjelm, R.D., Jacob, A.P., Che, T., Trischler, A., Cho, K., Bengio, Y.: Boundary-seeking generative adversarial networks (2017). https:\/\/doi.org\/10.48550\/ARXIV.1702.08431, https:\/\/arxiv.org\/abs\/1702.08431","DOI":"10.48550\/ARXIV.1702.08431"},{"key":"39_CR9","doi-asserted-by":"publisher","unstructured":"Kolosnjaji, B., et al.: Adversarial malware binaries: evading deep learning for malware detection in executables (2018). https:\/\/doi.org\/10.48550\/ARXIV.1803.04173, https:\/\/arxiv.org\/abs\/1803.04173","DOI":"10.48550\/ARXIV.1803.04173"},{"key":"39_CR10","doi-asserted-by":"publisher","unstructured":"Kreuk, F., Barak, A., Aviv-Reuven, S., Baruch, M., Pinkas, B., Keshet, J.: Deceiving end-to-end deep learning malware detectors using adversarial examples (2018). https:\/\/doi.org\/10.48550\/ARXIV.1802.04528, https:\/\/arxiv.org\/abs\/1802.04528","DOI":"10.48550\/ARXIV.1802.04528"},{"key":"39_CR11","doi-asserted-by":"publisher","unstructured":"Liu, M.Y., Tuzel, O.: Coupled generative adversarial networks (2016). https:\/\/doi.org\/10.48550\/ARXIV.1606.07536, https:\/\/arxiv.org\/abs\/1606.07536","DOI":"10.48550\/ARXIV.1606.07536"},{"key":"39_CR12","doi-asserted-by":"publisher","unstructured":"Makhzani, A., Shlens, J., Jaitly, N., Goodfellow, I., Frey, B.: Adversarial autoencoders (2015). https:\/\/doi.org\/10.48550\/ARXIV.1511.05644,https:\/\/arxiv.org\/abs\/1511.05644","DOI":"10.48550\/ARXIV.1511.05644,"},{"key":"39_CR13","doi-asserted-by":"publisher","unstructured":"Mao, X., Li, Q., Xie, H., Lau, R.Y.K., Wang, Z., Smolley, S.P.: Least squares generative adversarial networks (2016). https:\/\/doi.org\/10.48550\/ARXIV.1611.04076, https:\/\/arxiv.org\/abs\/1611.04076","DOI":"10.48550\/ARXIV.1611.04076"},{"key":"39_CR14","doi-asserted-by":"publisher","unstructured":"Mirza, M., Osindero, S.: Conditional generative adversarial nets (2014). https:\/\/doi.org\/10.48550\/ARXIV.1411.1784, https:\/\/arxiv.org\/abs\/1411.1784","DOI":"10.48550\/ARXIV.1411.1784"},{"key":"39_CR15","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"39_CR16","doi-asserted-by":"publisher","unstructured":"Quiring, E., Pirch, L., Reimsbach, M., Arp, D., Rieck, K.: Against all odds: winning the defense challenge in an evasion competition with diversification (2020). https:\/\/doi.org\/10.48550\/ARXIV.2010.09569, https:\/\/arxiv.org\/abs\/2010.09569","DOI":"10.48550\/ARXIV.2010.09569"},{"key":"39_CR17","doi-asserted-by":"publisher","unstructured":"Raff, E., Barker, J., Sylvester, J., Brandon, R., Catanzaro, B., Nicholas, C.: Malware detection by eating a whole exe (2017). https:\/\/doi.org\/10.48550\/ARXIV.1710.09435, https:\/\/arxiv.org\/abs\/1710.09435","DOI":"10.48550\/ARXIV.1710.09435"},{"key":"39_CR18","doi-asserted-by":"publisher","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks (2013). https:\/\/doi.org\/10.48550\/ARXIV.1312.6199, https:\/\/arxiv.org\/abs\/1312.6199","DOI":"10.48550\/ARXIV.1312.6199"},{"key":"39_CR19","doi-asserted-by":"publisher","unstructured":"Wang, Z., et al.: Sample efficient actor-critic with experience replay (2016). https:\/\/doi.org\/10.48550\/ARXIV.1611.01224, https:\/\/arxiv.org\/abs\/1611.01224","DOI":"10.48550\/ARXIV.1611.01224"},{"key":"39_CR20","doi-asserted-by":"publisher","unstructured":"Yilmaz, I., Masum, R.: Expansion of cyber attack data from unbalanced datasets using generative techniques (2019). https:\/\/doi.org\/10.48550\/ARXIV.1912.04549, https:\/\/arxiv.org\/abs\/1912.04549","DOI":"10.48550\/ARXIV.1912.04549"},{"key":"39_CR21","doi-asserted-by":"publisher","unstructured":"Zhong, F., Cheng, X., Yu, D., Gong, B., Song, S., Yu, J.: Malfox: camouflaged adversarial malware example generation based on conv-GANs against black-box detectors (2020). https:\/\/doi.org\/10.48550\/ARXIV.2011.01509,https:\/\/arxiv.org\/abs\/2011.01509","DOI":"10.48550\/ARXIV.2011.01509,"}],"container-title":["Lecture Notes in Computer Science","Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21753-1_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T12:16:51Z","timestamp":1710332211000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21753-1_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031217524","9783031217531"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21753-1_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"21 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDEAL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Data Engineering and Automated Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Manchester","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ideal2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ideal-conf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"79","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"66% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.9","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}