{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:27:57Z","timestamp":1742916477541,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031723551"},{"type":"electronic","value":"9783031723568"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-72356-8_30","type":"book-chapter","created":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T13:02:55Z","timestamp":1726491775000},"page":"461-475","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Ch4os: Discretized Generative Adversarial Network for\u00a0Functionality-Preserving Evasive Modification on\u00a0Malware"],"prefix":"10.1007","author":[{"given":"Christopher","family":"Molloy","sequence":"first","affiliation":[]},{"given":"Furkan","family":"Alaca","sequence":"additional","affiliation":[]},{"given":"Steven H. H.","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,17]]},"reference":[{"key":"30_CR1","unstructured":"Anderson, H., Kharkar, A., Filar, B., Evans, D., Roth, P.: Learning to evade static PE machine learning malware models via reinforcement learning. CoRR, abs\/1801.08917 (2018)"},{"key":"30_CR2","unstructured":"Anderson, H.S., Roth, P.: EMBER: an open dataset for training static PE malware machine learning models. CoRR, abs\/1804.04637 (2018)"},{"key":"30_CR3","unstructured":"Glorot, X., Bengio, Y.: Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, AISTATS 2010, Chia Laguna Resort, Sardinia, Italy, 13\u201315 May 2010, vol. 9 of JMLR Proceedings, pp. 249\u2013256. JMLR.org (2010)"},{"key":"30_CR4","unstructured":"Goodfellow, I.J., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems: Annual Conference on Neural Information Processing Systems 2014, vol. 27, 8\u201313 December 2014, Montreal, Quebec, Canada, pp. 2672\u20132680 (2014)"},{"key":"30_CR5","unstructured":"Hahn, K., INM Register: Robust static analysis of portable executable malware. HTWK Leipzig, vol. 134 (2014)"},{"key":"30_CR6","doi-asserted-by":"publisher","unstructured":"Hu, W., Tan, Y.: Generating adversarial malware examples for black-box attacks based on GAN. In: Tan, Y., Shi, Y. (eds.) Data Mining and Big Data - 7th International Conference, DMBD 2022, Beijing, China, 21\u201324 November 2022, Proceedings, Part II, vol. 1745 of CCIS, pp. 409\u2013423. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-981-19-8991-9_29","DOI":"10.1007\/978-981-19-8991-9_29"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Kargaard, J., Drange, T., Kor, A.-L., Twafik, H., Butterfield, E.: Defending it systems against intelligent malware. In: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), pp. 411\u2013417 (2018)","DOI":"10.1109\/DESSERT.2018.8409169"},{"key":"30_CR8","doi-asserted-by":"publisher","unstructured":"Kim, J.-Y., Bu, S.-J., Cho, S.-B.: Malware detection using deep transferred generative adversarial networks. In: Liu, D., Xie, S., Li, Y., Zhao, D., El-Alfy, E.S. (eds.) Neural Information Processing - 24th International Conference, ICONIP 2017, Guangzhou, China, 14\u201318 November 2017, Proceedings, Part I. LNCS, vol. 10634, pp. 556\u2013564. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70087-8_58","DOI":"10.1007\/978-3-319-70087-8_58"},{"key":"30_CR9","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"30_CR10","doi-asserted-by":"publisher","unstructured":"Liu, G., Khalil, I., Khreishah, A.: GanDef: a GAN based adversarial training defense for neural network classifier. In: Dhillon, G., Karlsson, F., Hedstrom, K., Zuquete, A. (eds.) ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, 25\u201327 June 2019, Proceedings, IFIP Advances in Information and Communication Technology, vol. 562, pp. 19\u201332. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22312-0_2","DOI":"10.1007\/978-3-030-22312-0_2"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Lu, Y., Li, J.: Generative adversarial network for improving deep learning based malware classification. In: 2019 Winter Simulation Conference, WSC 2019, National Harbor, MD, USA, 8\u201311 December 2019, pp. 584\u2013593. IEEE (2019)","DOI":"10.1109\/WSC40007.2019.9004932"},{"issue":"5","key":"30_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/52.877857","volume":"17","author":"G McGraw","year":"2000","unstructured":"McGraw, G., Morrisett, G.: Attacking malicious code: a report to the Infosec research council. IEEE Softw. 17(5), 33\u201341 (2000)","journal-title":"IEEE Softw."},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Molloy, C., Ding, S.H.H., Fung, B.C.M., Charland, P.: H4rm0ny: a competitive zero-sum two-player Markov game for multi-agent learning on evasive malware generation and detection. In: 2022 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 22\u201329. Molloy-3 (2022)","DOI":"10.1109\/CSR54599.2022.9850345"},{"key":"30_CR14","doi-asserted-by":"crossref","unstructured":"Moti, Z., Hashemi, S., Namavar, A.: Discovering future malware variants by generating new malware samples using generative adversarial network. In: 2019 9th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 319\u2013324 (2019)","DOI":"10.1109\/ICCKE48569.2019.8964913"},{"key":"30_CR15","unstructured":"Nagaraju, R., Stamp, M.: Auxiliary-classifier GAN for malware analysis. CoRR, abs\/2107.01620 (2021)"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Nazari, E., Branco, P., Jourdan, G.-V.: Using CGAN to deal with class imbalance and small sample size in cybersecurity problems. In: 18th International Conference on Privacy, Security and Trust, PST 2021, Auckland, New Zealand, 13\u201315 December 2021, pp. 1\u201310. IEEE (2021)","DOI":"10.1109\/PST52912.2021.9647807"},{"key":"30_CR17","unstructured":"Pietrek, M.: An in-depth look into the Win32 portable executable file format, Part 2. MSDN Mag. (2002)"},{"key":"30_CR18","unstructured":"Raff, E., Barker, J., Sylvester, J., Brandon, R., Catanzaro, B., Nicholas, C.K.: Malware detection by eating a whole EXE. In: The Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, New Orleans, Louisiana, USA, 2\u20137 February 2018, vol. WS-18 of AAAI Workshops. AAAI Press (2018)"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Tobiyama, S., Yamaguchi, Y., Shimada, H., Ikuse, T., Yagi, T.: Malware detection with deep neural network using process behavior. In: 40th IEEE Annual Computer Software and Applications Conference, COMPSAC Workshops 2016, Atlanta, GA, USA, 10\u201314 June 2016, pp. 577\u2013582. IEEE Computer Society (2016)","DOI":"10.1109\/COMPSAC.2016.151"},{"key":"30_CR20","doi-asserted-by":"publisher","unstructured":"Trehan, H., Di Troia, F.: Fake malware generation using HMM and GAN. In: Chang, SY., Bathen, L., Di Troia, F., Austin, T.H., Nelson, A.J. (eds.) Silicon Valley Cybersecurity Conference - Second Conference, SVCC 2021, San Jose, CA, USA, 2\u20133 December 2021, Revised Selected Papers. CCIS, vol. 1536, pp. 3\u201321. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-96057-5_1","DOI":"10.1007\/978-3-030-96057-5_1"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks and Machine Learning \u2013 ICANN 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72356-8_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T13:09:07Z","timestamp":1726492147000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72356-8_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031723551","9783031723568"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72356-8_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"17 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lugano","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Switzerland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icann2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}