{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:06:26Z","timestamp":1759334786357,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031944543"},{"type":"electronic","value":"9783031944550"}],"license":[{"start":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T00:00:00Z","timestamp":1757030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T00:00:00Z","timestamp":1757030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-94455-0_7","type":"book-chapter","created":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T09:23:06Z","timestamp":1756977786000},"page":"139-153","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mal-POBM: A Genetic Algorithm for\u00a0Malware Adversarial Sample Generation"],"prefix":"10.1007","author":[{"given":"Hong","family":"Lei","sequence":"first","affiliation":[]},{"given":"Hequn","family":"Xian","sequence":"additional","affiliation":[]},{"given":"Xiaowei","family":"Peng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,5]]},"reference":[{"unstructured":"AV-TEST. https:\/\/portal.av-atlas.org\/malware. Accessed 2 Mar 2024","key":"7_CR1"},{"doi-asserted-by":"crossref","unstructured":"Raff, E., Sylvester, J., Nicholas C.: Learning the PE header, malware detection with minimal domain knowledge. ACM (2017)","key":"7_CR2","DOI":"10.1145\/3128572.3140442"},{"doi-asserted-by":"crossref","unstructured":"Raff, E., et al.: An investigation of byte n-gram features for malware classification 14(1). Springer, Paris (2018)","key":"7_CR3","DOI":"10.1145\/3209280.3229085"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s11416-018-0323-0","volume":"15","author":"D Gibert","year":"2019","unstructured":"Gibert, D., et al.: Using convolutional neural networks for classification of malware represented as images. J. Comput. Virol. Hack. Techn. 15, 15\u201328 (2019)","journal-title":"J. Comput. Virol. Hack. Techn."},{"doi-asserted-by":"crossref","unstructured":"Arp, D., et al.: Drebin: effective and explainable detection of android malware in your pocket. In: NDSS, vol. 14 (2014)","key":"7_CR5","DOI":"10.14722\/ndss.2014.23247"},{"doi-asserted-by":"crossref","unstructured":"Saxe, J., Berlin, K.: Deep neural network based malware detection using two dimensional binary program features. In: 2015 10th International Conference on Malicious and Unwanted Software (MALWARE). IEEE (2015)","key":"7_CR6","DOI":"10.1109\/MALWARE.2015.7413680"},{"doi-asserted-by":"crossref","unstructured":"Yan, S., et al.: A survey of adversarial attack and defense methods for malware classification in cyber security. Commun. Surv. Tutorials (2023)","key":"7_CR7","DOI":"10.1109\/COMST.2022.3225137"},{"unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)","key":"7_CR8"},{"doi-asserted-by":"crossref","unstructured":"Pascanu, R., et al.: Malware classification with recurrent networks. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE (2015)","key":"7_CR9","DOI":"10.1109\/ICASSP.2015.7178304"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-319-50127-7_11","volume-title":"AI 2016: Advances in Artificial Intelligence","author":"B Kolosnjaji","year":"2016","unstructured":"Kolosnjaji, B., Zarras, A., Webster, G., Eckert, C.: Deep learning for classification of malware system call sequences. In: Kang, B.H., Bai, Q. (eds.) AI 2016. LNCS (LNAI), vol. 9992, pp. 137\u2013149. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-50127-7_11"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-319-40667-1_20","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"W Huang","year":"2016","unstructured":"Huang, W., Stokes, J.W.: MtNet: a multi-task neural network for dynamic malware classification. In: Caballero, J., Zurutuza, U., Rodr\u00edguez, R.J. (eds.) DIMVA 2016. LNCS, vol. 9721, pp. 399\u2013418. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40667-1_20"},{"key":"7_CR12","volume-title":"Introduction to Information Retrieval","author":"H Sch\u00fctze","year":"2008","unstructured":"Sch\u00fctze, H., Manning, C.D., Raghavan, P.: Introduction to Information Retrieval, vol. 39. Cambridge University Press, Cambridge (2008)"},{"issue":"1","key":"7_CR13","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1186\/s42400-024-00205-z","volume":"7","author":"MA Hossain","year":"2024","unstructured":"Hossain, M.A., Islam, M.S.: Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity. Cybersecurity 7(1), 16 (2024)","journal-title":"Cybersecurity"},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"101682","DOI":"10.1016\/j.cose.2019.101682","volume":"89","author":"X Liu","year":"2020","unstructured":"Liu, X., et al.: A novel method for malware detection on ML-based visualization technique. Comput. Secur. 89, 101682 (2020)","journal-title":"Comput. Secur."},{"unstructured":"Raff, E., et al.: Malware detection by eating a whole exe. In: Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence (2018)","key":"7_CR15"},{"key":"7_CR16","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.comcom.2023.12.036","volume":"216","author":"S Kumar","year":"2024","unstructured":"Kumar, S., Janet, B., Neelakantan, S.: IMCNN: intelligent malware classification using deep convolution neural networks as transfer learning and ensemble learning in honeypot enabled organizational network. Comput. Commun. 216, 16\u201333 (2024)","journal-title":"Comput. Commun."},{"doi-asserted-by":"crossref","unstructured":"Gibert, D., et al.: A wolf in sheep\u2019s clothing: query-free evasion attacks against machine learning-based malware detectors with generative adversarial networks. In: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW). IEEE (2023)","key":"7_CR17","DOI":"10.1109\/EuroSPW59978.2023.00052"},{"doi-asserted-by":"crossref","unstructured":"Urooj, U., et al.: Addressing behavioral drift in ransomware early detection through weighted generative adversarial networks. IEEE Access (2023)","key":"7_CR18","DOI":"10.1109\/ACCESS.2023.3348451"},{"unstructured":"Skylight2019Cylance. https:\/\/skylightcyber.com\/2019\/07\/18\/cylance-i-kill-you\/. Accessed 2 Mar 2024","key":"7_CR19"},{"unstructured":"Mohurle, S., Patil, M.: A brief study of wannacry threat: Ransomware attack 2017, vol. 5 (2017)","key":"7_CR20"},{"unstructured":"Grosse, K., et al.: Adversarial perturbations against deep neural networks for malware classification. arXiv preprint arXiv:1606.04435 (2016)","key":"7_CR21"},{"doi-asserted-by":"crossref","unstructured":"Dang, H., Huang, Y., Chang, E.C.: Evading classifiers by morphing in the dark. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017)","key":"7_CR22","DOI":"10.1145\/3133956.3133978"},{"key":"7_CR23","doi-asserted-by":"publisher","first-page":"133717","DOI":"10.1109\/ACCESS.2023.3334645","volume":"11","author":"RM Arif","year":"2023","unstructured":"Arif, R.M., et al.: A deep reinforcement learning framework to evade black-box machine learning based IoT malware detectors using GAN-generated influential features. IEEE Access 11, 133717\u2013133729 (2023)","journal-title":"IEEE Access"},{"key":"7_CR24","doi-asserted-by":"publisher","first-page":"107506","DOI":"10.1016\/j.asoc.2021.107506","volume":"109","author":"X Peng","year":"2021","unstructured":"Peng, X., et al.: Semantics aware adversarial malware examples generation for black-box attacks. Appl. Soft Comput. 109, 107506 (2021)","journal-title":"Appl. Soft Comput."},{"doi-asserted-by":"crossref","unstructured":"Hu, W., Ying T.: Generating adversarial malware examples for black-box attacks based on GAN. In: International Conference on Data Mining and Big Data. Springer, Singapore (2022)","key":"7_CR25","DOI":"10.1007\/978-981-19-8991-9_29"},{"doi-asserted-by":"crossref","unstructured":"McLaren, R.A.J., Babaagba, K.O., Tan, K.: A generative adversarial network based approach to malware generation based on behavioural graphs. In: International Conference on Machine Learning, Optimization, and Data Science. Springer, Cham (2022)","key":"7_CR26","DOI":"10.1007\/978-3-031-25891-6_4"},{"doi-asserted-by":"crossref","unstructured":"Zhao, J., et al.: Gradient-based adversarial attacks against malware detection by instruction replacement. In: International Conference on Wireless Algorithms, Systems, and Applications. Springer, Cham (2022)","key":"7_CR27","DOI":"10.1007\/978-3-031-19208-1_50"},{"unstructured":"Hu, W., Ying, T.: Black-box attacks against RNN based malware detection algorithms. In: Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence (2018)","key":"7_CR28"},{"issue":"9","key":"7_CR29","first-page":"2126","volume":"42","author":"J Yan","year":"2020","unstructured":"Yan, J., Nie, C., Su, P.: Method for generating malicious code adversarial samples based on genetic algorithm. J. Electron. Inf. Technol. 42(9), 2126\u20132133 (2020)","journal-title":"J. Electron. Inf. Technol."},{"key":"7_CR30","doi-asserted-by":"publisher","first-page":"103279","DOI":"10.1016\/j.cose.2023.103279","volume":"130","author":"K Li","year":"2023","unstructured":"Li, K., et al.: GAMBD: generating adversarial malware against MalConv. Comput. Secur. 130, 103279 (2023)","journal-title":"Comput. Secur."},{"key":"7_CR31","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.1109\/TIFS.2023.3333567","volume":"19","author":"D Zhan","year":"2023","unstructured":"Zhan, D., et al.: MalPatch: DNN-based malware detection with adversarial patches. IEEE Trans. Inf. Forensics Secur. 19, 1183\u20131198 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR32","doi-asserted-by":"publisher","first-page":"102762","DOI":"10.1016\/j.cose.2022.102762","volume":"119","author":"Y Qiao","year":"2022","unstructured":"Qiao, Y., et al.: Adversarial malware sample generation method based on the prototype of deep learning detector. Comput. Secur. 119, 102762 (2022)","journal-title":"Comput. Secur."},{"unstructured":"Wei, S., et al.: Mab-malware: a reinforcement learning framework for BlackBox generation of adversarial malware. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security (2022)","key":"7_CR33"},{"unstructured":"Anderson, H.S., et al.: Learning to evade static PE machine learning malware models via reinforcement learning. arXiv preprint arXiv:1801.08917 (2018)","key":"7_CR34"},{"unstructured":"Koza, J.R.: Genetic Programming II: Automatic Discovery of Reusable Subprograms. Cambridge, MA, USA 13(8), 32 (1994)","key":"7_CR35"},{"unstructured":"VirusShare. https:\/\/virusshare.com\/about. Accessed 2 Mar 2024","key":"7_CR36"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94455-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T22:18:17Z","timestamp":1759270697000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94455-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,5]]},"ISBN":["9783031944543","9783031944550"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94455-0_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2025,9,5]]},"assertion":[{"value":"5 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}