{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T21:13:01Z","timestamp":1775855581198,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319700861","type":"print"},{"value":"9783319700878","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-70087-8_58","type":"book-chapter","created":{"date-parts":[[2017,10,23]],"date-time":"2017-10-23T21:10:19Z","timestamp":1508793019000},"page":"556-564","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":58,"title":["Malware Detection Using Deep Transferred Generative Adversarial Networks"],"prefix":"10.1007","author":[{"given":"Jin-Young","family":"Kim","sequence":"first","affiliation":[]},{"given":"Seok-Jun","family":"Bu","sequence":"additional","affiliation":[]},{"given":"Sung-Bae","family":"Cho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,24]]},"reference":[{"key":"58_CR1","doi-asserted-by":"crossref","unstructured":"Dhammi, A., Singh, M.: Behavior analysis of malware using machine learning. In: IEEE International Conference on Contemporery Computing, pp. 481\u2013486 (2015)","DOI":"10.1109\/IC3.2015.7346730"},{"key":"58_CR2","doi-asserted-by":"crossref","unstructured":"Christodorescum, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics-aware malware detection. In: Security and Privacy, pp. 32\u201346 (2005)","DOI":"10.1109\/SP.2005.20"},{"key":"58_CR3","doi-asserted-by":"crossref","unstructured":"Nataraj, L., Karthikeyanm, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classification. In: Proceedings of the Conference on Visualizing for Cyber Security, p. 4 (2011)","DOI":"10.1145\/2016904.2016908"},{"key":"58_CR4","doi-asserted-by":"crossref","unstructured":"Kong, D., Guanhua, Y.: Discriminant malware distance learning on structural information for automated malware classification. In: Proceedings of the Conference on Knowledge Discovery and Datamining, pp. 1357\u20131365 (2013)","DOI":"10.1145\/2487575.2488219"},{"key":"58_CR5","doi-asserted-by":"crossref","unstructured":"Pascanu, R., Stokes, J.W., Sanossian, H., Marinescu, M., Thomas, A.: Malware classification with recurrent network. In: Acoustics, Speech and Signal Processing, pp. 1916\u20131920 (2015)","DOI":"10.1109\/ICASSP.2015.7178304"},{"key":"58_CR6","doi-asserted-by":"crossref","unstructured":"Akritidis, P., Kostas, A., Evangelos, M.P.: Efficient content-based detection of zero-day worms. In: Communications, vol. 2, pp. 837\u2013843 (2005)","DOI":"10.1109\/ICC.2005.1494469"},{"key":"58_CR7","doi-asserted-by":"crossref","unstructured":"Grace, M., Zhou, Y., Zhang, Q., Zou, S., Jiang, X.: RiskRanker: scalable and accurate zero-day android malware detection. In: Proceedings of the Conference on Mobile Systems, Applications, and Services, pp. 281\u2013294 (2012)","DOI":"10.1145\/2307636.2307663"},{"key":"58_CR8","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirze, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, pp. 2672\u20132680 (2014)"},{"key":"58_CR9","unstructured":"Radford, A., Luke, M., Soumith, C.: Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 (2015)"},{"key":"58_CR10","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/BF00332918","volume":"59","author":"H Bourlard","year":"1988","unstructured":"Bourlard, H., Yves, K.: Auto-association by multilayer perceptrons and singular value decomposition. Biol. Cybern. 59, 291\u2013294 (1988)","journal-title":"Biol. Cybern."},{"key":"58_CR11","doi-asserted-by":"crossref","unstructured":"Lu, X., Matsuda, Y., Hori, C.: Speech enhancement based on deep denoising autoencoder. In: Interspeech, pp. 436\u2013440 (2013)","DOI":"10.21437\/Interspeech.2013-130"},{"key":"58_CR12","unstructured":"Ng, A.: Sparse autoencoder. CS294A Lecture notes, vol. 72, pp. 1\u201319 (2011)"},{"key":"58_CR13","unstructured":"Chandar AP, S., Lauly, S., Larochelle, H., Khapra, M., Ravindran, B., Raykar, C.V., Saha, A.: An autoencoder approach to learning bilingual word representations. In: Advances in Neural Information Processing Systems, pp. 1853\u20131861 (2014)"},{"key":"58_CR14","doi-asserted-by":"crossref","unstructured":"Arnold, A., Nallapati, R., Cohen, W.: A comparative study of methods for transductive transfer learning. In: Proceedings of the IEEE International Conference on Data Mining, pp. 77\u201382 (2007)","DOI":"10.1109\/ICDMW.2007.109"},{"key":"58_CR15","unstructured":"Kaggle: Microsoft Malware Classification Challenge (BIG 2015). https:\/\/www.kaggle.com\/c\/malware-classification. Accessed 4 Nov 2015"},{"key":"58_CR16","doi-asserted-by":"crossref","unstructured":"Zeiler, M., Taylor, G., Fergus, R.: Adaptive deconvolutional networks for mid and high level feature learning. In: IEEE International Conference on Computer Vision, pp. 2018\u20132025 (2011)","DOI":"10.1109\/ICCV.2011.6126474"},{"key":"58_CR17","unstructured":"Lecun, Y., Bengio, Y.: Convolutional networks for images, speech, and time series. In: The Handbook of Brain Theory and Neural Networks, vol. 3361, p. 1995 (1995)"},{"key":"58_CR18","doi-asserted-by":"crossref","unstructured":"Jake, D., Tyler, M., Michael, H.: Polymorphic malware detection using sequence calssification methods. In: Security and Privacy Workshops, pp. 81\u201387 (2016)","DOI":"10.1109\/SPW.2016.30"},{"key":"58_CR19","doi-asserted-by":"crossref","unstructured":"Narayanan, B.N., Djaneye-Boundjou, O., Kebede, T.M.: Performance analysis of machine learning and pattern recognition algorithms for malware classification. In: Aerospace and Electronics Conference and Ohio Innovation Summit, pp. 338\u2013342 (2016)","DOI":"10.1109\/NAECON.2016.7856826"},{"key":"58_CR20","first-page":"2579","volume":"9","author":"L Maaten","year":"2008","unstructured":"Maaten, L., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9, 2579\u20132605 (2008)","journal-title":"J. Mach. Learn. Res."}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-70087-8_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T17:53:49Z","timestamp":1750960429000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-70087-8_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319700861","9783319700878"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-70087-8_58","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"24 October 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iconip2017.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}