{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:34:31Z","timestamp":1743075271600,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819756629"},{"type":"electronic","value":"9789819756636"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5663-6_4","type":"book-chapter","created":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T01:10:40Z","timestamp":1722474640000},"page":"37-49","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LIFT: Discriminant Classification Approach of Malware Family on Time Consistent Open Set"],"prefix":"10.1007","author":[{"given":"Yuxia","family":"Sun","sequence":"first","affiliation":[]},{"given":"Siyi","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ziying","family":"Huo","sequence":"additional","affiliation":[]},{"given":"Yuqin","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,1]]},"reference":[{"key":"4_CR1","unstructured":"Malware statistics & trends report: Av-test. https:\/\/www.av-test.org\/en\/statistics\/malware"},{"key":"4_CR2","unstructured":"Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J., Cavallaro, L.:{TESSERACT}: eliminating experimental bias in malware classification across space and time. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 729\u2013746 (2019)"},{"issue":"2","key":"4_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3371924","volume":"29","author":"H Cai","year":"2020","unstructured":"Cai, H.: Assessing and improving malware detection sustainability through app evolution studies. ACM Trans. Software Eng. Methodol. 29(2), 1\u201328 (2020)","journal-title":"ACM Trans. Software Eng. Methodol."},{"issue":"4","key":"4_CR4","doi-asserted-by":"publisher","first-page":"4248","DOI":"10.1109\/TNSM.2022.3200866","volume":"19","author":"Y Chai","year":"2022","unstructured":"Chai, Y., Qiu, J., Yin, L., Zhang, L., Gupta, B.B., Tian, Z.: From data and model levels: Improve the performance of few-shot malware classification. IEEE Trans. Network Serv. Manage. 19(4), 4248\u20134261 (2022)","journal-title":"IEEE Trans. Network Serv. Manage."},{"issue":"1","key":"4_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3436751","volume":"22","author":"Y Qiao","year":"2021","unstructured":"Qiao, Y., Zhang, W., Du, X., Guizani, M.: Malware classification based on multilayer perception and word2vec for iot security. ACM Trans. Internet Technol. 22(1), 1\u201322 (2021)","journal-title":"ACM Trans. Internet Technol."},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Wu, B., Xu, Y., Zou, F.: Malware classification by learning semantic and structural features of control flow graphs. In: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 540\u2013547. IEEE (2021)","DOI":"10.1109\/TrustCom53373.2021.00084"},{"issue":"7","key":"4_CR7","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1109\/TPAMI.2012.256","volume":"35","author":"WJ Scheirer","year":"2012","unstructured":"Scheirer, W.J., de Rezende Rocha, A., Sapkota, A., Boult, T.E.: Toward open set recognition. IEEE Trans. Pattern Anal. Mach. Intell. 35(7), 1757\u20131772 (2012)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Hassen, M., Chan, P.K.: Learning a neural-network-based representation for open set recognition. In: Proceedings of the 2020 SIAM International Conference on Data Mining, pp. 154\u2013162. SIAM (2020)","DOI":"10.1137\/1.9781611976236.18"},{"key":"4_CR9","doi-asserted-by":"publisher","unstructured":"Jia, J., Chan, P.K.: Mmf: a loss extension for feature learning in open set recognition. In: Farka\u0161, I., Masulli, P., Otte, S., Wermter, S. (eds) Artificial Neural Networks and Machine Learning \u2013 ICANN 2021. ICANN 2021. LNCS, vol. 12892. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86340-1_26","DOI":"10.1007\/978-3-030-86340-1_26"},{"issue":"2","key":"4_CR10","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TNNLS.2021.3099122","volume":"34","author":"J Guo","year":"2021","unstructured":"Guo, J., Guo, S., Ma, S., Sun, Y., Xu, Y.: Conservative novelty synthesizing net-work for malware recognition in an open-set scenario. IEEE Trans. Neural Networks Learn. Syst. 34(2), 662\u2013676 (2021)","journal-title":"IEEE Trans. Neural Networks Learn. Syst."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Jia, J., Chan, P.K.: Representation learning with function call graph transformations for malware open set recognition. In: 2022 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138. IEEE (2022)","DOI":"10.1109\/IJCNN55064.2022.9892931"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Bendale, A., Boult, T.E.: Towards open set deep networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1563\u20131572 (2016)","DOI":"10.1109\/CVPR.2016.173"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Oza, P., Patel, V.M.: C2ae: class conditioned auto-encoder for open-set recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2307\u20132316 (2019)","DOI":"10.1109\/CVPR.2019.00241"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Kong, S., Ramanan, D.: Opengan: open-set recognition via open data generation. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 813\u2013822 (2021)","DOI":"10.1109\/ICCV48922.2021.00085"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Yue, Z., Wang, T., Sun, Q., Hua, X.S., Zhang, H.: Counterfactual zero-shot and open-set visual recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 15404\u201315414 (2021)","DOI":"10.1109\/CVPR46437.2021.01515"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Fu, X., Cai, H.: On the deterioration of learning-based malware detectors for an-droid. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), pp. 272\u2013273. IEEE (2019)","DOI":"10.1109\/ICSE-Companion.2019.00110"},{"key":"4_CR17","unstructured":"Yang, L., et al.:{CADE}: Detecting and explaining concept drift samples for security applications. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 2327\u20132344 (2021)"},{"key":"4_CR18","volume":"65","author":"C Yuan","year":"2022","unstructured":"Yuan, C., Cai, J., Tian, D., Ma, R., Jia, X., Liu, W.: Towards time evolved malware identification using two-head neural network. J. Inform. Secur. Appl. 65, 103098 (2022)","journal-title":"J. Inform. Secur. Appl."},{"key":"4_CR19","unstructured":"Asano, Y.M., Rupprecht, C., Vedaldi, A.: A critical analysis of self-supervision, or what we can learn from a single image. arXiv preprint arXiv:1904.13132 (2019)"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Liang, Y., Zhu, L., Wang, X., Yang, Y.: A simple episodic linear probe improves visual recognition in the wild. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9559\u20139569 (2022)","DOI":"10.1109\/CVPR52688.2022.00934"},{"key":"4_CR21","unstructured":"Zhu, Y., et al.: Boosting out-of-distribution detection with typical features. Adv. Neural. Inf. Process. Syst. 35, 20758\u201320769 (2022)"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Yang, L., Ciptadi, A., Laziuk, I., Ahmadzadeh, A., Wang, G.: Bodmas: An open dataset for learning based temporal analysis of pe malware. In: 2021 IEEE Security and Privacy Workshops (SPW), pp. 78\u201384. IEEE (2021)","DOI":"10.1109\/SPW53761.2021.00020"},{"key":"4_CR23","unstructured":"VirusTotal. https:\/\/www.virustotal.com\/gui\/home\/upload"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Liu, Z., et al.: Swin transformer: hierarchical vision transformer using shifted windows. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 10012\u201310022 (2021)","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"4_CR25","unstructured":"GitHub-microsoft\/Swin-Transformer. https:\/\/github.com\/microsoft\/Swin-Transformer"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5663-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T01:24:55Z","timestamp":1722475495000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5663-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819756629","9789819756636"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5663-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2024\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}