{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:41:04Z","timestamp":1740148864545,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"9-10","license":[{"start":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T00:00:00Z","timestamp":1638403200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T00:00:00Z","timestamp":1638403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s12243-021-00899-z","type":"journal-article","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T00:03:41Z","timestamp":1638403421000},"page":"663-675","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A study on robustness of malware detection model"],"prefix":"10.1007","volume":"77","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8768-8033","authenticated-orcid":false,"given":"Wanjia","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Kazumasa","family":"Omote","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,12,2]]},"reference":[{"key":"899_CR1","doi-asserted-by":"publisher","unstructured":"Prasad R, Rohokale V (2020) Artificial intelligence and machine learning in cyber security. In: Cyber Security: The Lifeline of Information and Communication Technology. Springer Series in Wireless Technology. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-31703-4_16","DOI":"10.1007\/978-3-030-31703-4_16"},{"key":"899_CR2","unstructured":"Ashkenazy A, Zini s (2019) Cylance, I Kill You!. https:\/\/skylightcyber.com\/2019\/07\/18\/cylance-i-kill-you\/, Accessed 20 Oct 2020"},{"key":"899_CR3","unstructured":"Ero C (2017) pefile. https:\/\/github.com\/erocarrera\/pefile. Accessed 18 June 2021"},{"key":"899_CR4","doi-asserted-by":"publisher","unstructured":"Symons CT, Beaver JM (2012) Nonparametric semi-supervised learning for network intrusion detection: combining performance improvements with realistic in-situ training. Proceedings of the 5th ACM workshop on Security and artificial intelligence. https:\/\/doi.org\/10.1145\/2381896.2381905","DOI":"10.1145\/2381896.2381905"},{"key":"899_CR5","doi-asserted-by":"publisher","unstructured":"Nisa M, Shah J, Kanwal S, Raza M, Khan M, Damasevicius R, Blazauskas T (2020) Hybrid malware classification method using segmentation-based fractal texture analysis and deep convolution neural network features. Applied Sciences. p 10, https:\/\/doi.org\/10.3390\/app10144966","DOI":"10.3390\/app10144966"},{"key":"899_CR6","doi-asserted-by":"publisher","unstructured":"Guzella TS, Caminhas WM (2009) A review of machine learning approaches to spam filtering. Expert Systems with Applications: An International Journal. https:\/\/doi.org\/10.1016\/j.eswa.2009.02.037","DOI":"10.1016\/j.eswa.2009.02.037"},{"key":"899_CR7","unstructured":"Borgolte K, Kruegel C, Vigna G (2015) Detecting website defacements through image-based object recognition. Proceedings of the 24th USENIX Security Symposium, pp 595\u2013610"},{"key":"899_CR8","doi-asserted-by":"publisher","unstructured":"Raff E, Sylvester J, Nichozla C (2017) Learning the pe header, malware detection with minimal domain knowledge. Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security. https:\/\/doi.org\/10.1145\/3128572.3140442","DOI":"10.1145\/3128572.3140442"},{"key":"899_CR9","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. International Conference on Learning Representations (ICLR)"},{"key":"899_CR10","doi-asserted-by":"publisher","unstructured":"Bekerman D, Shapira B, Rokach L, Bar A (2015) Unknown malware detection using network traffic classification. IEEE Conference on Communications and Network Security. https:\/\/doi.org\/10.1109\/CNS.2015.7346821","DOI":"10.1109\/CNS.2015.7346821"},{"key":"899_CR11","doi-asserted-by":"publisher","first-page":"344","DOI":"10.3390\/e23030344","volume":"23","author":"J Hemalatha","year":"2021","unstructured":"Hemalatha J, Roseline A, Geetha S, Kadry S, Damasevicius R (2021) An efficient DenseNet-based deep learning model for malware detection. Entropy 23:344. https:\/\/doi.org\/10.3390\/e23030344","journal-title":"Entropy"},{"key":"899_CR12","unstructured":"Papernot N, McDaniel P, Goodfellow IJ (2016) Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. arXiv preprint arXiv:1605.07277"},{"key":"899_CR13","doi-asserted-by":"publisher","unstructured":"Liu X, Lin Y, Li H, Zhang J (2019) ATMPA: attacking machine learning-based malware visualization detection methods via adversarial examples. 2019 IEEE\/ACM 27th International Symposium on Quality of Service (IWQoS). https:\/\/doi.org\/10.1145\/3326285.3329073","DOI":"10.1145\/3326285.3329073"},{"key":"899_CR14","unstructured":"Grosse K, Manoharan P, Papernot N, Backes M, McDaniel P (2017) On the (statistical) detection of adversarial examples. arXiv preprint arXiv:1702.06280"},{"key":"899_CR15","doi-asserted-by":"publisher","first-page":"485","DOI":"10.3390\/electronics10040485","volume":"10","author":"R Damasevicius","year":"2021","unstructured":"Damasevicius R, Ven\u010dkauskas A, Toldinas J, Grigaliunas Ss (2021) Ensemble-based classification using neural networks and machine learning models for windows PE malware detection. Electronics 10:485. https:\/\/doi.org\/10.3390\/electronics10040485","journal-title":"Electronics"},{"key":"899_CR16","doi-asserted-by":"publisher","unstructured":"Xu W, Evans D, Qi Y (2018) Feature squeezing. Detecting adversarial examples in deep neural networks. Network and Distributed Systems Security Symposium (NDSS. https:\/\/doi.org\/10.14722\/ndss.2018.23198","DOI":"10.14722\/ndss.2018.23198"},{"key":"899_CR17","unstructured":"Goodfellow I, Shlens J, Szegedy C. (2014) Explaining and harnessing adversarial examples. arXiv:1412.6572"},{"key":"899_CR18","unstructured":"Ganchev K, Dredze M (2008) Small statistical models by random feature mixing. Proceedings of the ACL-08:, HLT Workshop on Mobile Language Processing, pp 19\u201320"},{"key":"899_CR19","doi-asserted-by":"publisher","unstructured":"Senzaki Y, Ohata S, Matsuura Ks (2020) Black-box attack for deep neural networks with efficient generation of adversarial examples special section on security, privacy. Anonymity and Trust in Cyberspace Computing and Communications. https:\/\/doi.org\/10.1587\/transinf.2019INP0002","DOI":"10.1587\/transinf.2019INP0002"},{"key":"899_CR20","doi-asserted-by":"publisher","unstructured":"Nitin BA, Cullina D, Sitawarin B, Mittal P (2018) Enhancing robustness of machine learning systems via data transformations. 2018 52nd Annual Conference on Information Sciences and Systems (CISS). https:\/\/doi.org\/10.1109\/ciss.2018.8362326","DOI":"10.1109\/ciss.2018.8362326"},{"key":"899_CR21","doi-asserted-by":"publisher","unstructured":"Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. Proceedings of IEEE Symposium on Security and Privacy (SP). https:\/\/doi.org\/10.1109\/SP.2017.49","DOI":"10.1109\/SP.2017.49"},{"key":"899_CR22","unstructured":"Raff E, Barker J, Sylvester J, Brandon R, Catanzaro B, Nicholas C (2018) Malware detection by eating a whole EXE. The Workshops of the Thirty-Second AAAI Conference on Artificial Intelligence, pp 268\u2013276"},{"key":"899_CR23","unstructured":"Takata Y, Terada M, Matsuki T, Kasama T, Araki S, Hatada M (2018) Datasets for anti-malware research MWS datasets 2018 . Information processing society of japan. Vol.2018-CSEC-82, 38"},{"key":"899_CR24","doi-asserted-by":"publisher","unstructured":"Grosse K, Papernot N, Manoharan P, Backes M, McDaniel P (2017) Adversarial examples for malware detection. European Symposium on Research in Computer Security. https:\/\/doi.org\/10.1007\/978-3-319-66399-9_4","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"899_CR25","unstructured":"Anderson HS, Kharkar A, Filar B, Roth P (2017) Evading machine learning malware detection. Black Hat"},{"key":"899_CR26","doi-asserted-by":"publisher","unstructured":"Demetrio L, Battista B, Giovanni L, Fabio R, Alessandro A (2020) Efficient black-box optimization of adversarial Windows malware with Constrained Manipulations. Computing Research Repository (CoRR). https:\/\/doi.org\/10.1109\/TIFS.2021.3082330","DOI":"10.1109\/TIFS.2021.3082330"},{"key":"899_CR27","doi-asserted-by":"publisher","unstructured":"Jolliffe I (2005) Principal component analysis. In: Encyclopedia of Statistics in Behavioral Science (eds B.S. Everitt and D.C. Howell). https:\/\/doi.org\/10.1002\/0470013192.bsa501","DOI":"10.1002\/0470013192.bsa501"},{"key":"899_CR28","doi-asserted-by":"publisher","unstructured":"Xanthopoulos P, Pardalos PM, Trafalis TB (2013) Linear discriminant analysis. Robust Data Mining. SpringerBriefs in Optimization. Springer. https:\/\/doi.org\/10.1007\/978-1-4419-9878-1_4","DOI":"10.1007\/978-1-4419-9878-1_4"},{"key":"899_CR29","unstructured":"Angus J (2020) Resource Hacker. http:\/\/www.angusj.com\/resourcehacker. Accessed 26 August 2021"},{"key":"899_CR30","unstructured":"Romain T (2017) LIEF Library to Instrument Executable Formats. https:\/\/lief.quarkslab.com. Accessed 26 August 2021"},{"key":"899_CR31","doi-asserted-by":"publisher","unstructured":"Zheng W, Omote K (2021) Robust detection model for portable execution malware. IEEE International Conference on Communications. https:\/\/doi.org\/10.1109\/ICC42927.2021.9500440","DOI":"10.1109\/ICC42927.2021.9500440"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-021-00899-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-021-00899-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-021-00899-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T07:46:09Z","timestamp":1664005569000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-021-00899-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,2]]},"references-count":31,"journal-issue":{"issue":"9-10","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["899"],"URL":"https:\/\/doi.org\/10.1007\/s12243-021-00899-z","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2021,12,2]]},"assertion":[{"value":"22 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}