{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:39:30Z","timestamp":1774021170435,"version":"3.50.1"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Artificial Intelligence for Automating Response to Threats from the Ministry of Business Innovation and Employment MBIE of New Zealand","award":["MAUX1912"],"award-info":[{"award-number":["MAUX1912"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3024991","type":"journal-article","created":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T20:17:42Z","timestamp":1600460262000},"page":"171542-171550","source":"Crossref","is-referenced-by-count":31,"title":["Multi-Loss Siamese Neural Network With Batch Normalization Layer for Malware Detection"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0682-1796","authenticated-orcid":false,"given":"Jinting","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Julian","family":"Jang-Jaccard","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1399-7175","authenticated-orcid":false,"given":"Paul A.","family":"Watters","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178304"},{"key":"ref11","article-title":"Smooth loss functions for deep top-k classification","author":"berrada","year":"2018","journal-title":"arXiv 1802 07595"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0803-6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/72.279188"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-2071"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462596"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5104-0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.151"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2004.1326587"},{"key":"ref19","first-page":"1","article-title":"Siamese neural networks for one-shot image recognition","volume":"2","author":"koch","year":"2015","journal-title":"Proc ICML Deep Learn Workshop"},{"key":"ref4","first-page":"1","article-title":"Malware detection by eating a whole EXE","author":"raff","year":"2018","journal-title":"Proc 32nd AAAI Conf Artif Intell"},{"key":"ref3","first-page":"1","article-title":"Deep convolutional malware classifiers can learn from raw executables and labels only","author":"kr?\u00e1l","year":"2018","journal-title":"Proc ICLR"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553214"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2789219"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098158"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660352"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2822680"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.09.358"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.12.005"},{"key":"ref21","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","author":"ioffe","year":"2015","journal-title":"arXiv 1502 03167"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CANDARW.2019.00075"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"2062","DOI":"10.1049\/el:19981427","article-title":"fast knn classification algorithm based on partial distance search","volume":"34","author":"hwang","year":"1998","journal-title":"Electronics Letters"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2010.8"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472194"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09200528.pdf?arnumber=9200528","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:56:53Z","timestamp":1639771013000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9200528\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3024991","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}