{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:23:42Z","timestamp":1751091822572,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/bigdata47090.2019.9005540","type":"proceedings-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T01:05:34Z","timestamp":1582592734000},"page":"1601-1606","source":"Crossref","is-referenced-by-count":6,"title":["A King\u2019s Ransom for Encryption: Ransomware Classification using Augmented One-Shot Learning and Bayesian Approximation"],"prefix":"10.1109","author":[{"given":"Amir","family":"Atapour-Abarghouei","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Bonner","sequence":"additional","affiliation":[]},{"given":"Andrew Stephen","family":"McGough","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1050","article-title":"Dropout as a Bayesian approximation: Representing model uncertainty in deep learning","author":"gal","year":"2016","journal-title":"Int Conf Machine Learning"},{"key":"ref11","first-page":"3581","article-title":"Concrete dropout","author":"gal","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref12","first-page":"2575","article-title":"Variational dropout and the local reparameterization trick","author":"kingma","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref13","article-title":"Variational Bayesian dropout: Pitfalls and fixes","author":"hron","year":"2018","journal-title":"arXiv preprint arXiv 1807 01969"},{"key":"ref14","article-title":"JACKSTRAWS: Picking command and control connections from Bot traffic","author":"jacob","year":"2011","journal-title":"USENIX Security Symposium"},{"journal-title":"Heldroid Fast and Efficient Linguistic-Based Ran-somware Detection","year":"2015","author":"andronio","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8125850"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.79"},{"key":"ref19","article-title":"Siamese neural networks for one-shot image recognition","volume":"2","author":"koch","year":"2015","journal-title":"Proc Int'l Conf Machine Learning Workshop"},{"key":"ref4","article-title":"SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and 0.5 MB model size","author":"iandola","year":"2016","journal-title":"arXiv preprint arXiv 1602 07360"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"ref7","first-page":"116","article-title":"ShuffleNet v2: Practical guidelines for efficient CNN architecture design","author":"ma","year":"2018","journal-title":"Euro Conf Computer Vision"},{"key":"ref2","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2014","journal-title":"arXiv preprint arXiv 1409 1556"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.634"},{"key":"ref1","first-page":"242","article-title":"Extinguishing ransomware - A hybrid approach to Android ransomware detection","author":"ferrante","year":"2017","journal-title":"The 10th Int Symp on Foundations Practice of Security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00874"},{"key":"ref22","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"J Machine Learning Research"},{"key":"ref21","first-page":"5574","article-title":"What uncertainties do we need in Bayesian deep learning for computer vision?","author":"kendall","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref24","first-page":"1","article-title":"Automatic differentiation in PyTorch","author":"paszke","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref23","first-page":"207","article-title":"Deep Gaussian processes","author":"damianou","year":"2013","journal-title":"Artificial Intelligence and Statistics"},{"key":"ref25","first-page":"1","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"Proc Int Conf Learning Representations"}],"event":{"name":"2019 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2019,12,9]]},"location":"Los Angeles, CA, USA","end":{"date-parts":[[2019,12,12]]}},"container-title":["2019 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8986695\/9005444\/09005540.pdf?arnumber=9005540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:53:13Z","timestamp":1658080393000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9005540\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/bigdata47090.2019.9005540","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}