{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T05:07:54Z","timestamp":1737176874768,"version":"3.33.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825223","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"5656-5663","source":"Crossref","is-referenced-by-count":0,"title":["Towards Building Generalizable Models for Malware Detection"],"prefix":"10.1109","author":[{"given":"Jihoon","family":"Shin","sequence":"first","affiliation":[{"name":"The University of Texas at El Paso,Department of Computer Science,El Paso,USA"}]},{"given":"Emilia","family":"Rivas","sequence":"additional","affiliation":[{"name":"The University of Texas at El Paso,Department of Computer Science,El Paso,USA"}]},{"given":"Daniel","family":"Lucio","sequence":"additional","affiliation":[{"name":"The University of Texas at El Paso,Department of Computer Science,El Paso,USA"}]},{"given":"Aritran","family":"Piplai","sequence":"additional","affiliation":[{"name":"The University of Texas at El Paso,Department of Computer Science,El Paso,USA"}]},{"given":"Lavanya","family":"Elluri","sequence":"additional","affiliation":[{"name":"Texas A &amp; M University Central Texas,Department of Computer Information Systems,Killeen,USA"}]}],"member":"263","reference":[{"article-title":"Ember: an open dataset for training static pe malware machine learning models","year":"2018","author":"Anderson","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.61"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/17460441.2021.1901685"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102526"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3168794"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-08760-8_33"},{"key":"ref7","first-page":"1126","article-title":"Model-agnostic meta-learning for fast adaptation of deep networks","volume-title":"Proceedings of the 34th International Conference on Machine Learning (ICML)","volume":"70","author":"Finn"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3664806"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102691"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533759"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62223-7_5"},{"article-title":"Deep learning for malware detection: A systematic review","year":"2016","author":"Kolosnjaji","key":"ref12"},{"key":"ref13","first-page":"1620","article-title":"Deep learning for malware classification and analysis","volume-title":"Proceedings of the International Joint Conference on Neural Networks (IJCNN)","author":"Schatz"},{"key":"ref14","first-page":"173","article-title":"A deep learning approach for malware classification based on static and dynamic analysis","volume-title":"Proceedings of the 2018 International Conference on Cyberworlds (CW)","author":"Cai"},{"key":"ref15","first-page":"126","article-title":"Malware detection using ensemble learning techniques","volume-title":"Proceedings of the International Conference on Machine Learning and Cybernetics (ICMLC)","author":"Yang"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2023.2270457"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3286344"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2019.00053"},{"key":"ref19","first-page":"143","article-title":"Deep learning for malware detection using api call sequences","volume-title":"Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration (IRI)","author":"Zhang"},{"key":"ref20","first-page":"1","article-title":"Malware detection using recurrent neural networks","volume-title":"Proceedings of the 2019 4th International Conference on Computing, Communications and Networking Technologies (ICCCNT)","author":"Rathore"},{"key":"ref21","first-page":"1","article-title":"Adaptive adversarial attacks on malware detectors","volume-title":"Proceedings of the 2020 IEEE European Symposium on Security and Privacy (EuroSP)","author":"Tramer"},{"key":"ref22","first-page":"920","article-title":"Domain adaptation for malware classification: A survey","volume-title":"2021 ACM SIGSAC Conference on Computer and Communications Security","author":"Jones"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9378491"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA55696.2022.00213"},{"article-title":"Offline rl+ ckg: A hybrid ai model for cybersecurity tasks","volume-title":"Proceedings of the AAAI 2023 Spring Symposium on Challenges Requiring the Combination of Machine Learning and Knowledge Engineering (AAAI-MAKE 2023)","author":"Piplai","key":"ref25"},{"key":"ref26","first-page":"8809","article-title":"Meta-learning for generalizable models in cybersecurity","volume-title":"Proceedings of the 35th Conference on Neural Information Processing Systems (NeurIPS)","author":"Lee"},{"article-title":"Avast-ctu public cape dataset","year":"2022","author":"Bosansky","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2019.8806511"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5555\/3294996.3295163"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00131"},{"article-title":"Leveraging large language models for behavior-based malware detection using deep learning","year":"2024","author":"Akinsowon","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00020"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i11.17131"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557533"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","start":{"date-parts":[[2024,12,15]]},"location":"Washington, DC, USA","end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825223.pdf?arnumber=10825223","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T07:54:21Z","timestamp":1737100461000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825223\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825223","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}