{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T14:48:55Z","timestamp":1766587735304,"version":"build-2065373602"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,17]],"date-time":"2020-10-17T00:00:00Z","timestamp":1602892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,17]],"date-time":"2020-10-17T00:00:00Z","timestamp":1602892800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,17]],"date-time":"2020-10-17T00:00:00Z","timestamp":1602892800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,17]]},"DOI":"10.1109\/cisp-bmei51763.2020.9263499","type":"proceedings-article","created":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T22:28:41Z","timestamp":1606343321000},"page":"966-970","source":"Crossref","is-referenced-by-count":7,"title":["Malware Family Classification using LSTM with Attention"],"prefix":"10.1109","author":[{"given":"Qi","family":"Xie","sequence":"first","affiliation":[{"name":"National University of Defense Technology,College of Computer,Changsha,China"}]},{"given":"Yongjun","family":"Wang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,College of Computer,Changsha,China"}]},{"given":"Zhiquan","family":"Qin","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,College of Computer,Changsha,China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.10.004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.007"},{"journal-title":"Ida pro","year":"0","author":"shell","key":"ref12"},{"key":"ref13","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"0","journal-title":"1st International Conference on Learning Representations ICLR 2013 Scottsdale Arizona USA May 2-4 2013 Workshop Track Proceedings"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23492"},{"journal-title":"PyTorch","year":"0","key":"ref15"},{"journal-title":"VirusShare","year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_11"},{"year":"0","key":"ref18","article-title":"virustotal"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2017.8285426"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3365001"},{"key":"ref6","article-title":"Malware detection with LSTM using opcode language","volume":"abs 1906 4593","author":"lu","year":"2019","journal-title":"CoRR"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(14)70531-7"},{"key":"ref7","first-page":"1","article-title":"Behaviour-aware malware classification: Dynamic feature selection","author":"phai","year":"0"},{"journal-title":"AV-TEST","year":"0","key":"ref2"},{"journal-title":"MALWARE","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50127-7_11"}],"event":{"name":"2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","start":{"date-parts":[[2020,10,17]]},"location":"Chengdu, China","end":{"date-parts":[[2020,10,19]]}},"container-title":["2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9263486\/9263487\/09263499.pdf?arnumber=9263499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T16:07:05Z","timestamp":1656346025000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9263499\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,17]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cisp-bmei51763.2020.9263499","relation":{},"subject":[],"published":{"date-parts":[[2020,10,17]]}}}