{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:06:11Z","timestamp":1750824371435,"version":"3.41.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,5]]},"DOI":"10.1109\/cscwd64889.2025.11033279","type":"proceedings-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T17:24:40Z","timestamp":1750699480000},"page":"1925-1930","source":"Crossref","is-referenced-by-count":0,"title":["DAB-LLM: Detection of Anomalies in API Call Behavior Based on Large Language Model"],"prefix":"10.1109","author":[{"given":"Yue","family":"Zhang","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Fangjiao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Baihang","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Baoxu","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Yuling","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Qixu","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2019.8936216"},{"key":"ref2","first-page":"289","article-title":"From needs to actions to secure apps? the effect of requirements and developer practices on app security","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Weir"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00090"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DeepTest52559.2021.00008"},{"key":"ref5","first-page":"202","article-title":"Ai-driven web api testing","volume-title":"Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering: Companion Proceedings","author":"Martin-Lopez"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"101773","DOI":"10.1016\/j.cose.2020.101773","article-title":"Sub-curve hmm: A malware detection approach based on partial analysis of api call sequences","volume":"92","author":"Suaboot","year":"2020","journal-title":"Computers and Security"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"3979","DOI":"10.1007\/s11042-017-5104-0","article-title":"Android malware detection based on system call sequences and lstm","volume":"78","author":"Xiao","year":"2019","journal-title":"Multimedia Tools and Applications"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1007\/s00500-019-03940-5","article-title":"Deep learning for effective android malware detection using api call graph embeddings","volume":"24","author":"Abdurrahman","year":"2020","journal-title":"Soft Computing"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-44038-1_77","article-title":"Comparing api call sequence algorithms for malware detection","volume-title":"AINA Workshops","author":"Ficco"},{"journal-title":"Improving language understanding by generative pre-training","year":"2018","author":"Radford","key":"ref10"},{"key":"ref11","article-title":"Qwen technical report","author":"Bai","year":"2023","journal-title":"arXiv preprint"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.494"},{"key":"ref13","article-title":"Lora: Low-rank adaptation of large language models","author":"Hu","year":"2021","journal-title":"arXiv preprint"},{"article-title":"Api security: Access behavior anomaly dataset - kaggle","year":"2021","author":"Guntur","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CCGridW59191.2023.00044"}],"event":{"name":"2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2025,5,5]]},"location":"Compiegne, France","end":{"date-parts":[[2025,5,7]]}},"container-title":["2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11033175\/11033221\/11033279.pdf?arnumber=11033279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:40:07Z","timestamp":1750747207000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11033279\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cscwd64889.2025.11033279","relation":{},"subject":[],"published":{"date-parts":[[2025,5,5]]}}}