{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:20:43Z","timestamp":1740100843950,"version":"3.37.3"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T00:00:00Z","timestamp":1658880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T00:00:00Z","timestamp":1658880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100012114","name":"Defence Research and Development Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012114","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,27]]},"DOI":"10.1109\/csr54599.2022.9850345","type":"proceedings-article","created":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T19:35:46Z","timestamp":1660678546000},"page":"22-29","source":"Crossref","is-referenced-by-count":2,"title":["H4rm0ny: A Competitive Zero-Sum Two-Player Markov Game for Multi-Agent Learning on Evasive Malware Generation and Detection"],"prefix":"10.1109","author":[{"given":"Christopher","family":"Molloy","sequence":"first","affiliation":[{"name":"Queen's University,School of Computing,Kingston,Canada"}]},{"given":"Steven H. H.","family":"Ding","sequence":"additional","affiliation":[{"name":"Queen's University,School of Computing,Kingston,Canada"}]},{"given":"Benjamin C. M.","family":"Fung","sequence":"additional","affiliation":[{"name":"McGill University,School of Information Studies,Montreal,Canada"}]},{"given":"Philippe","family":"Charland","sequence":"additional","affiliation":[{"name":"Defence R&amp;D Canada - Valcartier,Mission Critical Cyber Security Section,Quebec,QC,Canada"}]}],"member":"263","reference":[{"article-title":"Efficient competitive self-play policy optimization","year":"2020","author":"zhong","key":"ref10"},{"key":"ref11","article-title":"Reinforcement learning in large discrete action spaces","volume":"abs 1512 7679","author":"dulac-arnold","year":"2015","journal-title":"CoRR"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992699"},{"key":"ref13","article-title":"EMBER: an open dataset for training static PE malware machine learning models","volume":"abs 1804 4637","author":"anderson","year":"2018","journal-title":"CoRR"},{"key":"ref14","article-title":"Automatic generation of adversarial examples for interpreting malware classifiers","volume":"abs 2003 3100","author":"song","year":"2020","journal-title":"CoRR"},{"key":"ref15","article-title":"Trellis networks for sequence modeling","author":"bai","year":"2019","journal-title":"7th International Conference on Learning Representations ICLR 2019"},{"key":"ref16","article-title":"Lightgbm: A highly efficient gradient boosting decision tree","author":"ke","year":"2017","journal-title":"Advances in Neural Information Processing Systems 30 Annual Conference on Neural Information Processing Systems 2017"},{"key":"ref17","first-page":"54","article-title":"Adversarially robust malware detection using monotonic classification","author":"incer","year":"0"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924286"},{"article-title":"Generating adversarial malware examples for black-box attacks based on gan","year":"0","author":"hu","key":"ref19"},{"key":"ref4","article-title":"Learning to evade static PE machine learning malware models via reinforcement learning","volume":"abs 1801 8917","author":"anderson","year":"2018","journal-title":"CoRR"},{"journal-title":"Cylance I Kill You!","year":"2019","key":"ref3"},{"key":"ref6","article-title":"Attacks which do not kill training make adversarial learning stronger","author":"zhang","year":"2020","journal-title":"Proceedings of the 37th International Conference on Machine Learning"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00073"},{"key":"ref8","article-title":"Actor-critic algorithms","author":"konda","year":"1999","journal-title":"Advances in Neural Information Processing Systems 12 [NIPS Conference"},{"key":"ref7","article-title":"Malware detection by eating a whole EXE","volume":"ws 18","author":"raff","year":"2018","journal-title":"The Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence"},{"article-title":"Evasive malware increasing, evading signature-based antivirus solutions","year":"2020","author":"security","key":"ref2"},{"article-title":"A not-so-common cold: Malware statistics in 2021","year":"2021","author":"jovanovi?","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10295"}],"event":{"name":"2022 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2022,7,27]]},"location":"Rhodes, Greece","end":{"date-parts":[[2022,7,29]]}},"container-title":["2022 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9850275\/9850277\/09850345.pdf?arnumber=9850345","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T20:23:04Z","timestamp":1665433384000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9850345\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,27]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/csr54599.2022.9850345","relation":{},"subject":[],"published":{"date-parts":[[2022,7,27]]}}}