{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:40:20Z","timestamp":1756273220476,"version":"3.44.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130150","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"17-22","source":"Crossref","is-referenced-by-count":0,"title":["Evasion of Deep Learning Malware Detection via Adversarial Selective Obfuscation"],"prefix":"10.1109","author":[{"given":"Claudia","family":"Greco","sequence":"first","affiliation":[{"name":"University of Calabria,Department of Mechanical, Energy and Management Engineering,Italy"}]},{"given":"Michele","family":"Ianni","sequence":"additional","affiliation":[{"name":"University of Calabria,Modeling, Electronics and Systems,Department of Computer Engineering,Italy"}]},{"given":"Antonella","family":"Guzzo","sequence":"additional","affiliation":[{"name":"University of Calabria,Modeling, Electronics and Systems,Department of Computer Engineering,Italy"}]},{"given":"Giancarlo","family":"Fortino","sequence":"additional","affiliation":[{"name":"University of Calabria,Modeling, Electronics and Systems,Department of Computer Engineering,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2024.3439884"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CSR57506.2023.10224825"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029222"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2013.6597204"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0242-0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2016.0155"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.04.005"},{"key":"ref9","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv preprint arXiv:1412.6572"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"journal-title":"arXiv preprint arXiv:1706.06083","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00045"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130150.pdf?arnumber=11130150","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:06:01Z","timestamp":1756271161000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130150\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130150","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}