{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:22:45Z","timestamp":1740100965206,"version":"3.37.3"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61572170"],"award-info":[{"award-number":["61572170"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003787","name":"Natural Science Foundation of Hebei Province","doi-asserted-by":"publisher","award":["F2021205004"],"award-info":[{"award-number":["F2021205004"]}],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003481","name":"Hebei Normal University","doi-asserted-by":"publisher","award":["L2021K06,L072018Z10"],"award-info":[{"award-number":["L2021K06,L072018Z10"]}],"id":[{"id":"10.13039\/501100003481","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,22]]},"DOI":"10.1109\/dsc54232.2022.9888884","type":"proceedings-article","created":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T21:10:18Z","timestamp":1664226618000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["A Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation Method"],"prefix":"10.1109","author":[{"given":"Fangwei","family":"Wang","sequence":"first","affiliation":[{"name":"College of Computer &#x0026; CyberSecurity, Hebei Normal University,Shijiazhuang,China"}]},{"given":"Yuanyuan","family":"Lu","sequence":"additional","affiliation":[{"name":"College of Computer &#x0026; CyberSecurity, Hebei Normal University,Shijiazhuang,China"}]},{"given":"Qingru","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer &#x0026; CyberSecurity, Hebei Normal University,Shijiazhuang,China"}]},{"given":"Changguang","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer &#x0026; CyberSecurity, Hebei Normal University,Shijiazhuang,China"}]},{"given":"Yonglei","family":"Bai","sequence":"additional","affiliation":[{"name":"Dean&#x0027;s Office, Hebei Normal University,Shijiazhuang,China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/s11416-021-00378-y"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/3442381.3450044"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TIA.2019.2958530"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/JSYST.2019.2906120"},{"key":"ref14","article-title":"Learning to evade static PE machine learning malware models via reinforcement learning","author":"anderson","year":"2018","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ACCESS.2019.2908033"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.asoc.2021.107505"},{"key":"ref17","first-page":"37","article-title":"AIMED-RL: Exploring adversarial malware examples with reinforcement learning","author":"castro","year":"0","journal-title":"Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases"},{"key":"ref18","article-title":"MAB-Malware: A reinforcement learning framework for attacking static malware classifiers","author":"song","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref19","article-title":"Generating adversarial malware examples for black-box attacks based on GAN","author":"hu","year":"2017","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/JIOT.2020.2975654"},{"key":"ref27","article-title":"Ember: an open dataset for training static PE malware machine learning models","author":"anderson","year":"2018","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.3390\/informatics8010010"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/s11633-019-1211-x"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/3473039"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TNSE.2021.3051354"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.patrec.2021.04.004"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.3390\/e23030344"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/CEC48606.2020.9185810"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1109\/TETC.2019.2910086","article-title":"Windows malware detector using convolutional neural network based on visualization images","volume":"9","author":"darshan","year":"2021","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"ref20","article-title":"Binary black-box evasion attacks against deep learning-based static malware detectors with adversarial byte-level language model","author":"ebrahimi","year":"2020","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00040"},{"key":"ref21","first-page":"2536","volume":"325","author":"yuan","year":"2020","journal-title":"Black-box adversarial attacks against deep learning based malware binaries detection with GAN"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/INFOMAN.2019.8714698"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TIFS.2021.3082330"},{"key":"ref26","article-title":"Malware detection by eating a whole exe","author":"raff","year":"2018","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/j.asoc.2021.107506"}],"event":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","start":{"date-parts":[[2022,6,22]]},"location":"Edinburgh, United Kingdom","end":{"date-parts":[[2022,6,24]]}},"container-title":["2022 IEEE Conference on Dependable and Secure Computing (DSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9888143\/9888794\/09888884.pdf?arnumber=9888884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T20:55:36Z","timestamp":1665780936000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9888884\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,22]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/dsc54232.2022.9888884","relation":{},"subject":[],"published":{"date-parts":[[2022,6,22]]}}}