{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:37:55Z","timestamp":1772642275982,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/icaiic.2019.8669079","type":"proceedings-article","created":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T22:03:36Z","timestamp":1553205816000},"page":"040-045","source":"Crossref","is-referenced-by-count":37,"title":["Improved MalGAN: Avoiding Malware Detector by Leaning Cleanware Features"],"prefix":"10.1109","author":[{"given":"Masataka","family":"Kawai","sequence":"first","affiliation":[]},{"given":"Kaoru","family":"Ota","sequence":"additional","affiliation":[]},{"given":"Mianxing","family":"Dong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"2018","journal-title":"keras-dcgan"},{"key":"ref11","article-title":"Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks","author":"radford","year":"2015","journal-title":"arXiv 1511 06434"},{"key":"ref12","article-title":"Datasets for Anti-Malware Research MWS Datasets 2018","volume":"2018 csec 82","author":"takata","year":"2018","journal-title":"Information Processing Society of Japan"},{"key":"ref13","year":"2018","journal-title":"Introduction of FFRI2018dataset"},{"key":"ref14","article-title":"Auto-Encoding Variational Bayes","author":"kingma","year":"2014","journal-title":"arXiv 1312 6114"},{"key":"ref4","first-page":"1310","article-title":"Simple Black-Box Adversarial Perturbations for Deep Networks","author":"narodytska","year":"2017","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)"},{"key":"ref3","year":"2018","journal-title":"FFRI yarai"},{"key":"ref6","article-title":"Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN","author":"hu","year":"2017","journal-title":"arXiv preprint arXiv 1702 05983"},{"key":"ref5","first-page":"601","article-title":"Stealing Machine Learning Models via Prediction APIs","author":"tramer","year":"2016","journal-title":"25th USENIX Security Symposium"},{"key":"ref8","year":"2018","journal-title":"Malware-GAN"},{"key":"ref7","first-page":"2672","article-title":"Generative Adversarial Nets","author":"goodfellow","year":"2014","journal-title":"NIPS 2014"},{"key":"ref2","first-page":"156","article-title":"Comparative Evaluation of Online Machine Learning Algorithm for Behavior Based Malware Detection","volume":"34","author":"nakamura","year":"2017","journal-title":"J-STAGE computer software"},{"key":"ref1","year":"2018","journal-title":"McAfee Labs Threat Report March 2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"}],"event":{"name":"2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","location":"Okinawa, Japan","start":{"date-parts":[[2019,2,11]]},"end":{"date-parts":[[2019,2,13]]}},"container-title":["2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8665865\/8668840\/08669079.pdf?arnumber=8669079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T23:12:27Z","timestamp":1657840347000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8669079\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icaiic.2019.8669079","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}