{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:02:11Z","timestamp":1730232131743,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/icc42927.2021.9500440","type":"proceedings-article","created":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T20:49:21Z","timestamp":1628282961000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Robust Detection Model for Portable Execution Malware"],"prefix":"10.1109","author":[{"given":"Wanjia","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Kazumasa","family":"Omote","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples","year":"2016","author":"papernot","key":"ref10"},{"key":"ref11","article-title":"Adversarial Examples: Attacks on Machine Learning-based Malware Visualization Detection Methods","author":"liu","year":"2018","journal-title":"IEEE Manuscript"},{"article-title":"On the (Statistical) Detection of Adversarial Examples","year":"2017","author":"grosse","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23198"},{"key":"ref14","article-title":"Small statistical models by random feature mixing","author":"ganchev","year":"2008","journal-title":"Proc ACL08 HLT Workshop on Mobile Language Processing"},{"key":"ref15","article-title":"Black-box Attack for Deep Neural Networks with Efficient Generation of Adversarial Examples","author":"senzaki","year":"2018","journal-title":"SCIS"},{"article-title":"Enhancing Robustness of Machine Learning Systems via Data Transformations","year":"2017","author":"nitin bhagoji","key":"ref16"},{"key":"ref17","first-page":"268","article-title":"Malware Detection by Eating a Whole EXE","year":"2018","journal-title":"Thirty-Second AAAI Conference on Artificial Intelligence"},{"key":"ref18","article-title":"Datasets for Anti-Malware Research MWS Datasets 2018","volume":"2018 csec 82","author":"takata","year":"2018","journal-title":"Information Processing Society of Japan"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.02.037"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2381896.2381905"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140442"},{"key":"ref5","first-page":"595","article-title":"Detecting website defacements through image-based object recognition","author":"borgolte","year":"2015","journal-title":"24th USENIX Security Symp"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346821"},{"key":"ref7","article-title":"Explaining and Harnessing Adversarial Examples","author":"bekerman","year":"2015","journal-title":"ICLR 2015"},{"article-title":"Cylance, I Kill You!","year":"2019","author":"ashkenazy","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31703-4_16"},{"key":"ref9","article-title":"Using surface information from PE files for Static Machine-Learning-Based Malware Detection","author":"mogi","year":"2019","journal-title":"SCIS"},{"journal-title":"Evading machine learning malware detection","year":"2017","author":"anderson","key":"ref20"}],"event":{"name":"ICC 2021 - IEEE International Conference on Communications","start":{"date-parts":[[2021,6,14]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2021,6,23]]}},"container-title":["ICC 2021 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9500243\/9500244\/09500440.pdf?arnumber=9500440","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:48:40Z","timestamp":1652197720000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9500440\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icc42927.2021.9500440","relation":{},"subject":[],"published":{"date-parts":[[2021,6]]}}}