{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T20:53:52Z","timestamp":1775249632314,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1109\/icc45855.2022.9838295","type":"proceedings-article","created":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T15:37:11Z","timestamp":1660232231000},"page":"2682-2687","source":"Crossref","is-referenced-by-count":8,"title":["An Incremental Malware Classification Approach Based on Few-Shot Learning"],"prefix":"10.1109","author":[{"given":"Qian","family":"Qiang","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Mian","family":"Cheng","sequence":"additional","affiliation":[{"name":"China National Computer Network Emergency Response Technical Team\/Coordination Center,Beijing,China"}]},{"given":"Yang","family":"Hu","sequence":"additional","affiliation":[{"name":"Haier (Beijing) IC Design Co., Ltd,China"}]},{"given":"Yuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Jiawei","family":"Sun","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Yu","family":"Ding","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Zisen","family":"Qi","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Fei","family":"Jiao","sequence":"additional","affiliation":[{"name":"Huawei Technology Co., Ltd,China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00019"},{"key":"ref11","article-title":"Malware analysis through high-level behavior","author":"deng","year":"2018","journal-title":"11th USENIX Workshop on Cyber Security Experimentation and Test CSET 2018 Co-Located with USENIX Security 2018"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101760"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927552"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/6309243"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162971"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00755"},{"key":"ref17","first-page":"232","article-title":"Infinite mixture prototypes for few-shot learning","volume":"97","author":"allen","year":"2019","journal-title":"ICML 2019"},{"key":"ref18","first-page":"3630","article-title":"Matching networks for one shot learning","author":"vinyals","year":"2016","journal-title":"Annual Conference on Neural Information Processing Systems 2016"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102273"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/659101"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1021\/ci0342472"},{"key":"ref6","article-title":"Unsupervised learning by predicting noise","author":"bojanowski","year":"2017"},{"key":"ref5","first-page":"4171","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","volume":"1","author":"devlin","year":"2019","journal-title":"NAACL HLT 2019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21548-4_38"},{"key":"ref7","first-page":"7759","article-title":"Classification of malware by using structural entropy on convolutional neural networks","author":"gibert","year":"2018","journal-title":"Proceedings of the 30th Innovative Applications of Artificial Intelligence Conference IAAI 2018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101748"},{"key":"ref9","first-page":"751","article-title":"One-shot malware outbreak detection using spatio-temporal isomorphic dynamic features","author":"gondal","year":"2019","journal-title":"Trust-Com\/BigDataSE 2019"},{"key":"ref1","article-title":"Malwarebytes labs releases 2020 state of malware report","author":"labs","year":"0"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"2847","DOI":"10.3390\/app10082847","article-title":"Convprotonet: Deep prototype induction towards better class representation for few-shot malware classification","volume":"10","author":"zhijie","year":"2020","journal-title":"Applied Sciences"},{"key":"ref22","article-title":"Prototypical Networks for Few-shot Learning","author":"snell","year":"0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533759"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00459"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CANDARW.2019.00075"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/info11010051"}],"event":{"name":"ICC 2022 - IEEE International Conference on Communications","location":"Seoul, Korea, Republic of","start":{"date-parts":[[2022,5,16]]},"end":{"date-parts":[[2022,5,20]]}},"container-title":["ICC 2022 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9837954\/9838246\/09838295.pdf?arnumber=9838295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T19:52:13Z","timestamp":1775245933000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9838295\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icc45855.2022.9838295","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]}}}