{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T01:02:15Z","timestamp":1725411735933},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/icdew.2014.6818308","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:26:37Z","timestamp":1401474397000},"page":"84-89","source":"Crossref","is-referenced-by-count":0,"title":["Reconciling malware labeling discrepancy via consensus learning"],"prefix":"10.1109","author":[{"given":"Ting","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Shicong","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Reiner","family":"Sailer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"A virus by any other name: Towards the revised caro naming convention","author":"fitzgerald","year":"2002","journal-title":"AVAR"},{"journal-title":"Current Status of the Caro Malware Naming Scheme","year":"0","author":"bontchev","key":"2"},{"year":"0","key":"1"},{"key":"10","article-title":"The game of the name malware naming, shape shifters and sympathetic magic","author":"harley","year":"2009","journal-title":"3rd International Conference on Cybercrime Forensics Education &Training"},{"key":"7","article-title":"Power iteration clustering","author":"lin","year":"2010","journal-title":"ICML"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1162\/jmlr.2003.3.4-5.993"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1145\/1190216.1190270","article-title":"A semanticsbased approach to malware detection","author":"preda","year":"2007","journal-title":"POPL"},{"journal-title":"Virus Naming convention1999 (vnc99)","year":"1999","author":"scheidl","key":"4"},{"key":"9","article-title":"Automated classification and analysis of internet malware","author":"bailey","year":"2007","journal-title":"RAID"},{"key":"8","article-title":"A dose by any other name","author":"bureau","year":"2008","journal-title":"Virus Bulletin Conference Proceedings"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(10)70007-5"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25560-1_10"}],"event":{"name":"2014 IEEE 30th International Conference on Data Engineering Workshops (ICDEW)","start":{"date-parts":[[2014,3,31]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2014,4,4]]}},"container-title":["2014 IEEE 30th International Conference on Data Engineering Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6811047\/6816871\/06818308.pdf?arnumber=6818308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T14:06:54Z","timestamp":1498140414000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6818308\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icdew.2014.6818308","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}