{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:23:17Z","timestamp":1730265797072,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/ijcnn.2019.8852066","type":"proceedings-article","created":{"date-parts":[[2019,9,30]],"date-time":"2019-09-30T23:44:32Z","timestamp":1569887072000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Spatial-Temporal Attention Network for Malware Detection Using Micro-architecture Features"],"prefix":"10.1109","author":[{"given":"Fang","family":"li","sequence":"first","affiliation":[]},{"given":"Jinrong","family":"Han","sequence":"additional","affiliation":[]},{"given":"Ziyuan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Meng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2018","key":"ref38","article-title":"Sourceforge"},{"year":"2018","key":"ref33","article-title":"Virustotal"},{"year":"2018","key":"ref32","article-title":"Virusshare"},{"year":"2013","key":"ref31","article-title":"Heaven vx malware collection"},{"article-title":"Tensorflow: Large-scale machine learning on heterogeneous distributed systems","year":"2016","author":"abadi","key":"ref30"},{"journal-title":"Long short term memory","year":"2012","author":"graves","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/72.554195"},{"year":"2019","key":"ref35","article-title":"Waffles"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"ref10","article-title":"Dynamic malware detection using registers values set analysis","author":"ghiasi","year":"2013","journal-title":"International ISC conference on Information security and cryptology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0410"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACT.2010.33"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.34"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2789219"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485970"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00251"},{"article-title":"Adversarial examples on discrete sequences for beating whole-binary malware detection","year":"2018","author":"kreuk","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169424"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403019"},{"article-title":"Squeeze-and-excitation networks","year":"2017","author":"hu","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.04.019"},{"key":"ref6","first-page":"1325","article-title":"Research on the classification model of similarity malware using fuzzy hash","volume":"22","author":"park","year":"2012","journal-title":"Journal of the Korea Institute of Information Security and Cryptology"},{"key":"ref29","first-page":"802","article-title":"Convolutional lstm network: A machine learning approach for precipitation nowcasting","author":"shi","year":"2015","journal-title":"International Conference on Neural Information Processing Systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00118"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.26"},{"key":"ref7","article-title":"The software similarity problem in malware analysis","author":"walenstein","year":"2007","journal-title":"Dagstuhl Seminar Proceedings Schloss Dagstuhl-Leibniz-Zentrum f&#x00FC;r Informatik"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11747-3_3"},{"year":"2018","key":"ref1","article-title":"Av-test"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.007"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2540634"},{"key":"ref21","first-page":"651","article-title":"Malware- aware processors: A framework for efficient online malware detection","author":"ozsoy","year":"2015","journal-title":"IEEE International Symposium on High-Performance Comp Architecture"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.37"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2801858"},{"key":"ref26","first-page":"3e","article-title":"Deconvolution and checkerboard artifacts","volume":"1","author":"odena","year":"2016","journal-title":"Distillation"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.35"}],"event":{"name":"2019 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2019,7,14]]},"location":"Budapest, Hungary","end":{"date-parts":[[2019,7,19]]}},"container-title":["2019 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8840768\/8851681\/08852066.pdf?arnumber=8852066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:55:28Z","timestamp":1658080528000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8852066\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2019.8852066","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]}}}