{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T11:56:18Z","timestamp":1771847778299,"version":"3.50.1"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/ijcnn48605.2020.9207168","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T00:40:33Z","timestamp":1601426433000},"page":"1-10","source":"Crossref","is-referenced-by-count":16,"title":["Generating End-to-End Adversarial Examples for Malware Classifiers Using Explainability"],"prefix":"10.1109","author":[{"given":"Ishai","family":"Rosenberg","sequence":"first","affiliation":[]},{"given":"Shai","family":"Meir","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Berrebi","sequence":"additional","affiliation":[]},{"given":"Ilay","family":"Gordon","sequence":"additional","affiliation":[]},{"given":"Guillaume","family":"Sicard","sequence":"additional","affiliation":[]},{"given":"Eli","family":"Omid David","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/33.3.239"},{"key":"ref32","article-title":"EMBER: an open dataset for training static PE malware machine learning models","volume":"abs 1804 4637","author":"anderson","year":"2018","journal-title":"CoRR"},{"key":"ref31","article-title":"Using explainabilty to detect adversarial attacks","author":"amosy","year":"2020"},{"key":"ref30","article-title":"When explainability meets adversarial learning: Detecting adversarial examples using SHAP signatures","volume":"abs 1909 3418","author":"fidel","year":"2019","journal-title":"CoRR"},{"key":"ref35","article-title":"Please stop explaining black box models for high stakes decisions","volume":"abs 1811 10154","author":"rudin","year":"2018","journal-title":"CoRR"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741088"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130140"},{"key":"ref11","first-page":"31453153","article-title":"Learning important features through propagating activation differences","author":"shrikumar","year":"2017","journal-title":"ICML"},{"key":"ref12","first-page":"4765","article-title":"A unified approach to interpreting model predictions","author":"lundberg","year":"2017","journal-title":"NIPS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243792"},{"key":"ref14","article-title":"Don&#x2019;t paint it black: White-box explanations for deep learning in computer security","volume":"abs 1906 2108","author":"warnecke","year":"2019","journal-title":"CoRR"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23115"},{"key":"ref19","article-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models","author":"brendel","year":"2018","journal-title":"ICLRE"},{"key":"ref28","first-page":"7728","article-title":"Attacks meet interpretability: Attribute-steered detection of adversarial samples","author":"tao","year":"2018","journal-title":"NeurIPS"},{"key":"ref4","first-page":"490","article-title":"Generic blackbox end-to-end attack against state of the art API call based malware classifiers","author":"rosenberg","year":"2018","journal-title":"RAID"},{"key":"ref27","article-title":"Learning to evade static PE machine learning malware models via reinforcement learning","volume":"abs 1801 8917","author":"anderson","year":"2018","journal-title":"CoRR"},{"key":"ref3","article-title":"Transferability in machine learning: from phenomena to black-box attacks using adversarial samples","volume":"abs 1605 7277","author":"papernot","year":"2016"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1228"},{"key":"ref29","article-title":"Is ami (attacks meet interpretability) robust to adversarial examples?","volume":"abs 1902 2322","author":"carlini","year":"2019","journal-title":"CoRR"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.09.053"},{"key":"ref8","article-title":"Towards better understanding of gradient-based attribution methods for deep neural networks","author":"ancona","year":"2018","journal-title":"ICLRE"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"ref2","article-title":"Explaining and Harnessing Adversarial Examples","author":"goodfellow","year":"2015","journal-title":"ICLRE"},{"key":"ref9","first-page":"33193328","article-title":"Axiomatic attribution for deep networks","author":"sundararajan","year":"2017","journal-title":"ICML"},{"key":"ref1","article-title":"Intriguing properties of neural networks","volume":"abs 1312 6199","author":"szegedy","year":"2014"},{"key":"ref20","first-page":"2142","article-title":"Black-box adversarial attacks with limited queries and information","author":"ilyas","year":"2018","journal-title":"ICML"},{"key":"ref22","article-title":"Adversarial examples are not bugs, they are features","author":"ilyas","year":"2019"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref24","first-page":"11","article-title":"Exploring adversarial examples in malware detection","author":"suciu","year":"2018","journal-title":"ALEC"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"ref26","article-title":"Query-efficient black-box attack against sequence-based malware classifiers","volume":"abs 1804 8778","author":"rosenberg","year":"2018","journal-title":"CoRR"},{"key":"ref25","first-page":"268","article-title":"Malware detection by eating a whole EXE","author":"raff","year":"2018","journal-title":"AAAI Workshop"}],"event":{"name":"2020 International Joint Conference on Neural Networks (IJCNN)","location":"Glasgow, United Kingdom","start":{"date-parts":[[2020,7,19]]},"end":{"date-parts":[[2020,7,24]]}},"container-title":["2020 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9200848\/9206590\/09207168.pdf?arnumber=9207168","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:53:04Z","timestamp":1656453184000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9207168\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/ijcnn48605.2020.9207168","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}