{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:11:21Z","timestamp":1770228681952,"version":"3.49.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T00:00:00Z","timestamp":1729555200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T00:00:00Z","timestamp":1729555200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,22]]},"DOI":"10.1109\/isncc62547.2024.10758952","type":"proceedings-article","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T18:45:16Z","timestamp":1732646716000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["An in-Depth Investigation Into the Performance of State-of-the-Art Zero-Shot, Single-Shot, and Few-Shot Learning Approaches on an Out-of-Distribution Zero-Day Malware Attack Detection"],"prefix":"10.1109","author":[{"given":"Tosin","family":"Ige","sequence":"first","affiliation":[{"name":"The University of Texas,Dept. of Computer Science,EI Paso,Texas,USA"}]},{"given":"Christopher","family":"Kiekintveld","sequence":"additional","affiliation":[{"name":"The University of Texas,Dept. of Computer Science,EI Paso,Texas,USA"}]},{"given":"Aritran","family":"Piplai","sequence":"additional","affiliation":[{"name":"The University of Texas,Dept. of Computer Science,EI Paso,Texas,USA"}]},{"given":"Amy","family":"Wagler","sequence":"additional","affiliation":[{"name":"The University of Texas,Dept. of Public Health Science,EI Paso,Texas,USA"}]},{"given":"Olukunle","family":"Kolade","sequence":"additional","affiliation":[{"name":"Office of Naval Research, United State Navy,Pentagon,USA"}]},{"given":"Bolanle","family":"Hafiz Matti","sequence":"additional","affiliation":[{"name":"Office of Network Security, Palo Alto Networks Inc,Texas,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Learning feed-forward one-shot learners","volume":"29","author":"Bertinetto","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"ref2","article-title":"Forecastpfn: Synthetically-trained zero-shot forecasting","volume":"36","author":"Dooley","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref3","first-page":"1126","article-title":"Model-agnostic meta-learning for fast adaptation of deep networks","volume-title":"International conference on machine learning","author":"Finn","year":"2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i6.25942"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/AIBThings58340.2023.10292485"},{"key":"ref6","article-title":"Deep learning-based speech and vision synthesis to improve phishing attack de-tection through a multi-layer adaptive framework","volume-title":"arXiv preprint","author":"Ige","year":"2024"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/eit60633.2024.10609847"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.0140202"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09076-9_20"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01878"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.mattod.2023.03.007"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01472"},{"key":"ref13","first-page":"23103","article-title":"A closer look at few-shot classification again","volume-title":"International Conference on Machine Learning","author":"Luo","year":"2023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"ref15","article-title":"Ambient technology & intelligence","author":"Okomayin","year":"2023","journal-title":"arXiv preprint"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICICACS60521.2024.10498932"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.103589"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3582688"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00049"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v35.i3.pp1653-1660"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101748"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00450"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102273"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01077"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7491"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3073559"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.110216"}],"event":{"name":"2024 International Symposium on Networks, Computers and Communications (ISNCC)","location":"Washington DC, DC, USA","start":{"date-parts":[[2024,10,22]]},"end":{"date-parts":[[2024,10,25]]}},"container-title":["2024 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10758900\/10758934\/10758952.pdf?arnumber=10758952","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T09:41:11Z","timestamp":1732700471000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10758952\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,22]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/isncc62547.2024.10758952","relation":{},"subject":[],"published":{"date-parts":[[2024,10,22]]}}}