{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T07:04:17Z","timestamp":1763535857833,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,7]]},"DOI":"10.1109\/isqed51717.2021.9424330","type":"proceedings-article","created":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T00:09:51Z","timestamp":1620691791000},"page":"85-90","source":"Crossref","is-referenced-by-count":34,"title":["When Machine Learning Meets Hardware Cybersecurity: Delving into Accurate Zero-Day Malware Detection"],"prefix":"10.1109","author":[{"given":"Zhangying","family":"He","sequence":"first","affiliation":[]},{"given":"Tahereh","family":"Miari","sequence":"additional","affiliation":[]},{"given":"Hosein Mohammadi","family":"Makrani","sequence":"additional","affiliation":[]},{"given":"Mehrdad","family":"Aliasgari","sequence":"additional","affiliation":[]},{"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[]},{"given":"Hossein","family":"Sayadi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052999"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3386263.3407585"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715080"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3287624.3288756"},{"key":"ref14","first-page":"397","article-title":"Pyramid: Machine learning framework to estimate the optimal timing and resource usage of a high-level synthesis design","author":"makrani","year":"2019","journal-title":"FPL&#x2019;19"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056070"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196515"},{"key":"ref18","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"arXiv 1412 6572"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-44599-1_11"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465828"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2607-0_1"},{"key":"ref6","first-page":"776","article-title":"Lightweight node-level malware detection and network-level malware confinement in iot networks","author":"dinakarrao","year":"2019","journal-title":"DATE&#x2019;19"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2606384"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485970"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS48704.2020.9184539"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116340"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3418783"},{"key":"ref20","article-title":"Lxc: Linux container tools","author":"helsely","year":"2009","journal-title":"IBM developer Works Technical Library"},{"key":"ref22","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref21","article-title":"Feature selection for knowledge discovery and data mining","volume":"454","author":"liu","year":"2012","journal-title":"Springer Science & Business Media"}],"event":{"name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","start":{"date-parts":[[2021,4,7]]},"location":"Santa Clara, CA, USA","end":{"date-parts":[[2021,4,9]]}},"container-title":["2021 22nd International Symposium on Quality Electronic Design (ISQED)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424228\/9424248\/09424330.pdf?arnumber=9424330","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:41:24Z","timestamp":1652197284000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9424330\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isqed51717.2021.9424330","relation":{},"subject":[],"published":{"date-parts":[[2021,4,7]]}}}