{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T14:49:24Z","timestamp":1751899764029},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/iwcmc48107.2020.9148289","type":"proceedings-article","created":{"date-parts":[[2020,7,27]],"date-time":"2020-07-27T21:58:05Z","timestamp":1595887085000},"source":"Crossref","is-referenced-by-count":16,"title":["LGMal: A Joint Framework Based on Local and Global Features for Malware Detection"],"prefix":"10.1109","author":[{"given":"Yuhan","family":"Chai","sequence":"first","affiliation":[]},{"given":"Jing","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Shen","family":"Su","sequence":"additional","affiliation":[]},{"given":"Chunsheng","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Lihua","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Zhihong","family":"Tian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2018.8659358"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.04.092"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8852469"},{"key":"ref13","first-page":"1","article-title":"Malware classification using API system calls","author":"ninyesiga","year":"2018","journal-title":"International Journal of Technology and Management"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IESYS.2017.8233569"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178304"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50127-7_11"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.151"},{"key":"ref18","first-page":"99","article-title":"ASSCA: API sequence and statistics features combined architecture for malware detection","author":"lu","year":"2019","journal-title":"Computer Networks"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8195395"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2940742"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487459"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33017370"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2943906"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2951620"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2962914"},{"key":"ref5","author":"yen","year":"2019","journal-title":"Integration of Static and Dynamic Analysis for Malware Family Classification with Composite Neural Network"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00022"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11747-3_3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5220\/0007701407190726"},{"key":"ref1","article-title":"Automatic Concept Extraction based on Semantic Graphs from Big Data in Smart City","author":"qiu","year":"2019","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"ref20","article-title":"Malware detection by eating a whole exe","author":"raff","year":"0","journal-title":"Workshops at the Thirtieth AAAI Conference on Artificial Intelligence"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357820"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/522"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2935152"},{"key":"ref26","author":"kipf","year":"2016","journal-title":"Semi-supervised classification with graph convolutional networks"},{"key":"ref25","author":"yu","year":"2015","journal-title":"Multi-scale context aggregation by dilated convolutions"}],"event":{"name":"2020 International Wireless Communications and Mobile Computing (IWCMC)","location":"Limassol, Cyprus","start":{"date-parts":[[2020,6,15]]},"end":{"date-parts":[[2020,6,19]]}},"container-title":["2020 International Wireless Communications and Mobile Computing (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9142627\/9148048\/09148289.pdf?arnumber=9148289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:50:55Z","timestamp":1656453055000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9148289\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/iwcmc48107.2020.9148289","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}