{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:26:46Z","timestamp":1730291206068,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647787","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T21:08:01Z","timestamp":1640120881000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Detection of Induced False Negatives in Malware Samples"],"prefix":"10.1109","author":[{"given":"Adrian","family":"Wood","sequence":"first","affiliation":[]},{"given":"Michael N.","family":"Johnstone","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140451"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.007"},{"journal-title":"Exploring backdoor poisoning attacks against malware classifiers","year":"2020","author":"severi","key":"ref12"},{"journal-title":"On the (statistical) detection of adversarial examples","year":"2017","author":"grosse","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140444"},{"article-title":"Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering","year":"2018","author":"chen","key":"ref15"},{"article-title":"Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection","year":"2018","author":"paudice","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref18","article-title":"Cryptocurrency malware hunting: A deep Recurrent Neural Network approach","volume":"96","author":"abbas","year":"2020","journal-title":"Applied Soft Computing"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106825"},{"key":"ref4","article-title":"TrendMicro Zero Day Malware Scanner","author":"oliver","year":"2013","journal-title":"Tokyo (JP)"},{"journal-title":"How does Symantec Endpoint Protection use advanced machine learning?","year":"2018","key":"ref3"},{"journal-title":"EMBER An open dataset for training static PE malware machine learning models","year":"2018","author":"anderson","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.11.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"journal-title":"2016 Defence White Paper Department of Defence Commonwealth of Australia","year":"0","key":"ref7"},{"key":"ref2","article-title":"A Comparative Study of MLELM and DNN for Intrusion Detection","author":"yang","year":"0","journal-title":"Proc ACSW &#x2019;21 2021 Australasian Computer Science Week Multiconference"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.06.015"},{"journal-title":"Trojaning Attack on Neural Networks 2017 Purdue e-Pubs","year":"2017","author":"liu","key":"ref9"},{"journal-title":"When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks","year":"2018","author":"suciu","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2021,12,13]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647787.pdf?arnumber=9647787","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:59:50Z","timestamp":1652201990000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647787\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647787","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}