{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T05:19:30Z","timestamp":1734499170927,"version":"3.30.2"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,28]]},"DOI":"10.1109\/pst62714.2024.10788074","type":"proceedings-article","created":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T19:15:09Z","timestamp":1734376509000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["A Comprehensive Study on Multi-Task Learning for Domain Generation Algorithm (DGA) Detection"],"prefix":"10.1109","author":[{"given":"Arthur","family":"Drichel","sequence":"first","affiliation":[{"name":"RWTH Aachen University"}]},{"given":"Ulrike","family":"Meyer","sequence":"additional","affiliation":[{"name":"RWTH Aachen University"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407030"},{"volume-title":"Predicting Do-main Generation Algorithms with Long Short-Term Memory Networks","year":"2016","author":"Woodbridge","key":"ref2"},{"article-title":"Character Level based Detection of DGA Domain Names","volume-title":"International Joint Conference on Neural Networks","author":"Yu","key":"ref3"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1145\/3607199.3607231","article-title":"False Sense of Security: Leveraging XAI to Analyze the Reasoning and True Performance of Context-less DGA Classifiers","volume-title":"International Symposium on Research in Attacks, In-trusions and Defenses","author":"Drichel"},{"issue":"12","key":"ref5","article-title":"A Survey on Multi-Task Learning","volume-title":"IEEE Transactions on Knowledge and Data Engineering","volume":"34","author":"Zhang","year":"2022"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1109\/WACV57701.2024.00556","article-title":"Multitask Vision-Language Prompt Tuning","volume-title":"Winter Conference on Applications of Computer Vision","author":"Shen","year":"2024"},{"issue":"3","key":"ref7","doi-asserted-by":"crossref","DOI":"10.1145\/3570640","article-title":"A Unified Multi-task Learning Framework for Multi-goal Conversational Recommender Systems","volume":"41","author":"Deng","year":"2023","journal-title":"ACM Trans. Inf. Syst"},{"key":"ref8","article-title":"Speech emotion recognition based on convolutional neural network with attention-based bidirectional long short-term memory network and multi-task learning","volume-title":"Applied Acoustics","volume":"202","author":"Liu","year":"2023"},{"key":"ref9","article-title":"FANCI: Feature-based Automated NXDomain Classification and Intelligence","volume-title":"USENIX Security Symposium","author":"Sch\u00fcppen","year":"2018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3465749"},{"key":"ref11","article-title":"A LSTM based framework for handling multiclass imbalance in DGA botnet detection","volume-title":"Neurocomputing","volume":"275","author":"Tran","year":"2018"},{"key":"ref12","article-title":"From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware","volume-title":"USENIX Security Sympo-sium","author":"Antonakakis","year":"2012"},{"issue":"4","key":"ref13","article-title":"Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains","volume-title":"Transactions on Information and System Security","volume":"16","author":"Bilge","year":"2014"},{"issue":"3","key":"ref14","article-title":"Malicious Domain Name Detection Based on Extreme Machine Learning","volume-title":"Neural Processing Letters","volume":"48","author":"Shi","year":"2018"},{"key":"ref15","article-title":"Detecting DGA Mal-ware Using NetlFow","volume-title":"IFIP\/IEEE Integrated Network Management","author":"Grill","year":"2015"},{"key":"ref16","article-title":"Phoenix: DGA-Based Botnet Tracking and Intelligence","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"Schiavoni","year":"2014"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-31909-9_26","article-title":"Winning with DNS Failures: Strategies for Faster Botnet Detection","volume-title":"Security and Privacy in Communication Networks","author":"Yadav","year":"2012"},{"volume-title":"eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys","author":"Saxe","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2927075"},{"article-title":"De-tection of Algorithmically Generated Domain Names Used by Botnets: A Dual Arms Race","volume-title":"SIGAPP Symposium on Applied Computing","author":"Spooren","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/bigdata.2018.8621875"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409190"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom50675.2020.00070"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2019.23386","article-title":"Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation","volume-title":"Network and Distributed System Security Symposium","author":"Le Pochat","year":"2019"},{"article-title":"A Comprehensive Measurement Study of Domain Gen-erating Malware","volume-title":"USENIX Security Symposium","author":"Plohmann","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3634737.3656287"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1016\/B978-1-55860-307-3.50012-5","article-title":"Multitask Learning: A Knowledge-Based Source of Inductive Bias","volume-title":"International Conference on Machine Learning","author":"Caruana","year":"1993"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412236"},{"key":"ref29","article-title":"Cross-Stitch Net-works for Multi-Task Learning","volume-title":"Conference on Computer Vision and Pattern Recognition","author":"Misra","year":"2016"},{"key":"ref30","article-title":"DSelect - k: Differentiable Selection in the Mixture of Experts with Applications to Multi-Task Learning","volume-title":"Advances in Neural Information Processing Systems","volume":"34","author":"Hazimeh","year":"2021"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220007"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412236"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1109\/CVPR52729.2023.01923","article-title":"Independent Component Alignment for Multi - Task Learning","volume-title":"Conference on Computer Vision and Pattern Recognition","author":"Senushkin","year":"2023"},{"key":"ref34","article-title":"Conflict-Averse Gradient Descent for Multi-task learning","volume-title":"Advances in Neu-ral Information Processing Systems","volume":"34","author":"Liu","year":"2021"},{"volume-title":"Dual-Balancing for Multi-Task Learning","year":"2023","author":"Lin","key":"ref35"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1109\/CVPR.2019.00197","article-title":"End-To-End Multi-Task Learning With Attention","volume-title":"Conference on Computer Vision and Pattern Recognition","author":"Liu","year":"2019"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00159"},{"key":"ref38","article-title":"GradNorm: Gradient Normalization for Adaptive Loss Balancing in Deep Multitask Networks","volume-title":"International Conference on Machine Learning","volume":"80","author":"Chen"},{"article-title":"Gradient Vaccine: Investi-gating and Improving Multi-task Optimization in Massively Multilingual Models","volume-title":"International Conference on Learning Representations","author":"Wang","key":"ref39"},{"article-title":"Towards Impartial Multi-task Learning","volume-title":"International Conference on Learning Representations","author":"Liu","key":"ref40"},{"key":"ref41","article-title":"Multi-Task Learning as Multi-Objective Optimization","volume-title":"Advances in Neural Information Processing Systems","volume":"31","author":"Sener","year":"2018"},{"key":"ref42","article-title":"Mitigating Gradient Bias in Multi-objective Learning: A Prov-ably Convergent Approach","volume-title":"International Conference on Learning Representations","author":"Fernando","year":"2023"},{"key":"ref43","article-title":"Gradient Surgery for Multi-Task Learning","volume-title":"Ad-vances in Neural Information Processing Systems","volume":"33","author":"Yu","year":"2020"},{"key":"ref44","article-title":"Reasonable Effectiveness of Ran-dom Weighting: A Litmus Test for Multi-Task Learning","volume-title":"Transactions on Machine Learning Research","author":"Lin","year":"2022"},{"key":"ref45","article-title":"Multi-Task Learning Using Uncertainty to Weigh Losses for Scene Geometry and Seman-tics","volume-title":"Conference on Computer Vision and Pattern Recognition","author":"Kendall","year":"2018"},{"issue":"209","key":"ref46","article-title":"LibMTL: A Python Library for Multi-Task Learning","volume":"24","author":"Lin","year":"2023","journal-title":"Journal of Machine Learning Research"},{"key":"ref47","article-title":"TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time","volume-title":"USENIX Security Symposium","author":"Pendlebury","year":"2019"},{"key":"ref48","article-title":"Inference for the Generalization Error","volume-title":"Advances in Neural Information Processing Systems","volume":"12","author":"Nadeau","year":"1999"},{"issue":"77","key":"ref49","article-title":"Time for a Change: a Tutorial for Comparing Multiple Classifiers Through Bayesian Analysis","volume":"18","author":"Benavoli","year":"2017","journal-title":"Journal of Machine Learning Research"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2016.90"}],"event":{"name":"2024 21st Annual International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2024,8,28]]},"location":"Sydney, Australia","end":{"date-parts":[[2024,8,30]]}},"container-title":["2024 21st Annual International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10788036\/10788037\/10788074.pdf?arnumber=10788074","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T05:51:59Z","timestamp":1734414719000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10788074\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,28]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/pst62714.2024.10788074","relation":{},"subject":[],"published":{"date-parts":[[2024,8,28]]}}}