{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T02:25:44Z","timestamp":1775701544290,"version":"3.50.1"},"reference-count":53,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/sp46214.2022.9833659","type":"proceedings-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T15:28:05Z","timestamp":1658935685000},"page":"805-823","source":"Crossref","is-referenced-by-count":65,"title":["Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift"],"prefix":"10.1109","author":[{"given":"Federico","family":"Barbero","sequence":"first","affiliation":[{"name":"King&#x2019;s College London"}]},{"given":"Feargus","family":"Pendlebury","sequence":"additional","affiliation":[{"name":"King&#x2019;s College London"}]},{"given":"Fabio","family":"Pierazzi","sequence":"additional","affiliation":[{"name":"King&#x2019;s College London"}]},{"given":"Lorenzo","family":"Cavallaro","sequence":"additional","affiliation":[{"name":"University College London"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23260"},{"key":"ref12","author":"bishop","year":"2007","journal-title":"Pattern recognition and machine learning 5th Edition"},{"key":"ref15","article-title":"ZOZZLE: fast and precise in-browser javascript malware detection","author":"curtsinger","year":"2011","journal-title":"USENIX Security Symposium"},{"key":"ref14","article-title":"Aiding the detection of fake accounts in large scale social online services","author":"cao","year":"2012","journal-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417291"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.50"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"ref10","article-title":"Random search for hyper-parameter optimization","author":"bergstra","year":"2012","journal-title":"Journal of Machine Learning Research (JMLR)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1045"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.25"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013203451"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1162\/08997660260028700"},{"key":"ref51","article-title":"CADE: detecting and explaining concept drift samples for security applications","author":"yang","year":"2021","journal-title":"USENIX Security Symposium"},{"key":"ref50","doi-asserted-by":"crossref","DOI":"10.1109\/EuroSP.2019.00014","article-title":"Droidevolver: Self-evolving android malware detection system","author":"xu","year":"2019","journal-title":"IEEE European Symposium on Security and Privacy (EuroS&P)"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-013-5355-6"},{"key":"ref45","article-title":"Improving robustness of ML classifiers against realizable evasion attacks using conserved features","author":"tong","year":"2019","journal-title":"USENIX Security Symposium"},{"key":"ref48","article-title":"Cross-conformal predictive distributions","author":"vovk","year":"2018","journal-title":"Workshop on Conformal Prediction and its Applications (COPA)"},{"key":"ref47","author":"vovk","year":"2010","journal-title":"Algorithmic Learning in a Random World"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.106"},{"key":"ref41","article-title":"Hidost: a static machine-learning-based detector of malicious files","author":"srndic","year":"2016","journal-title":"EURASIP Journal on Information Security"},{"key":"ref44","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"ICLR (Poster)"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029825"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363193"},{"key":"ref8","article-title":"Classification with a reject option using a hinge loss","author":"bartlett","year":"2008","journal-title":"Journal of Machine Learning Research (JMLR)"},{"key":"ref7","article-title":"Dos and don&#x2019;ts of machine learning in computer security","author":"arp","year":"2022","journal-title":"USENIX Security Symposium"},{"key":"ref9","author":"bellman","year":"2015","journal-title":"Adaptive Control Processes - A Guided Tour (Reprint from 1961)"},{"key":"ref4","article-title":"Learning to evade static PE machine learning malware models via reinforcement learning","volume":"abs 1801 8917","author":"anderson","year":"2018","journal-title":"CoRR"},{"key":"ref3","article-title":"EMBER: an open dataset for training static PE malware machine learning models","volume":"abs 1804 4637","author":"anderson","year":"2018","journal-title":"CoRR"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3474369.3486864"},{"key":"ref40","article-title":"Detection of malicious PDF files based on hierarchical document structure","author":"srndic","year":"2013","journal-title":"Network and Distributed System Security Symposium (NDSS)"},{"key":"ref35","article-title":"TESSERACT: eliminating experimental bias in malware classification across space and time","author":"pendlebury","year":"2019","journal-title":"USENIX Security Symposium"},{"key":"ref34","author":"pendlebury","year":"2021","journal-title":"Machine Learning for Security in Hostile Environments"},{"key":"ref37","year":"0","journal-title":"The Symposium c 385&#x2013;370 BC Penguin Classics edition published 1999 translated by Christopher Gill"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00073"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134055"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2699220"},{"key":"ref33","article-title":"Deep k-nearest neighbors: To-wards confident, interpretable and robust deep learning","volume":"abs 1803 4765","author":"papernot","year":"2018","journal-title":"CoRR"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5772\/6078"},{"key":"ref2","first-page":"468","article-title":"AndroZoo: Collecting Millions of Android Apps for the Research Community","author":"allix","year":"2016","journal-title":"2016 IEEE\/ACM 13th Conference on Mining Software Repositories (MSR)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15618-7_5"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-020-00105-y"},{"key":"ref38","article-title":"A tutorial on conformal prediction","author":"shafer","year":"2008","journal-title":"Journal of Machine Learning Research (JMLR)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93034-3_8"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.103"},{"key":"ref20","article-title":"Transcend: Detecting concept drift in malware classification models","author":"jordaney","year":"2017","journal-title":"USENIX Security Symposium"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2808769.2808780"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3474369.3486873"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.06.019"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727508"}],"event":{"name":"2022 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2022,5,22]]},"end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833550\/9833558\/09833659.pdf?arnumber=9833659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T18:19:49Z","timestamp":1699467589000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833659\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/sp46214.2022.9833659","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}