{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:09:24Z","timestamp":1768522164196,"version":"3.49.0"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2020R1A2B5B03095204"],"award-info":[{"award-number":["NRF-2020R1A2B5B03095204"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2018R1A2B3001628"],"award-info":[{"award-number":["2018R1A2B3001628"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Education and Research Program for Future ICT Pioneers, Seoul National University"},{"name":"Inter-University Semiconductor Research Center"},{"DOI":"10.13039\/501100010418","name":"Institute for Information and Communications Technology Promotion","doi-asserted-by":"publisher","award":["2020-0-01840"],"award-info":[{"award-number":["2020-0-01840"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Analysis on Technique of Accessing and Acquiring User Data in Smartphone","award":["2018-0-00230"],"award-info":[{"award-number":["2018-0-00230"]}]},{"name":"Development on Autonomous Trust Enhancement Technology of IoT Device and Study on Adaptive IoT Security Open Architecture based on Global Standardization&#x2014;TrusThingz Project"},{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002630","name":"Ewha Womans University","doi-asserted-by":"publisher","award":["2021"],"award-info":[{"award-number":["2021"]}],"id":[{"id":"10.13039\/501100002630","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Artif. Intell."],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1109\/tai.2021.3103139","type":"journal-article","created":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T16:22:29Z","timestamp":1628785349000},"page":"299-313","source":"Crossref","is-referenced-by-count":17,"title":["Learn2Evade: Learning-Based Generative Model for Evading PDF Malware Classifiers"],"prefix":"10.1109","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5238-3547","authenticated-orcid":false,"given":"Ho","family":"Bae","sequence":"first","affiliation":[{"name":"Department of Cyber Security, Ewha Womans University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8414-966X","authenticated-orcid":false,"given":"Younghan","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Seoul National University, Seoul, South Korea"}]},{"given":"Yohan","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Seoul National University, Seoul, South Korea"}]},{"given":"Uiwon","family":"Hwang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Seoul National University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2367-197X","authenticated-orcid":false,"given":"Sungroh","family":"Yoon","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Interdisciplinary Program in Bioinformatics, Interdisciplinary Program in Artificial Intelligence, Automation and Systems Research Institute, Institute of New Media and Communications, and Institute of Engineering Research, Seoul National University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6412-2926","authenticated-orcid":false,"given":"Yunheung","family":"Paek","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Seoul National University, Seoul, South Korea"}]}],"member":"263","reference":[{"key":"ref39","first-page":"807","article-title":"Rectified linear units improve restricted Boltzmann machines","author":"nair","year":"2010","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35289-8_3"},{"key":"ref33","article-title":"Transferability in machine learning: From phenomena to black-box attacks using adversarial samples","author":"papernot","year":"2016"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00073"},{"key":"ref31","author":"mitre","year":"2010"},{"key":"ref30","first-page":"2013","author":"mitre","year":"2013"},{"key":"ref37","first-page":"448","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","author":"ioffe","year":"0","journal-title":"Proc 32nd Int Conf Int Conf Mach Learn"},{"key":"ref36","article-title":"Weilin xu, PDF-malware-parser: A fork of PDFRW aiming at parsing PDF malware","year":"2015"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484327"},{"key":"ref34","article-title":"Freedesktop.org. 2018. poppler","year":"0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133978"},{"key":"ref27","article-title":"16800 clean and 11960 malicious files for signature testing and research","author":"parkour","year":"2013"},{"key":"ref29","author":"mitre","year":"2018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2631434"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"ref20","article-title":"Generating adversarial malware examples for black-box attacks based on GAN","author":"hu","year":"2017"},{"key":"ref22","article-title":"SonicWall detects, reports dramatic rise in fraudulent PDF files in Q1 2019","year":"2019"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3332184"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382276"},{"key":"ref26","first-page":"21","article-title":"Automatically evading classifiers","author":"xu","year":"2016","journal-title":"Proc Symp Netw Distrib Syst Security"},{"key":"ref25","first-page":"197","article-title":"Practical evasion of a learning-based classifier: A case study","author":"laskov","year":"2014","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1611835114"},{"key":"ref51","article-title":"Delving into transferable adversarial examples and black-box attacks","author":"liu","year":"2016"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37337-5_30"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.02.075"},{"key":"ref54","first-page":"12","article-title":"Learning distributed representations of concepts","volume":"1","author":"hinton","year":"1986","journal-title":"Proc 8th Annu Conf Cogn Sci Soc"},{"key":"ref53","author":"bruna","year":"2014","journal-title":"Proc 2nd Int Conf Learn Representations"},{"key":"ref52","first-page":"125","article-title":"Adversarial examples are not bugs, they are features","author":"ilyas","year":"2019","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076785"},{"key":"ref11","first-page":"18","article-title":"Auto-learning of SMTP TCP transport-layer features for spam and abusive message detection","author":"kakavelakis","year":"2011","journal-title":"Proc 25th Int Conf Large Installation Syst Admin"},{"key":"ref40","author":"mitre","year":"2008"},{"key":"ref12","first-page":"1","article-title":"Detection of malicious PDF files based on hierarchical document structure","author":"\u0161rndic","year":"2013","journal-title":"Proc 28th Annu Netw Distrib Syst Secur Symp"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420987"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23078"},{"key":"ref15","article-title":"Hidost: A static machine-learning-based detector of malicious files","volume":"2016","author":"\u0161rndi?","year":"2016","journal-title":"EURASIP J Inf Secur"},{"key":"ref16","first-page":"20","article-title":"Explaining and harnessing adversarial examples","volume":"1050","author":"goodfellow","year":"2015"},{"key":"ref17","article-title":"Adversarial machine learning at scale","author":"kurakin","year":"2016"},{"key":"ref18","first-page":"1452","article-title":"Data poisoning attacks against autoregressive models","author":"alfeld","year":"2016","journal-title":"Proc 30th AAAI Conf Artif Intell"},{"key":"ref19","article-title":"Adversarial attacks on neural network policies","author":"huang","year":"2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046742"},{"key":"ref3","first-page":"8","article-title":"Scalable, behavior-based malware clustering","volume":"9","author":"bayer","year":"2009"},{"key":"ref6","article-title":"CAMP: Content-agnostic malware protection","author":"rajab","year":"2013","journal-title":"Proc Symp Netw Distrib Syst Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516682"},{"key":"ref7","article-title":"COMPA: Detecting compromised accounts on social networks","author":"egele","year":"2013"},{"key":"ref49","article-title":"Progressive neural networks","author":"rusu","year":"2016"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420988"},{"key":"ref46","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2015","journal-title":"Proc Anon Int Conf Learn Representations"},{"key":"ref45","article-title":"Exploit-database","year":"2020"},{"key":"ref48","first-page":"6467","article-title":"Gradient episodic memory for continual learning","author":"lopez-paz","year":"2017","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref47","first-page":"2990","article-title":"Continual learning with deep generative replay","author":"shin","year":"2017","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref42","author":"mitre","year":"2010"},{"key":"ref41","author":"mitre","year":"2010"},{"key":"ref44","first-page":"2017","author":"mitre","year":"2017"},{"key":"ref43","author":"mitre","year":"2011"}],"container-title":["IEEE Transactions on Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9078688\/9570826\/09512394.pdf?arnumber=9512394","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T20:50:49Z","timestamp":1756155049000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9512394\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8]]},"references-count":56,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tai.2021.3103139","relation":{},"ISSN":["2691-4581"],"issn-type":[{"value":"2691-4581","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8]]}}}