{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T19:35:25Z","timestamp":1777059325871,"version":"3.51.4"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2019YFB2102600"],"award-info":[{"award-number":["2019YFB2102600"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61832012"],"award-info":[{"award-number":["61832012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1109\/tc.2023.3236901","type":"journal-article","created":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T21:55:45Z","timestamp":1673646945000},"page":"980-993","source":"Crossref","is-referenced-by-count":23,"title":["MalFox: Camouflaged Adversarial Malware Example Generation Based on Conv-GANs Against Black-Box Detectors"],"prefix":"10.1109","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1125-7472","authenticated-orcid":false,"given":"Fangtian","family":"Zhong","sequence":"first","affiliation":[{"name":"Department of Computer Science, The George Washington University, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5912-4647","authenticated-orcid":false,"given":"Xiuzhen","family":"Cheng","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The George Washington University, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6835-5981","authenticated-orcid":false,"given":"Dongxiao","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3188-3531","authenticated-orcid":false,"given":"Bei","family":"Gong","sequence":"additional","affiliation":[{"name":"Faculty of Information Science, Beijing University of Technology, Beijing, China"}]},{"given":"Shuaiwen","family":"Song","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Sydney, Camperdown, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6451-1158","authenticated-orcid":false,"given":"Jiguo","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Qilu University of Technology (Shandong Academy of Sciences) and Shandong Computer Science Center (National Supercom-puter Center in Jinan), Shandong, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2933524"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3008010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3048038"},{"key":"ref4","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2014"},{"key":"ref5","article-title":"Generating fluent adversarial examples for natural languages","author":"Zhang","year":"2020"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.18653\/v1\/P18-2006","article-title":"HotFlip: White-box adversarial examples for text classification","author":"Ebrahimi","year":"2018"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-58568-6_2","article-title":"SemanticAdv: Generating adversarial examples via attribute-conditional image editing","author":"Qiu","year":"2020"},{"key":"ref8","article-title":"Did you hear that?: Adversarial examples against automatic speech recognition","author":"Alzantot","year":"2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01426"},{"key":"ref11","article-title":"Hot knives through butter: Bypassing file-based sandboxes","author":"Singh","year":"2013"},{"key":"ref12","article-title":"The four most common evasive techniques used by malware","author":"Bisson","year":"2015"},{"key":"ref13","first-page":"1","article-title":"AVLeak: Fingerprinting antivirus emulators through black-box testing","volume-title":"Proc. 10th USENIX Workshop Offensive Technol.","author":"Blackthorne"},{"key":"ref14","article-title":"Dissection of modern malicious software","author":"Rodrigues","year":"2014"},{"key":"ref15","article-title":"20 years ago today! what we can learn from the cih virus...","author":"Ducklin","year":"2018"},{"key":"ref16","first-page":"1","article-title":"Impeding malware analysis using conditional code obfuscation","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Sharif"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484384"},{"key":"ref18","first-page":"1","article-title":"malWASH: Washing malware to evade dynamic analysis","volume-title":"Proc. 10th USENIX Workshop Offensive Technol.","author":"Ispoglou"},{"key":"ref19","first-page":"1","article-title":"D-TIME: Distributed threadless independent malware execution for runtime obfuscation","volume-title":"Proc. 13th USENIX Workshop Offensive Technol. USENIX Assoc.","author":"Pavithran"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00040"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1016\/j.swevo.2018.05.003","article-title":"Swarm virus- next-generation virus and antivirus paradigm?","author":"Zelinka","year":"2018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908033"},{"key":"ref23","article-title":"Adversarial perturbations against deep neural networks for malware classification","author":"Grosse","year":"2016"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1145\/3052973.3053009","article-title":"Practical black-box attacks against machine learning","author":"Papernot","year":"2017"},{"key":"ref25","article-title":"Generating adversarial malware examples for black-box attacks based on gan","author":"Hu","year":"2017"},{"key":"ref26","article-title":"Posts tagged: Virustotal","year":"2020"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2918437"},{"key":"ref30","article-title":"Dissecting a netwire phishing campaigns usage of process hollowing","author":"Maniath","year":"2019"},{"key":"ref31","article-title":"New cryptojacking malware campaign evades detection using process hollowing","year":"2019"},{"key":"ref32","article-title":"Bitpaymer ransomware leveraging new custom packer framework against targets across the USA","year":"2019"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6726"},{"key":"ref39","article-title":"Generating adversarial malware examples for black-box attacks based on GAN","author":"Hu","year":"2017"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3168831"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3038142"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/10470450\/10017127.pdf?arnumber=10017127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T08:39:15Z","timestamp":1725611955000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10017127\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":33,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tc.2023.3236901","relation":{},"ISSN":["0018-9340","1557-9956","2326-3814"],"issn-type":[{"value":"0018-9340","type":"print"},{"value":"1557-9956","type":"electronic"},{"value":"2326-3814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4]]}}}