{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T05:47:58Z","timestamp":1767332878936,"version":"3.48.0"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62293503"],"award-info":[{"award-number":["62293503"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tifs.2025.3648113","type":"journal-article","created":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T18:45:00Z","timestamp":1766601900000},"page":"460-475","source":"Crossref","is-referenced-by-count":0,"title":["MCLPF: Malware Collaborative Detection With LLM-Enhanced Pruning for Attributed Interpretable Flow Graphs"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-6935-1608","authenticated-orcid":false,"given":"Jun","family":"Tang","sequence":"first","affiliation":[{"name":"School of Computer Science, the State Key Laboratory of Tibetan Intelligence, and Jiangsu Provincial Key Laboratory of Internet of Things Intelligent Perception and Computing, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9923-4101","authenticated-orcid":false,"given":"Zijun","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, the State Key Laboratory of Tibetan Intelligence, and Jiangsu Provincial Key Laboratory of Internet of Things Intelligent Perception and Computing, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4392-3599","authenticated-orcid":false,"given":"Haiping","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science, the State Key Laboratory of Tibetan Intelligence, and Jiangsu Provincial Key Laboratory of Internet of Things Intelligent Perception and Computing, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1457-6329","authenticated-orcid":false,"given":"Le","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science, the State Key Laboratory of Tibetan Intelligence, and Jiangsu Provincial Key Laboratory of Internet of Things Intelligent Perception and Computing, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1815-2793","authenticated-orcid":false,"given":"Fu","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Computer Science, the State Key Laboratory of Tibetan Intelligence, and Jiangsu Provincial Key Laboratory of Internet of Things Intelligent Perception and Computing, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8158-150X","authenticated-orcid":false,"given":"Ruilong","family":"Deng","sequence":"additional","affiliation":[{"name":"College of Control Science and Engineering, Zhejiang University, Hangzhou, Zhejiang, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100529"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103582"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3664649"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102779"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00084"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC54236.2022.00237"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3389614"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3539937"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2025.240830"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/1043794"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796786"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3498361.3538778"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.104050"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-51476-0_13"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2024.137719"},{"key":"ref17","article-title":"Recent advances in malware detection: Graph learning and explainability","author":"Shokouhi-Nejad","year":"2025","journal-title":"arXiv:2502.10556"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86365-4_11"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE60146.2024.00179"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449842"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539128"},{"key":"ref22","first-page":"1","article-title":"Learning on large-scale text-attributed graphs via variational inference","volume-title":"Proc. 11th Int. Conf. Learn. Represent. (ICLR)","author":"Zhao"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00028"},{"volume-title":"Ida Pro","year":"2025","author":"Guilfanov","key":"ref25"},{"volume-title":"Ghidra","year":"2025","key":"ref26"},{"key":"ref27","first-page":"4171","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","volume-title":"Proc. NAACL-HLT","author":"Devlin"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM61039.2024.10773857"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3650212.3680397"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1609.02907"},{"volume-title":"The Ghidra Book: The Definitive Guide","year":"2020","author":"Eagle","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103788"},{"key":"ref33","article-title":"Scaling laws for neural language models","author":"Kaplan","year":"2020","journal-title":"arXiv: 2001.08361"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3543873.3587651"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109847"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.12.010"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813617"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC61105.2024.00223"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00020"},{"volume-title":"Virusshare","year":"2025","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560612"},{"key":"ref42","article-title":"SOREL-20M: A large scale benchmark dataset for malicious PE detection","author":"Harang","year":"2020","journal-title":"arXiv:2012.07634"},{"volume-title":"Yara","year":"2025","key":"ref43"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11782"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3545258.3545269"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.18"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-023-00498-7"},{"key":"ref48","first-page":"1024","article-title":"Inductive representation learning on large graphs","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"30","author":"Hamilton"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-61486-6_3"},{"key":"ref50","first-page":"1","article-title":"ALBERT: A lite BERT for self-supervised learning of language representations","volume-title":"Proc. 8th Int. Conf. Learn. Represent. (ICLR)","author":"Lan"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/d14-1181"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-5014-9_12"},{"key":"ref53","first-page":"7","article-title":"Redhit: Adaptive red-teaming of large language models via search, reasoning, and preference optimization","volume-title":"Proc. 1st Workshop LLM Secur. (LLMSEC)","author":"Sorkhpour"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SPW67851.2025.00017"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i27.35080"},{"key":"ref56","first-page":"7393","article-title":"A wolf in sheep\u2019s clothing: Practical black-box adversarial attacks for evading learning-based windows malware detection in the wild","volume-title":"Proc. 33rd USENIX Secur. Symp. (USENIX Secur.)","author":"Ling"},{"key":"ref57","first-page":"24824","article-title":"Chain-of-thought prompting elicits reasoning in large language models","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","author":"Lee"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.52202\/079017-3910"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103801"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3420126"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/11313711\/11314644.pdf?arnumber=11314644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T05:45:37Z","timestamp":1767332737000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11314644\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":60,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3648113","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2026]]}}}