{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:39:16Z","timestamp":1774021156681,"version":"3.50.1"},"reference-count":74,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme","award":["2019"],"award-info":[{"award-number":["2019"]}]},{"name":"Guangdong Higher Education Innovation Group","award":["Grant 2020KCXTD007"],"award-info":[{"award-number":["Grant 2020KCXTD007"]}]},{"name":"Guangdong Province Key Research and Development Plan","award":["Grant 2019B010136003"],"award-info":[{"award-number":["Grant 2019B010136003"]}]},{"name":"Major Key Project of PCL","award":["Grants (No. PCL2022A03\uff0cPCL2021A02\uff0cPCL2021A09)"],"award-info":[{"award-number":["Grants (No. PCL2022A03\uff0cPCL2021A02\uff0cPCL2021A09)"]}]},{"name":"National Key Research and Development Plan","award":["Grant (2018YFB1800702)"],"award-info":[{"award-number":["Grant (2018YFB1800702)"]}]},{"name":"National Key Research and Development Plan","award":["Grant (2021YFB2012402)"],"award-info":[{"award-number":["Grant (2021YFB2012402)"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["Grants (U20B2046, U1636215, 61871140, U1803263)"],"award-info":[{"award-number":["Grants (U20B2046, U1636215, 61871140, U1803263)"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangzhou Higher Education Innovation Group","award":["Grant 202032854"],"award-info":[{"award-number":["Grant 202032854"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tnsm.2022.3200866","type":"journal-article","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T15:40:08Z","timestamp":1661269208000},"page":"4248-4261","source":"Crossref","is-referenced-by-count":43,"title":["From Data and Model Levels: Improve the Performance of Few-Shot Malware Classification"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4332-0234","authenticated-orcid":false,"given":"Yuhan","family":"Chai","sequence":"first","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4202-7802","authenticated-orcid":false,"given":"Jing","family":"Qiu","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]},{"given":"Lihua","family":"Yin","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]},{"given":"Lejun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4929-4698","authenticated-orcid":false,"given":"Brij B.","family":"Gupta","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, International Center for AI and Cyber Security Research and Innovations, Asia University, Taichung, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9409-5359","authenticated-orcid":false,"given":"Zhihong","family":"Tian","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.2021100105"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-018-0125-x"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102526"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1594-6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1110-2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.08.020"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.40"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766515"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/icmlc.2013.6890868"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2017.14"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2291066"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.12.014"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2822680"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101740"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102247"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107138"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805301"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2021.858"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.48"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.734"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11409"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3075315"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0242-0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2020.03.012"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2507185"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9653136"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3411508.3421373"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963724"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10030285"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3124725"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700102"},{"key":"ref33","first-page":"1126","article-title":"Model agnostic meta-learning for fast adaptation of deep networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Finn"},{"key":"ref34","article-title":"On first-order meta-learning algorithms","author":"Nichol","year":"2018","journal-title":"arXiv:1803.02999"},{"key":"ref35","article-title":"Meta-learning with latent embedding optimization","author":"Rusu","year":"2018","journal-title":"arXiv:1807.05960"},{"key":"ref36","article-title":"Meta-SGD: Learning to learn quickly for few-shot learning","author":"Li","year":"2017","journal-title":"arXiv:1707.09835"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01091"},{"key":"ref38","first-page":"1","article-title":"Matching networks for one shot learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"29","author":"Vinyals"},{"key":"ref39","first-page":"1","article-title":"Prototypical networks for few-shot learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Snell"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00131"},{"key":"ref41","first-page":"719","article-title":"TADAM: Task dependent adaptive metric for improved few-shot learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Oreshkin"},{"key":"ref42","first-page":"1","article-title":"Cross attention network for few-shot classification","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Hou"},{"key":"ref43","first-page":"1","article-title":"Large margin meta-learning for few-shot classification","volume-title":"Proc. Adv. Neural Inf. Process. Syst. Workshop Meta Learn.","author":"Wang"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00815"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00870"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00883"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01222"},{"key":"ref48","article-title":"Active one-shot learning","author":"Woodward","year":"2017","journal-title":"arXiv:1702.06559"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3472291"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.09.358"},{"key":"ref51","first-page":"1560","article-title":"Unsuccessful story about few shot malware family classification and siamese network to the rescue","volume-title":"Proc. IEEE Int. Conf. Software Eng. (ICSE)","author":"Bai"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/info11010051"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3024991"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938778"},{"key":"ref55","article-title":"A few-shot malware classification approach for unknown family recognition using malware feature visualization","author":"Khandhar","year":"2021"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102691"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63095-9_26"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.3390\/app10082847"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2374606"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2335451"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.297143"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-020-00747-w"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.297035"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102273"},{"key":"ref65","first-page":"1","article-title":"Sharpness-aware minimization for efficiently improving generalization","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Foret"},{"key":"ref66","first-page":"1","article-title":"Adam: A method for stochastic optimization","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Kingma"},{"key":"ref67","first-page":"1","article-title":"Entropy-SGD: Biasing gradient descent into wide valleys","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Chaudhari"},{"key":"ref68","first-page":"5905","article-title":"Asam: Adaptive sharpness-aware minimization for scale-invariant learning of deep neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Kwon"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00771"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00020"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging8070179"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvcm4g18.8"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2288675"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2022.3142820"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10034788\/09865222.pdf?arnumber=9865222","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T05:50:47Z","timestamp":1769493047000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9865222\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":74,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2022.3200866","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}