{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T01:04:46Z","timestamp":1759971886438,"version":"build-2065373602"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100020950","name":"National Science and Technology Council, Taiwan","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100020950","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1109\/tnsm.2025.3596134","type":"journal-article","created":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T18:07:01Z","timestamp":1754417221000},"page":"4222-4238","source":"Crossref","is-referenced-by-count":0,"title":["Attention-Enhanced Graph Convolution Network for Malware Family Feature Extraction and Embedding"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0780-8144","authenticated-orcid":false,"given":"Shun-Wen","family":"Hsiao","sequence":"first","affiliation":[{"name":"Department of Management Information Systems, National Chengchi University, Taipei City, Taiwan"}]},{"given":"Po-Yu","family":"Chu","sequence":"additional","affiliation":[{"name":"Department of Management Information Systems, National Chengchi University, Taipei City, Taiwan"}]}],"member":"263","reference":[{"volume-title":"McAfee Labs Threats Report August 2019","year":"2019","author":"Beek","key":"ref1"},{"volume-title":"Malware statistics & trends report: AV-test.","year":"2022","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/bwcca.2010.85"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.cose.2014.10.011"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.26636\/jtit.2019.130218"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.23919\/softcom.2017.8115504"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/access.2020.3002842"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/2089125.2089126"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.sbi.2006.04.004"},{"key":"ref10","article-title":"Efficient estimation of word representations in vector space","author":"Mikolov","year":"2013","journal-title":"arXiv:1301.3781"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1155\/2015\/659101"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/s11416-010-0141-5"},{"volume-title":"BERT (language model).","year":"2022","key":"ref13"},{"key":"ref14","first-page":"1188","article-title":"Distributed representations of sentences and documents","volume-title":"Proc. ICML","volume":"32","author":"Le"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1162\/neco.1997.9.8.1735"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.48550\/ARXIV.1706.03762"},{"volume-title":"Transformer (machine learning model)","year":"2022","key":"ref17"},{"key":"ref18","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2019","journal-title":"arXiv:1810.04805"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1609\/aaai.v32i1.11782"},{"key":"ref20","article-title":"Spectral networks and deep locally connected networks on graphs","author":"Bruna","year":"2014","journal-title":"arXiv:1312.6203"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/tnnls.2020.2978386"},{"key":"ref22","first-page":"1","article-title":"Semi-supervised classification with graph convolutional networks","volume-title":"Proc. ICLR","author":"Kipf"},{"key":"ref23","first-page":"1","article-title":"Graph attention networks","volume-title":"Proc. ICLR","author":"Velickovic"},{"key":"ref24","first-page":"1","article-title":"Inductive representation learning on large graphs","volume-title":"Proc. NIPS","author":"Hamilton"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/c2023-0-00620-3"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1080\/07421222.2019.1705514"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1016\/j.cose.2020.101760"},{"key":"ref28","first-page":"171","article-title":"Zero-day malware detection based on supervised learning algorithms of API call signatures","volume-title":"Proc. AusDM.","author":"Alazab"},{"volume-title":"Markov chain.","year":"2022","key":"ref29"},{"volume-title":"Malware Knowledge Base","year":"2022","key":"ref30"},{"key":"ref31","first-page":"238","article-title":"NN-based feature selection for text-based sequential data","volume-title":"Proc. PACIS","author":"Hsiao"},{"author":"Oliveira","article-title":"Malware analysis datasets: API call sequences","key":"ref32"},{"volume-title":"Text classification with an RNN.","year":"2022","key":"ref33"},{"volume-title":"Classify text with BERT.","year":"2022","key":"ref34"},{"volume-title":"Cuckoo.","year":"2022","key":"ref35"},{"volume-title":"Adware.LoadMoney.","year":"2022","key":"ref36"},{"volume-title":"Adware.Graftor.","year":"2022","key":"ref37"},{"volume-title":"WORM ALLAPLE.IK.","year":"2022","key":"ref38"},{"volume-title":"Worm:Win32\/Allaple.A.","year":"2022","key":"ref39"},{"volume-title":"Bag-of-words model.","year":"2022","key":"ref40"},{"volume-title":"ADW.BETRSURF.","year":"2022","key":"ref41"},{"volume-title":"Win32\/Allaple.","year":"2022","key":"ref42"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/tifs.2020.2969514"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/TrustCom56396.2022.00034"},{"issue":"1","key":"ref45","first-page":"484","article-title":"A deep learning framework based on GCN model for android malware detection","volume":"7","author":"Zaidi","year":"2024","journal-title":"J. Comput. Biomed. Informat."},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/INFOCOM48880.2022.9796786"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/ICCDS60734.2024.10560444"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/IJCNN52387.2021.9533481"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.14722\/bar.2023.23005"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1109\/KBEI.2015.7436133"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1145\/3403746.3403914"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1093\/comjnl\/bxad005"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1109\/ISEA-ISAP49340.2020.235015"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1007\/s11227-021-04020-y"},{"volume-title":"Heterogeneous graph convolutional networks for android malware detection using callback-aware caller-callee graphs","year":"2021","author":"Vinayaka","key":"ref55"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1145\/3459637.3482488"},{"volume-title":"Graftor\u2014But I never asked for this.","year":"2025","key":"ref57"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.1109\/tnnls.2024.3371592"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/11194281\/11114430.pdf?arnumber=11114430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T17:38:20Z","timestamp":1759945100000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11114430\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":58,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2025.3596134","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2025,10]]}}}