{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T16:38:57Z","timestamp":1770136737840,"version":"3.49.0"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,14]]},"DOI":"10.1109\/trustcom66490.2025.00295","type":"proceedings-article","created":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T20:42:41Z","timestamp":1770064961000},"page":"2509-2516","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating Behavior Graph Reduction Strategies for Machine Learning-Based Malware Detection"],"prefix":"10.1109","author":[{"given":"Samy","family":"Bettaieb","sequence":"first","affiliation":[{"name":"UCLouvain,Belgium"}]},{"given":"Serena","family":"Lucca","sequence":"additional","affiliation":[{"name":"UCLouvain,Belgium"}]},{"given":"Charles-Henry Bertrand","family":"Van Ouytsel","sequence":"additional","affiliation":[{"name":"UCLouvain,Belgium"}]},{"given":"Etienne","family":"Rivi\u00e8re","sequence":"additional","affiliation":[{"name":"UCLouvain,Belgium"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Enisa threat landscape report","year":"2024"},{"key":"ref2","volume-title":"Yara: The pattern matching swiss knife","year":"2019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3256979"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3411508.3421373"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-022-00423-4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22295-5_16"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102872"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103788"},{"key":"ref10","article-title":"A comprehensive survey on graph reduction: sparsification, coarsening, and condensation","author":"Hashemi","year":"2024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-016-0267-1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2024.3422990"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41579-2_2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.11.001"},{"key":"ref15","article-title":"Cuckoo sandbox","year":"2024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287628"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.10.007"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101775"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/issre.2018.00032"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24475"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2693418"},{"key":"ref22","article-title":"How powerful are graph neural networks?","author":"Xu","year":"2018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00084"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-023-00493-y"},{"key":"ref25","article-title":"Strategies for pre-training graph neural networks","author":"Hu","year":"2019"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553214"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413683"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-016-0281-3"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_23"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3678890.3678912"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24310"},{"key":"ref32","article-title":"Cuckoo3 - malware analysis tool"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598054"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102686"},{"key":"ref35","article-title":"Reproducibility material: Behavior graph reduction strategies for machine learning-based malware detection","author":"Bettaieb"},{"key":"ref36","article-title":"Effective and efficient malware detection at the end host","author":"Kolbitsch","year":"2009"},{"key":"ref37","volume-title":"MalAPI.io"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00020"},{"key":"ref39","volume-title":"Chocolatey:The Package Manager for Windows"},{"key":"ref40","volume-title":"MalwareBazaar"},{"key":"ref41","article-title":"Portable freeware dataset","author":"S\u00e9bastien"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330701"},{"key":"ref43","article-title":"Ember: an open dataset for training static pe malware machine learning models","author":"Anderson","year":"2018"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3564655"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00191"},{"key":"ref46","article-title":"Understanding the impact of graph reduction on adversarial robustness in graph neural networks","author":"Wu","year":"2024"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3689932.3694762"}],"event":{"name":"2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","location":"Guiyang, China","start":{"date-parts":[[2025,11,14]]},"end":{"date-parts":[[2025,11,17]]}},"container-title":["2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11354467\/11354567\/11354645.pdf?arnumber=11354645","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T05:55:39Z","timestamp":1770098139000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11354645\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,14]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/trustcom66490.2025.00295","relation":{},"subject":[],"published":{"date-parts":[[2025,11,14]]}}}