{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:34:51Z","timestamp":1763458491537,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T00:00:00Z","timestamp":1490313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006754","name":"Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-13-2-0045"],"award-info":[{"award-number":["W911NF-13-2-0045"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,24]]},"DOI":"10.1145\/3041008.3041018","type":"proceedings-article","created":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T10:54:21Z","timestamp":1490352861000},"page":"73-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Feature Cultivation in Privileged Information-augmented Detection"],"prefix":"10.1145","author":[{"given":"Z. Berkay","family":"Celik","sequence":"first","affiliation":[{"name":"Penn State University, University Park, PA, USA"}]},{"given":"Patrick","family":"McDaniel","sequence":"additional","affiliation":[{"name":"Penn State University, University Park, PA, USA"}]},{"given":"Rauf","family":"Izmailov","sequence":"additional","affiliation":[{"name":"Vencore Labs, Basking Ridge, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,3,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.138"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-015-0013-4"},{"key":"e_1_3_2_1_3_1","volume-title":"Extending detection with forensic information. arXiv:1603.09638","author":"Celik Z. Berkay","year":"2016","unstructured":"Z. Berkay Celik, Patrick McDaniel, Rauf Izmailov, Nicolas Papernot, and Ananthram Swami. Extending detection with forensic information. arXiv:1603.09638, 2016."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2789272.2886814"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2009.06.042"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523670"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000017"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.107"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1162264"},{"key":"e_1_3_2_1_10_1","volume-title":"Regression diagnostics: Identifying influential data and sources of collinearity","author":"Belsley D. A.","year":"2005","unstructured":"D. A. Belsley, E. Kuh, and R. E. Welsch. Regression diagnostics: Identifying influential data and sources of collinearity. John Wiley & Sons, 2005."},{"key":"e_1_3_2_1_11_1","volume-title":"The American Statistician","author":"Friendly Michael","year":"2009","unstructured":"Michael Friendly and Ernest Kwan. Where's Waldo? Visualizing collinearity diagnostics. The American Statistician, 2009."},{"key":"e_1_3_2_1_12_1","unstructured":"Z. Berkay Celik Rauf Izmailov and Patrick McDaniel. Proof and Implementation of Algorithmic Realization of Learning Using Privileged Information (LUPI) Paradigm: SVM"},{"volume-title":"Technical Report NAS-TR-0187--2015","year":"2015","key":"e_1_3_2_1_13_1","unstructured":". Technical Report NAS-TR-0187--2015, CSE Department, PSU, December 2015."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2013.6755058"},{"key":"e_1_3_2_1_15_1","volume-title":"https:\/\/www.kaggle.com\/c\/malware-classification\/. {Online","author":"Microsoft","year":"2015","unstructured":"Microsoft malware classification challenge. https:\/\/www.kaggle.com\/c\/malware-classification\/. {Online; accessed 10-May-2015}."},{"key":"e_1_3_2_1_16_1","unstructured":"Ida pro: Disassembler and debugger. http:\/\/www.hex-rays.com\/idapro\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/3041838.3041946"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_8"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.02.053"},{"key":"e_1_3_2_1_20_1","volume-title":"Novel feature extraction, selection and fusion for effective malware family classification. arXiv preprint arXiv:1511.04317","author":"Ahmadi Mansour","year":"2015","unstructured":"Mansour Ahmadi, Giorgio Giacinto, Dmitry Ulyanov, Stanislav Semenov, and Mikhail Trofimov. Novel feature extraction, selection and fusion for effective malware family classification. arXiv preprint arXiv:1511.04317, 2015."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362817"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. NDSS","author":"Bilge Leyla","year":"2011","unstructured":"Leyla Bilge, Engin Kirda, Christopher Kruegel, and Marco Balduzzi. Exposure: Finding malicious domains using passive dns analysis. In Proc. NDSS, 2011."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879148"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2027999.2028002"},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. IEEE Military Communications Conference (MILCOM)","author":"Celik Z. Berkay","year":"2015","unstructured":"Z. Berkay Celik, Robert J Walls, Patrick McDaniel, and Ananthram Swami. Malware traffic detection using tamper resistant features. In Proc. IEEE Military Communications Conference (MILCOM), 2015."},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. IEEE Computer Vision and Pattern Recognition","author":"Wang Ziheng","year":"2015","unstructured":"Ziheng Wang and Qiang Ji. Classifier learning with hidden information. In Proc. IEEE Computer Vision and Pattern Recognition, 2015."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2968826.2968920"},{"key":"e_1_3_2_1_28_1","volume-title":"Unifying distillation and privileged information. arXiv preprint arXiv:1511.03643","author":"Lopez-Paz David","year":"2015","unstructured":"David Lopez-Paz, L\u00e9on Bottou, Bernhard Sch\u00f6lkopf, and Vladimir Vapnik. Unifying distillation and privileged information. arXiv preprint arXiv:1511.03643, 2015."},{"key":"e_1_3_2_1_29_1","volume-title":"Patient-driven privacy control through generalized distillation. arXiv:1611.08648","author":"Celik Z. Berkay","year":"2016","unstructured":"Z. Berkay Celik, David Lopez-Paz, and Patrick McDaniel. Patient-driven privacy control through generalized distillation. arXiv:1611.08648, 2016."}],"event":{"name":"CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CODASPY '17"},"container-title":["Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041008.3041018","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3041008.3041018","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3041008.3041018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:27:22Z","timestamp":1763458042000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041008.3041018"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,24]]},"references-count":29,"alternative-id":["10.1145\/3041008.3041018","10.1145\/3041008"],"URL":"https:\/\/doi.org\/10.1145\/3041008.3041018","relation":{},"subject":[],"published":{"date-parts":[[2017,3,24]]},"assertion":[{"value":"2017-03-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}