{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T13:35:36Z","timestamp":1752672936752,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006754","name":"Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-13-2-0045"],"award-info":[{"award-number":["W911NF-13-2-0045"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196502","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"199-206","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Detection under Privileged Information"],"prefix":"10.1145","author":[{"given":"Z. Berkay","family":"Celik","sequence":"first","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"given":"Patrick","family":"McDaniel","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"given":"Rauf","family":"Izmailov","sequence":"additional","affiliation":[{"name":"Vencore Labs, Basking Ridge, NJ, USA"}]},{"given":"Nicolas","family":"Papernot","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"given":"Ryan","family":"Sheatsley","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"given":"Raquel","family":"Alvarez","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"given":"Ananthram","family":"Swami","sequence":"additional","affiliation":[{"name":"Army Research Laboratory, Adelphi, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"et almbox","author":"Mansour","year":"2015","unstructured":"Mansour A. et almbox .. 2015 . Novel feature extraction, selection and fusion for effective malware family classification. arXiv preprint arXiv:1511.04317. Mansour A. et almbox.. 2015. Novel feature extraction, selection and fusion for effective malware family classification. arXiv preprint arXiv:1511.04317."},{"key":"e_1_3_2_1_2_1","unstructured":"R. Barbosa R. Sadre A. Pras and R. Meent. 2010. University of Twente traffic traces data repository University of Twente Tech Report.  R. Barbosa R. Sadre A. Pras and R. Meent. 2010. University of Twente traffic traces data repository University of Twente Tech Report."},{"key":"e_1_3_2_1_3_1","volume-title":"mbox","author":"J. Bickford","year":"2011","unstructured":"J. Bickford et al mbox .. 2011 . Security versus energy tradeoffs in host-based mobile malware detection Mobile systems, applications, and services. J. Bickford et almbox.. 2011. Security versus energy tradeoffs in host-based mobile malware detection Mobile systems, applications, and services."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/en.wikipedia.org\/wiki\/Equifax. (2018). {Online","author":"Breach Equifax Data","year":"2018","unstructured":"Equifax Data Breach . 2018. https:\/\/en.wikipedia.org\/wiki\/Equifax. (2018). {Online ; accessed 15- January - 2018 }. Equifax Data Breach. 2018. https:\/\/en.wikipedia.org\/wiki\/Equifax. (2018). {Online; accessed 15-January-2018}."},{"key":"e_1_3_2_1_5_1","volume-title":"mbox","author":"I. Butun","year":"2014","unstructured":"I. Butun et al mbox .. 2014 . A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials . I. Butun et almbox.. 2014. A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials."},{"key":"e_1_3_2_1_6_1","volume-title":"mbox","author":"Cardenas A. A.","year":"2013","unstructured":"A. A. Cardenas mbox .. 2013 . Big data analytics for security. IEEE System Security . A. A. Cardenas et almbox.. 2013. Big data analytics for security. IEEE System Security."},{"key":"e_1_3_2_1_8_1","volume-title":"IEEE Symposium on Privacy-Aware Computing (PAC).","author":"Celik Z. Berkay","year":"2016","unstructured":"Z. Berkay Celik , David Lopez-Paz , and Patrick McDaniel . 2016 . Patient-driven privacy control through generalized distillation . IEEE Symposium on Privacy-Aware Computing (PAC). Z. Berkay Celik, David Lopez-Paz, and Patrick McDaniel. 2016. Patient-driven privacy control through generalized distillation. IEEE Symposium on Privacy-Aware Computing (PAC)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041008.3041018"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Z. Berkay Celik Patrick McDaniel Rauf Izmailov Nicolas Papernot Ryan Sheatsley Raquel Alvarez and Ananthram Swami. 2018. Detection under privileged information (Extended Version).  Z. Berkay Celik Patrick McDaniel Rauf Izmailov Nicolas Papernot Ryan Sheatsley Raquel Alvarez and Ananthram Swami. 2018. Detection under privileged information (Extended Version).","DOI":"10.1145\/3196494.3196502"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Incheon Republic of Korea","acronym":"ASIA CCS '18"},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196502","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196502","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:05Z","timestamp":1750210745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196502"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":9,"alternative-id":["10.1145\/3196494.3196502","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196502","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}