{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:01:38Z","timestamp":1776783698933,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Lynne and William Frankel Center for Computing Science at Ben-Gurion University"},{"name":"Cyber Security Research Center at Ben-Gurion University"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196511","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"187-197","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":75,"title":["Detecting Malicious PowerShell Commands using Deep Neural Networks"],"prefix":"10.1145","author":[{"given":"Danny","family":"Hendler","sequence":"first","affiliation":[{"name":"Ben-Gurion University of the Negev, Beer-Sheva, Israel"}]},{"given":"Shay","family":"Kels","sequence":"additional","affiliation":[{"name":"Microsoft, Hertzlia, Israel"}]},{"given":"Amir","family":"Rubin","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Beer-Sheva, Israel"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952603"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/15.11.937"},{"key":"e_1_3_2_1_3_1","unstructured":"Daniel Bohannon. 2016. The Invoke-Obfuscation module. https:\/\/github.com\/ danielbohannon\/Invoke-Obfuscation. (2016).  Daniel Bohannon. 2016. The Invoke-Obfuscation module. https:\/\/github.com\/ danielbohannon\/Invoke-Obfuscation. (2016)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"e_1_3_2_1_5_1","volume-title":"Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on. IEEE, ., 2559--2566","author":"Boureau Lan","year":"2010","unstructured":"Y- Lan Boureau , Francis Bach , Yann LeCun , and Jean Ponce . 2010 . Learning midlevel features for recognition . In Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on. IEEE, ., 2559--2566 . Y-Lan Boureau, Francis Bach, Yann LeCun, and Jean Ponce. 2010. Learning midlevel features for recognition. In Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on. IEEE, ., 2559--2566."},{"key":"e_1_3_2_1_6_1","unstructured":"Microsoft Corporation. 2017. Antimalware Scan Interface. https:\/\/msdn.microsoft. com\/he-il\/library\/windows\/desktop\/dn889587(v=vs.85).aspx. (2017).  Microsoft Corporation. 2017. Antimalware Scan Interface. https:\/\/msdn.microsoft. com\/he-il\/library\/windows\/desktop\/dn889587(v=vs.85).aspx. (2017)."},{"key":"e_1_3_2_1_7_1","unstructured":"Microsoft Corporation. 2017. PowerShell. https:\/\/docs.microsoft.com\/en-us\/ powershell\/scripting\/powershell-scripting?view=powershell-5.1. (2017).  Microsoft Corporation. 2017. PowerShell. https:\/\/docs.microsoft.com\/en-us\/ powershell\/scripting\/powershell-scripting?view=powershell-5.1. (2017)."},{"key":"e_1_3_2_1_8_1","unstructured":"Microsoft Corporation. 2017. Trojan:Win32\/Kovter. https:\/\/www.microsoft. com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Trojan: Win32\/Kovter. (2017).  Microsoft Corporation. 2017. Trojan:Win32\/Kovter. https:\/\/www.microsoft. com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Trojan: Win32\/Kovter. (2017)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX Security Symposium. USENIX Association, ., 33--48","author":"Curtsinger Charlie","year":"2011","unstructured":"Charlie Curtsinger , Benjamin Livshits , Benjamin G Zorn , and Christian Seifert . 2011 . ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection .. In USENIX Security Symposium. USENIX Association, ., 33--48 . Charlie Curtsinger, Benjamin Livshits, Benjamin G Zorn, and Christian Seifert. 2011. ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection.. In USENIX Security Symposium. USENIX Association, ., 33--48."},{"key":"e_1_3_2_1_11_1","volume-title":"Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on. IEEE, ., 3422--3426","author":"Dahl George E","year":"2013","unstructured":"George E Dahl , Jack W Stokes , Li Deng , and Dong Yu . 2013 . Large-scale malware classification using random projections and neural networks. In Acoustics , Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on. IEEE, ., 3422--3426 . George E Dahl, Jack W Stokes, Li Deng, and Dong Yu. 2013. Large-scale malware classification using random projections and neural networks. In Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on. IEEE, ., 3422--3426."},{"key":"e_1_3_2_1_12_1","volume-title":"Finding structure in time. Cognitive science 14, 2","author":"Elman Jeffrey L","year":"1990","unstructured":"Jeffrey L Elman . 1990. Finding structure in time. Cognitive science 14, 2 ( 1990 ), 179--211. Jeffrey L Elman. 1990. Finding structure in time. Cognitive science 14, 2 (1990), 179--211."},{"key":"e_1_3_2_1_13_1","volume-title":"Neocognitron: A self-organizing neural network model for a mechanism of visual pattern recognition. In Competition and cooperation in neural nets","author":"Fukushima Kunihiko","year":"1982","unstructured":"Kunihiko Fukushima and Sei Miyake . 1982 . Neocognitron: A self-organizing neural network model for a mechanism of visual pattern recognition. In Competition and cooperation in neural nets . Springer , ., 267--285. Kunihiko Fukushima and Sei Miyake. 1982. Neocognitron: A self-organizing neural network model for a mechanism of visual pattern recognition. In Competition and cooperation in neural nets. Springer, ., 267--285."},{"key":"e_1_3_2_1_14_1","volume-title":"Courville","author":"Goodfellow Ian J.","year":"2016","unstructured":"Ian J. Goodfellow , Yoshua Bengio , and Aaron C . Courville . 2016 . Deep Learning. MIT Press , . http:\/\/www.deeplearningbook.org\/ Ian J. Goodfellow, Yoshua Bengio, and Aaron C. Courville. 2016. Deep Learning. MIT Press, . http:\/\/www.deeplearningbook.org\/"},{"key":"e_1_3_2_1_15_1","volume-title":"Generating sequences with recurrent neural networks. arXiv preprint arXiv:1308.0850","author":"Graves Alex","year":"2013","unstructured":"Alex Graves . 2013. Generating sequences with recurrent neural networks. arXiv preprint arXiv:1308.0850 ( 2013 ). Alex Graves. 2013. Generating sequences with recurrent neural networks. arXiv preprint arXiv:1308.0850 (2013)."},{"key":"e_1_3_2_1_16_1","volume-title":"Artificial Neural Networks: Formal Models and Their Applications - ICANN","author":"Graves Alex","year":"2005","unstructured":"Alex Graves , Santiago Fern\u00e1ndez , and J\u00fcrgen Schmidhuber . 2005. Bidirectional LSTM Networks for Improved Phoneme Classification and Recognition . In Artificial Neural Networks: Formal Models and Their Applications - ICANN 2005 , 15th International Conference, Warsaw, Poland , September 11--15, 2005, Proceedings, Part II (Lecture Notes in Computer Science), Wlodzislaw Duch, Janusz Kacprzyk, Erkki Oja, and Slawomir Zadrozny (Eds.), Vol. 3697 . Springer , ., 799--804. Alex Graves, Santiago Fern\u00e1ndez, and J\u00fcrgen Schmidhuber. 2005. Bidirectional LSTM Networks for Improved Phoneme Classification and Recognition. In Artificial Neural Networks: Formal Models and Their Applications - ICANN 2005, 15th International Conference, Warsaw, Poland, September 11--15, 2005, Proceedings, Part II (Lecture Notes in Computer Science), Wlodzislaw Duch, Janusz Kacprzyk, Erkki Oja, and Slawomir Zadrozny (Eds.), Vol. 3697. Springer, ., 799--804."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 31st International Conference on Machine Learning (ICML-14)","author":"Graves Alex","year":"2014","unstructured":"Alex Graves and Navdeep Jaitly . 2014 . Towards end-to-end speech recognition with recurrent neural networks . In Proceedings of the 31st International Conference on Machine Learning (ICML-14) . JMLR.org, ., 1764--1772. Alex Graves and Navdeep Jaitly. 2014. Towards end-to-end speech recognition with recurrent neural networks. In Proceedings of the 31st International Conference on Machine Learning (ICML-14). JMLR.org, ., 1764--1772."},{"key":"e_1_3_2_1_18_1","volume-title":"Acoustics, speech and signal processing (icassp)","author":"Graves Alex","year":"2013","unstructured":"Alex Graves , Abdel-rahman Mohamed, and Geoffrey Hinton . 2013. Speech recognition with deep recurrent neural networks . In Acoustics, speech and signal processing (icassp) , 2013 ieee international conference on. IEEE , ., 6645--6649. Alex Graves, Abdel-rahman Mohamed, and Geoffrey Hinton. 2013. Speech recognition with deep recurrent neural networks. In Acoustics, speech and signal processing (icassp), 2013 ieee international conference on. IEEE, ., 6645--6649."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1021\/ci0342472"},{"key":"e_1_3_2_1_20_1","volume-title":"Improving neural networks by preventing coadaptation of feature detectors. arXiv preprint arXiv:1207.0580","author":"Hinton Geoffrey E","year":"2012","unstructured":"Geoffrey E Hinton , Nitish Srivastava , Alex Krizhevsky , Ilya Sutskever , and Ruslan R Salakhutdinov . 2012. Improving neural networks by preventing coadaptation of feature detectors. arXiv preprint arXiv:1207.0580 ( 2012 ). Geoffrey E Hinton, Nitish Srivastava, Alex Krizhevsky, Ilya Sutskever, and Ruslan R Salakhutdinov. 2012. Improving neural networks by preventing coadaptation of feature detectors. arXiv preprint arXiv:1207.0580 (2012)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/InfoSec.2015.7435501"},{"key":"e_1_3_2_1_23_1","volume-title":"Exploring the limits of language modeling. arXiv preprint arXiv:1602.02410","author":"Jozefowicz Rafal","year":"2016","unstructured":"Rafal Jozefowicz , Oriol Vinyals , Mike Schuster , Noam Shazeer , and Yonghui Wu. 2016. Exploring the limits of language modeling. arXiv preprint arXiv:1602.02410 ( 2016 ). Rafal Jozefowicz, Oriol Vinyals, Mike Schuster, Noam Shazeer, and Yonghui Wu. 2016. Exploring the limits of language modeling. arXiv preprint arXiv:1602.02410 (2016)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.223"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382577.2382579"},{"key":"e_1_3_2_1_26_1","volume-title":"AAAI","author":"Lai Siwei","unstructured":"Siwei Lai , Liheng Xu , Kang Liu , and Jun Zhao . 2015. Recurrent Convolutional Neural Networks for Text Classification .. In AAAI , Vol. 333 . AAAI Press , ., 2267-- 2273. Siwei Lai, Liheng Xu, Kang Liu, and Jun Zhao. 2015. Recurrent Convolutional Neural Networks for Text Classification.. In AAAI, Vol. 333. AAAI Press, ., 2267-- 2273."},{"key":"e_1_3_2_1_27_1","volume-title":"Deep learning. Nature 521, 7553","author":"LeCun Yann","year":"2015","unstructured":"Yann LeCun , Yoshua Bengio , and Geoffrey Hinton . 2015. Deep learning. Nature 521, 7553 ( 2015 ), 436--444. Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature 521, 7553 (2015), 436--444."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.541"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403020"},{"key":"e_1_3_2_1_31_1","volume-title":"Mining text data","author":"Liu Bing","unstructured":"Bing Liu and Lei Zhang . 2012. A survey of opinion mining and sentiment analysis . In Mining text data . Springer , ., 415--463. Bing Liu and Lei Zhang. 2012. A survey of opinion mining and sentiment analysis. In Mining text data. Springer, ., 415--463."},{"key":"e_1_3_2_1_32_1","unstructured":"Christopher D Manning Hinrich Sch\u00fctze etal 1999. Foundations of statistical natural language processing. Vol. 999. MIT Press .   Christopher D Manning Hinrich Sch\u00fctze et al. 1999. Foundations of statistical natural language processing. Vol. 999. MIT Press ."},{"key":"e_1_3_2_1_33_1","volume-title":"Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Kai Chen , Greg Corrado , and Jeffrey Dean . 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 ( 2013 ). Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)."},{"key":"e_1_3_2_1_34_1","unstructured":"Tomas Mikolov Martin Karafi\u00e0t Lukas Burget Jan Cernocky and Sanjeev Khu-  Tomas Mikolov Martin Karafi\u00e0t Lukas Burget Jan Cernocky and Sanjeev Khu-"},{"key":"e_1_3_2_1_35_1","volume-title":"Interspeech","volume":"2","year":"2010","unstructured":"danpur. 2010 . Recurrent neural network based language model .. In Interspeech , Vol. 2 . ISCA, ., 3 danpur. 2010. Recurrent neural network based language model.. In Interspeech, Vol. 2. ISCA, ., 3"},{"key":"e_1_3_2_1_36_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. NIPS . 3111--3119.   Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. NIPS . 3111--3119."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/3104322.3104425"},{"key":"e_1_3_2_1_38_1","unstructured":"PaloAlto. 2017. Pulling Back the Curtains on EncodedCommand PowerShell Attacks. https:\/\/researchcenter.paloaltonetworks.com\/2017\/03\/ unit42-pulling-back-the-curtains-on-encodedcommand-powershell-attacks\/. (2017).  PaloAlto. 2017. Pulling Back the Curtains on EncodedCommand PowerShell Attacks. https:\/\/researchcenter.paloaltonetworks.com\/2017\/03\/ unit42-pulling-back-the-curtains-on-encodedcommand-powershell-attacks\/. (2017)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178304"},{"key":"e_1_3_2_1_40_1","volume-title":"Virus Bulletin Conference. ., .","author":"Pontiroli Santiago M","year":"2015","unstructured":"Santiago M Pontiroli and F Roberto Martinez . 2015 . The Tao of .NET and PowerShell Malware Analysis . In Virus Bulletin Conference. ., . Santiago M Pontiroli and F Roberto Martinez. 2015. The Tao of .NET and PowerShell Malware Analysis. In Virus Bulletin Conference. ., ."},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the Thirtieth International Florida Artificial Intelligence Research Society Conference, FLAIRS 2017","author":"Joseph","year":"2017","unstructured":"Joseph D. Prusa and Taghi M. Khoshgoftaar. 2017. Deep Neural Network Architecture for Character-Level Learning on Short Text . In Proceedings of the Thirtieth International Florida Artificial Intelligence Research Society Conference, FLAIRS 2017 , Marco Island, Florida, USA, May 22--24 , 2017 . AAAI Press, ., 353--358. Joseph D. Prusa and Taghi M. Khoshgoftaar. 2017. Deep Neural Network Architecture for Character-Level Learning on Short Text. In Proceedings of the Thirtieth International Florida Artificial Intelligence Research Society Conference, FLAIRS 2017, Marco Island, Florida, USA, May 22--24, 2017. AAAI Press, ., 353--358."},{"key":"e_1_3_2_1_42_1","volume-title":"NET to Defend PowerShell. arXiv preprint arXiv:1709.07508","author":"Rousseau Amanda","year":"2017","unstructured":"Amanda Rousseau . 2017. Hijacking. NET to Defend PowerShell. arXiv preprint arXiv:1709.07508 ( 2017 ). Amanda Rousseau. 2017. Hijacking. NET to Defend PowerShell. arXiv preprint arXiv:1709.07508 (2017)."},{"key":"e_1_3_2_1_43_1","volume-title":"Nonlinear dimensionality reduction by locally linear embedding. science 290, 5500","author":"Roweis Sam T","year":"2000","unstructured":"Sam T Roweis and Lawrence K Saul . 2000. Nonlinear dimensionality reduction by locally linear embedding. science 290, 5500 ( 2000 ), 2323--2326. Sam T Roweis and Lawrence K Saul. 2000. Nonlinear dimensionality reduction by locally linear embedding. science 290, 5500 (2000), 2323--2326."},{"key":"e_1_3_2_1_44_1","volume-title":"Learning representations by back-propagating errors. nature 323, 6088","author":"Rumelhart David E","year":"1986","unstructured":"David E Rumelhart , Geoffrey E Hinton , and Ronald J Williams . 1986. Learning representations by back-propagating errors. nature 323, 6088 ( 1986 ), 533--536. David E Rumelhart, Geoffrey E Hinton, and Ronald J Williams. 1986. Learning representations by back-propagating errors. nature 323, 6088 (1986), 533--536."},{"key":"e_1_3_2_1_45_1","volume-title":"Fifteenth Annual Conference of the International Speech Communication Association. ISCA, .","author":"Sak Ha\u015fim","year":"2014","unstructured":"Ha\u015fim Sak , Andrew Senior , and Fran\u00e7oise Beaufays . 2014 . Long short-term memory recurrent neural network architectures for large scale acoustic modeling . In Fifteenth Annual Conference of the International Speech Communication Association. ISCA, . Ha\u015fim Sak, Andrew Senior, and Fran\u00e7oise Beaufays. 2014. Long short-term memory recurrent neural network architectures for large scale acoustic modeling. In Fifteenth Annual Conference of the International Speech Communication Association. ISCA, ."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"e_1_3_2_1_47_1","volume-title":"eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys. arXiv preprint arXiv:1702.08568","author":"Saxe Joshua","year":"2017","unstructured":"Joshua Saxe and Konstantin Berlin . 2017. eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys. arXiv preprint arXiv:1702.08568 ( 2017 ). Joshua Saxe and Konstantin Berlin. 2017. eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys. arXiv preprint arXiv:1702.08568 (2017)."},{"key":"e_1_3_2_1_48_1","volume-title":"Artificial neural networks","author":"Schalkoff Robert J","unstructured":"Robert J Schalkoff . 1997. Artificial neural networks . Vol. 1 . McGraw-Hill New York , . Robert J Schalkoff. 1997. Artificial neural networks. Vol. 1. McGraw-Hill New York, ."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093"},{"key":"e_1_3_2_1_50_1","volume-title":"Dynamic Analysis of Executables to Detect and Characterize Malware. arXiv preprint arXiv:1711.03947","author":"Smith Michael R","year":"2017","unstructured":"Michael R Smith , Joe B Ingram , Christopher C Lamb , Timothy J Draelos , Justin E Doak , James B Aimone , and Conrad D James . 2017. Dynamic Analysis of Executables to Detect and Characterize Malware. arXiv preprint arXiv:1711.03947 ( 2017 ). Michael R Smith, Joe B Ingram, Christopher C Lamb, Timothy J Draelos, Justin E Doak, James B Aimone, and Conrad D James. 2017. Dynamic Analysis of Executables to Detect and Characterize Malware. arXiv preprint arXiv:1711.03947 (2017)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Martin Sundermeyer Tamer Alkhouli Joern Wuebker and Hermann Ney. 2014. Translation Modeling with Bidirectional Recurrent Neural Networks.. In EMNLP. ACL . 14--25.  Martin Sundermeyer Tamer Alkhouli Joern Wuebker and Hermann Ney. 2014. Translation Modeling with Bidirectional Recurrent Neural Networks.. In EMNLP. ACL . 14--25.","DOI":"10.3115\/v1\/D14-1003"},{"key":"e_1_3_2_1_53_1","unstructured":"Symantec. 2016. The increased use of Powershell in attacks. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/security-center\/ white-papers\/increased-use-of-powershell-in-attacks-16-en.pdf. (2016).  Symantec. 2016. The increased use of Powershell in attacks. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/security-center\/ white-papers\/increased-use-of-powershell-in-attacks-16-en.pdf. (2016)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1441"},{"key":"e_1_3_2_1_55_1","volume-title":"Artificial neural networks. PHI Learning Pvt","author":"Yegnanarayana B","unstructured":"B Yegnanarayana . 2009. Artificial neural networks. PHI Learning Pvt . Ltd ., . B Yegnanarayana. 2009. Artificial neural networks. PHI Learning Pvt. Ltd., ."},{"key":"e_1_3_2_1_56_1","volume-title":"Text understanding from scratch. arXiv preprint arXiv:1502.01710","author":"Zhang Xiang","year":"2015","unstructured":"Xiang Zhang and Yann LeCun . 2015. Text understanding from scratch. arXiv preprint arXiv:1502.01710 ( 2015 ). Xiang Zhang and Yann LeCun. 2015. Text understanding from scratch. arXiv preprint arXiv:1502.01710 (2015)."},{"key":"e_1_3_2_1_57_1","unstructured":"Xiang Zhang Junbo Zhao and Yann LeCun. 2015. Character-level convolutional networks for text classification. In Advances in neural information processing systems. NIPS . 649--657.   Xiang Zhang Junbo Zhao and Yann LeCun. 2015. Character-level convolutional networks for text classification. In Advances in neural information processing systems. NIPS . 649--657."}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196511","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196511"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":57,"alternative-id":["10.1145\/3196494.3196511","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196511","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}