{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T08:23:17Z","timestamp":1769847797238,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,28]],"date-time":"2018-08-28T00:00:00Z","timestamp":1535414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,28]]},"DOI":"10.1145\/3209280.3229085","type":"proceedings-article","created":{"date-parts":[[2018,10,2]],"date-time":"2018-10-02T12:09:29Z","timestamp":1538482169000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Hash-Grams"],"prefix":"10.1145","author":[{"given":"Edward","family":"Raff","sequence":"first","affiliation":[{"name":"Laboratory for Physical Sciences, Booz Allen Hamilton"}]},{"given":"Charles","family":"Nicholas","sequence":"additional","affiliation":[{"name":"Univ. of Maryland, Baltimore County"}]}],"member":"320","published-online":{"date-parts":[[2018,8,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Parallel space saving on multi- and many-core processors. Concurrency and Computation: Practice and Experience 30, 7 (4","author":"Cafaro Massimo","year":"2018","unstructured":"Massimo Cafaro , Marco Pulimeno , Italo Epicoco , and Giovanni Aloisio . 2018. Parallel space saving on multi- and many-core processors. Concurrency and Computation: Practice and Experience 30, 7 (4 2018 ). Massimo Cafaro, Marco Pulimeno, Italo Epicoco, and Giovanni Aloisio. 2018. Parallel space saving on multi- and many-core processors. Concurrency and Computation: Practice and Experience 30, 7 (4 2018)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454225"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of the 2005 SIAM International Conference on Data Mining. 44--55","author":"Cormode Graham","unstructured":"Graham Cormode and S. Muthukrishnan . 2005. Summarizing and mining skewed data streams . In Proc. of the 2005 SIAM International Conference on Data Mining. 44--55 . Graham Cormode and S. Muthukrishnan. 2005. Summarizing and mining skewed data streams. In Proc. of the 2005 SIAM International Conference on Data Mining. 44--55."},{"key":"e_1_3_2_1_4_1","volume-title":"Gauging Similarity with N-Grams. Science 267, 5199","author":"Damashek Marc","year":"1995","unstructured":"Marc Damashek . 1995. Gauging Similarity with N-Grams. Science 267, 5199 ( 1995 ), 843--848. Marc Damashek. 1995. Gauging Similarity with N-Grams. Science 267, 5199 (1995), 843--848."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480199353895"},{"key":"e_1_3_2_1_6_1","volume-title":"Approximate Nearest Neighbors: Towards Removing the Curse of Dimensionality 1 Introduction. Young","author":"Indyk Piotr","year":"1999","unstructured":"Piotr Indyk and Rajeev Motwani . 1999. Approximate Nearest Neighbors: Towards Removing the Curse of Dimensionality 1 Introduction. Young ( 1999 ). Piotr Indyk and Rajeev Motwani. 1999. Approximate Nearest Neighbors: Towards Removing the Curse of Dimensionality 1 Introduction. Young (1999)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/956863.956918"},{"key":"e_1_3_2_1_8_1","volume-title":"Learning to Detect and Classify Malicious Executables in the Wild. Journal of Machine Learning Research 7 (12","author":"Zico Kolter J","year":"2006","unstructured":"J Zico Kolter and Marcus A Maloof . 2006. Learning to Detect and Classify Malicious Executables in the Wild. Journal of Machine Learning Research 7 (12 2006 ), 2721--2744. http:\/\/dl.acm.org\/citation.cfm?id=1248547.1248646 J Zico Kolter and Marcus A Maloof. 2006. Learning to Detect and Classify Malicious Executables in the Wild. Journal of Machine Learning Research 7 (12 2006), 2721--2744. http:\/\/dl.acm.org\/citation.cfm?id=1248547.1248646"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30570-5_27"},{"key":"e_1_3_2_1_10_1","first-page":"1","article-title":"JSAT: Java Statistical Analysis Tool, a Library for Machine Learning","volume":"18","author":"Raff Edward","year":"2017","unstructured":"Edward Raff . 2017 . JSAT: Java Statistical Analysis Tool, a Library for Machine Learning . Journal of Machine Learning Research 18 , 23 (2017), 1 -- 5 . http:\/\/jmlr.org\/papers\/v18\/16-131.html Edward Raff. 2017. JSAT: Java Statistical Analysis Tool, a Library for Machine Learning. Journal of Machine Learning Research 18, 23 (2017), 1--5. http:\/\/jmlr.org\/papers\/v18\/16-131.html","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_11_1","volume-title":"Malware Detection by Eating a Whole EXE. arXiv preprint arXiv:1710.09435 (10","author":"Raff Edward","year":"2017","unstructured":"Edward Raff , Jon Barker , Jared Sylvester , Robert Brandon , Bryan Catanzaro , and Charles Nicholas . 2017. Malware Detection by Eating a Whole EXE. arXiv preprint arXiv:1710.09435 (10 2017 ). http:\/\/arxiv.org\/abs\/1710.09435 Edward Raff, Jon Barker, Jared Sylvester, Robert Brandon, Bryan Catanzaro, and Charles Nicholas. 2017. Malware Detection by Eating a Whole EXE. arXiv preprint arXiv:1710.09435 (10 2017). http:\/\/arxiv.org\/abs\/1710.09435"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140446"},{"key":"e_1_3_2_1_13_1","volume-title":"An investigation of byte n-gram features for malware classification. Journal of Computer Virology and Hacking Techniques (9","author":"Raff Edward","year":"2016","unstructured":"Edward Raff , Richard Zak , Russell Cox , Jared Sylvester , Paul Yacci , Rebecca Ward , Anna Tracy , Mark McLean , and Charles Nicholas . 2016. An investigation of byte n-gram features for malware classification. Journal of Computer Virology and Hacking Techniques (9 2016 ). Edward Raff, Richard Zak, Russell Cox, Jared Sylvester, Paul Yacci, Rebecca Ward, Anna Tracy, Mark McLean, and Charles Nicholas. 2016. An investigation of byte n-gram features for malware classification. Journal of Computer Virology and Hacking Techniques (9 2016)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884439"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the Seventeenth International Conference on Artificial Intelligence and Statistics, AISTATS ({JMLR} Workshop and Conference Proceedings)","volume":"33","author":"Shrivastava Anshumali","year":"2014","unstructured":"Anshumali Shrivastava and Ping Li . 2014 . In Defense of Minhash over Simhash . In Proceedings of the Seventeenth International Conference on Artificial Intelligence and Statistics, AISTATS ({JMLR} Workshop and Conference Proceedings) , Vol. 33 . JMLR.org, Reykjavik, Iceland, 886--894. http:\/\/jmlr.org\/proceedings\/papers\/v33\/shrivastava14.html Anshumali Shrivastava and Ping Li. 2014. In Defense of Minhash over Simhash. In Proceedings of the Seventeenth International Conference on Artificial Intelligence and Statistics, AISTATS ({JMLR} Workshop and Conference Proceedings), Vol. 33. JMLR.org, Reykjavik, Iceland, 886--894. http:\/\/jmlr.org\/proceedings\/papers\/v33\/shrivastava14.html"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553516"},{"key":"e_1_3_2_1_17_1","volume-title":"2017 12th International Conference on Malicious and Unwanted Software (MALWARE). IEEE, 109--118","author":"Zak Richard","unstructured":"Richard Zak , Edward Raff , and Charles K. Nicholas . 2017. What Can N-Grams Learn for Malware Detection? . In 2017 12th International Conference on Malicious and Unwanted Software (MALWARE). IEEE, 109--118 . Richard Zak, Edward Raff, and Charles K. Nicholas. 2017. What Can N-Grams Learn for Malware Detection?. In 2017 12th International Conference on Malicious and Unwanted Software (MALWARE). IEEE, 109--118."},{"key":"e_1_3_2_1_18_1","volume-title":"Human behavior and the principle of least effort","author":"Zipf George Kingsley","unstructured":"George Kingsley Zipf . 1949. Human behavior and the principle of least effort . Addison-Wesley Press , Oxford, England . xi, 573--xi, 573 pages. George Kingsley Zipf. 1949. Human behavior and the principle of least effort. Addison-Wesley Press, Oxford, England. xi, 573--xi, 573 pages."},{"key":"e_1_3_2_1_19_1","article-title":"Regularization and variable selection via the elastic net","volume":"67","author":"Zou Hui","year":"2005","unstructured":"Hui Zou and Trevor Hastie . 2005 . Regularization and variable selection via the elastic net . Journal of the Royal Statistical Society, Series B 67 , 2 (4 2005), 301--320. Hui Zou and Trevor Hastie. 2005. Regularization and variable selection via the elastic net. Journal of the Royal Statistical Society, Series B 67, 2 (4 2005), 301--320.","journal-title":"Journal of the Royal Statistical Society, Series B"}],"event":{"name":"DocEng '18: ACM Symposium on Document Engineering 2018","location":"Halifax NS Canada","acronym":"DocEng '18","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGDOC ACM Special Interest Group on Systems Documentation"]},"container-title":["Proceedings of the ACM Symposium on Document Engineering 2018"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209280.3229085","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3209280.3229085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:45Z","timestamp":1750210785000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209280.3229085"}},"subtitle":["Faster N-Gram Features for Classification and Malware Detection"],"short-title":[],"issued":{"date-parts":[[2018,8,28]]},"references-count":19,"alternative-id":["10.1145\/3209280.3229085","10.1145\/3209280"],"URL":"https:\/\/doi.org\/10.1145\/3209280.3229085","relation":{},"subject":[],"published":{"date-parts":[[2018,8,28]]},"assertion":[{"value":"2018-08-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}