{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T16:37:21Z","timestamp":1772037441972,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T00:00:00Z","timestamp":1531958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. National Science Foundation","award":["CNS-1618629"],"award-info":[{"award-number":["CNS-1618629"]}]},{"name":"WV HEPC","award":["HEPC.dsr.18.5"],"award-info":[{"award-number":["HEPC.dsr.18.5"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,19]]},"DOI":"10.1145\/3219819.3219862","type":"proceedings-article","created":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T13:05:12Z","timestamp":1532005512000},"page":"253-262","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":64,"title":["Gotcha - Sly Malware!"],"prefix":"10.1145","author":[{"given":"Yujie","family":"Fan","sequence":"first","affiliation":[{"name":"West Virginia University, Morgantown, USA"}]},{"given":"Shifu","family":"Hou","sequence":"additional","affiliation":[{"name":"West Virginia University, Morgantown, USA"}]},{"given":"Yiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"West Virginia University, Morgantown, USA"}]},{"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[{"name":"West Virginia University, Morgantown, WV, USA"}]},{"given":"Melih","family":"Abdulhayoglu","sequence":"additional","affiliation":[{"name":"Comodo Security Solutions, Inc., Clifton, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,7,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0029-6"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of Neuro-Nimes","volume":"91","author":"Bottou L\u00e9on","year":"1991","unstructured":"L\u00e9on Bottou . 1991 . Stochastic gradient learning in neural networks . Proceedings of Neuro-Nimes Vol. 91 , EC2 (1991). L\u00e9on Bottou. 1991. Stochastic gradient learning in neural networks. Proceedings of Neuro-Nimes Vol. 91, EC2 (1991)."},{"key":"e_1_3_2_1_3_1","volume-title":"Polonium: Tera-scale graph mining for malware detection KDD.","author":"Chau Duen Horng","year":"2010","unstructured":"Duen Horng Chau , Carey Nachenberg , Jeffrey Wilhelm , Adam Wright , and Christos Faloutsos . 2010 . Polonium: Tera-scale graph mining for malware detection KDD. Duen Horng Chau, Carey Nachenberg, Jeffrey Wilhelm, Adam Wright, and Christos Faloutsos. 2010. Polonium: Tera-scale graph mining for malware detection KDD."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26190-4_28"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134636"},{"key":"e_1_3_2_1_6_1","volume-title":"Intelligent malware detection based on file relation graphs ICSC","author":"Chen Lingwei","unstructured":"Lingwei Chen , Tao Li , Melih Abdulhayoglu , and Yanfang Ye. 2015. Intelligent malware detection based on file relation graphs ICSC . IEEE , 85--92. Lingwei Chen, Tao Li, Melih Abdulhayoglu, and Yanfang Ye. 2015. Intelligent malware detection based on file relation graphs ICSC. IEEE, 85--92."},{"key":"e_1_3_2_1_7_1","volume-title":"Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense EISIC","author":"Chen Lingwei","unstructured":"Lingwei Chen , Yanfang Ye , and Thirimachos Bourlai . 2017. Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense EISIC . IEEE , 99--106. Lingwei Chen, Yanfang Ye, and Thirimachos Bourlai. 2017. Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense EISIC. IEEE, 99--106."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2724843"},{"key":"e_1_3_2_1_9_1","unstructured":"Peng Cui Xiao Wang Jian Pei and Wenwu Zhu. 2017. A Survey on Network Embedding. In arXiv preprint arXiv:1711.08752.  Peng Cui Xiao Wang Jian Pei and Wenwu Zhu. 2017. A Survey on Network Embedding. In arXiv preprint arXiv:1711.08752."},{"key":"e_1_3_2_1_10_1","unstructured":"CybersecurityVentures. 2017. Ransomware Damage Report. https:\/\/cybersecurityventures.com\/ransomware-damage-report-2017-5-billion\/  CybersecurityVentures. 2017. Ransomware Damage Report. https:\/\/cybersecurityventures.com\/ransomware-damage-report-2017-5-billion\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098036"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.01.002"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132857"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132953"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807333"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1198\/016214502388618906"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098026"},{"key":"e_1_3_2_1_19_1","volume-title":"Meyer","author":"Ipsen Ilse C. F.","year":"1995","unstructured":"Ilse C. F. Ipsen and Carl D . Meyer . 1995 . The angle between complementary subspaces. Amer. Math. Monthly ( 1995), 904--911. Ilse C. F. Ipsen and Carl D. Meyer. 1995. The angle between complementary subspaces. Amer. Math. Monthly (1995), 904--911."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014105"},{"key":"e_1_3_2_1_21_1","volume-title":"Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Kai Chen , Greg Corrado , and Jeffrey Dean . 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 ( 2013 ). Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)."},{"key":"e_1_3_2_1_22_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S. Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality NIPS. 3111--3119.   Tomas Mikolov Ilya Sutskever Kai Chen Greg S. Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality NIPS. 3111--3119."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.09.004"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2598561"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2011.112"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2371211"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14778\/3402707.3402736"},{"key":"e_1_3_2_1_29_1","unstructured":"Symantec. 2016. 2016 Internet Security Threat Report. https:\/\/www.symantec.com\/secu-rity-center\/threat-report  Symantec. 2016. 2016 Internet Security Threat Report. https:\/\/www.symantec.com\/secu-rity-center\/threat-report"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623342"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741093"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488136"},{"key":"e_1_3_2_1_33_1","unstructured":"Chenguang Wang Yangqiu Song Haoran Li and Jiawei Zhang. 2016. Text Classification with Heterogeneous Information Network Kernels AAAI. 2130--2136.   Chenguang Wang Yangqiu Song Haoran Li and Jiawei Zhang. 2016. Text Classification with Heterogeneous Information Network Kernels AAAI. 2130--2136."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.131"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939753"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590319"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1191551.1191800"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1058-9"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0108-y"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3073559"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835820"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557167"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2009.2037978"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020448"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281308"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0082-4"},{"key":"e_1_3_2_1_47_1","volume-title":"Online and Distributed Robust Regressions under Adversarial Data Corruption ICDM","author":"Zhang Xuchao","unstructured":"Xuchao Zhang , Liang Zhao , Arnold P. Boedihardjo , and Chang-Tien Lu. 2017. Online and Distributed Robust Regressions under Adversarial Data Corruption ICDM . IEEE , 625--634. Xuchao Zhang, Liang Zhao, Arnold P. Boedihardjo, and Chang-Tien Lu. 2017. Online and Distributed Robust Regressions under Adversarial Data Corruption ICDM. IEEE, 625--634."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098063"},{"key":"e_1_3_2_1_49_1","volume-title":"Multi-resolution spatial event forecasting in social media ICDM","author":"Zhao Liang","unstructured":"Liang Zhao , Feng Chen , Chang-Tien Lu , and Naren Ramakrishnan . 2016. Multi-resolution spatial event forecasting in social media ICDM . IEEE , 689--698. Liang Zhao, Feng Chen, Chang-Tien Lu, and Naren Ramakrishnan. 2016. Multi-resolution spatial event forecasting in social media ICDM. IEEE, 689--698."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.39"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.08.001"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Liang Zhao Junxiang Wang and Xiaojie Guo. 2018. Distant-supervision of heterogeneous multitask learning for social event forecasting with multilingual indicators. In AAAI. 4498--4505.  Liang Zhao Junxiang Wang and Xiaojie Guo. 2018. Distant-supervision of heterogeneous multitask learning for social event forecasting with multilingual indicators. In AAAI. 4498--4505.","DOI":"10.1609\/aaai.v32i1.11676"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00834-4_19"}],"event":{"name":"KDD '18: The 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"London United Kingdom","acronym":"KDD '18","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3219819.3219862","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3219819.3219862","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:44Z","timestamp":1750208924000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3219819.3219862"}},"subtitle":["Scorpion A Metagraph2vec Based Malware Detection System"],"short-title":[],"issued":{"date-parts":[[2018,7,19]]},"references-count":53,"alternative-id":["10.1145\/3219819.3219862","10.1145\/3219819"],"URL":"https:\/\/doi.org\/10.1145\/3219819.3219862","relation":{},"subject":[],"published":{"date-parts":[[2018,7,19]]},"assertion":[{"value":"2018-07-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}