{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T02:19:37Z","timestamp":1775960377468,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1718459"],"award-info":[{"award-number":["CNS-1718459"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1750101"],"award-info":[{"award-number":["CNS-1750101"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1717028"],"award-info":[{"award-number":["CNS-1717028"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243792","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T12:56:36Z","timestamp":1539694596000},"page":"364-379","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":232,"title":["LEMNA"],"prefix":"10.1145","author":[{"given":"Wenbo","family":"Guo","sequence":"first","affiliation":[{"name":"Pennsylvania State University &amp; JD Security Research Center, State College, PA, USA"}]},{"given":"Dongliang","family":"Mu","sequence":"additional","affiliation":[{"name":"Nanjing University &amp; Pennsylvania State University, State College, PA, USA"}]},{"given":"Jun","family":"Xu","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology &amp; Pennsylvania State University, Hoboken, NJ, USA"}]},{"given":"Purui","family":"Su","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, Beijing, China"}]},{"given":"Gang","family":"Wang","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Xinyu","family":"Xing","sequence":"additional","affiliation":[{"name":"Pennsylvania State University &amp; JD Security Research Center, State College, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2014. Mimcus. https:\/\/github.com\/srndic\/mimicus. (2014).  2014. Mimcus. https:\/\/github.com\/srndic\/mimicus. (2014)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"e_1_3_2_2_3_1","volume-title":"On pixel-wise explanations for non-linear classifier decisions by layer-wise relevance propagation. PloS one","author":"Bach Sebastian","year":"2015","unstructured":"Sebastian Bach , Alexander Binder , Gr\u00e9goire Montavon , Frederick Klauschen , Klaus-Robert M\u00fcller , and Wojciech Samek . 2015. On pixel-wise explanations for non-linear classifier decisions by layer-wise relevance propagation. PloS one ( 2015 ). Sebastian Bach, Alexander Binder, Gr\u00e9goire Montavon, Frederick Klauschen, Klaus-Robert M\u00fcller, and Wojciech Samek. 2015. On pixel-wise explanations for non-linear classifier decisions by layer-wise relevance propagation. PloS one (2015)."},{"key":"e_1_3_2_2_4_1","volume-title":"Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473","author":"Bahdanau Dzmitry","year":"2014","unstructured":"Dzmitry Bahdanau , Kyunghyun Cho , and Yoshua Bengio . 2014. Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473 ( 2014 ). Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2014. Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473 (2014)."},{"key":"e_1_3_2_2_5_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium (USENIX Security).","author":"Bao Tiffany","year":"2014","unstructured":"Tiffany Bao , Johnathon Burket , Maverick Woo , Rafael Turner , and David Brumley . 2014 . Byteweight: Learning to recognize functions in binary code . In Proceedings of the 23rd USENIX Security Symposium (USENIX Security). Tiffany Bao, Johnathon Burket, Maverick Woo, Rafael Turner, and David Brumley. 2014. Byteweight: Learning to recognize functions in binary code. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_2_6_1","volume-title":"Interpreting blackbox models via model extraction. arXiv preprint arXiv:1705.08504","author":"Bastani Osbert","year":"2017","unstructured":"Osbert Bastani , Carolyn Kim , and Hamsa Bastani . 2017. Interpreting blackbox models via model extraction. arXiv preprint arXiv:1705.08504 ( 2017 ). Osbert Bastani, Carolyn Kim, and Hamsa Bastani. 2017. Interpreting blackbox models via model extraction. arXiv preprint arXiv:1705.08504 (2017)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808769.2808773"},{"key":"e_1_3_2_2_8_1","volume-title":"Dimensionality reduction as a defense against evasion attacks on machine learning classifiers. arXiv preprint arXiv:1704.02654","author":"Bhagoji Arjun Nitin","year":"2017","unstructured":"Arjun Nitin Bhagoji , Daniel Cullina , and Prateek Mittal . 2017. Dimensionality reduction as a defense against evasion attacks on machine learning classifiers. arXiv preprint arXiv:1704.02654 ( 2017 ). Arjun Nitin Bhagoji, Daniel Cullina, and Prateek Mittal. 2017. Dimensionality reduction as a defense against evasion attacks on machine learning classifiers. arXiv preprint arXiv:1704.02654 (2017)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134606"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.35"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of the 13th Conference on Neural Information Processing Systems (NIPS).","author":"Cauwenberghs Gert","year":"2000","unstructured":"Gert Cauwenberghs and Tomaso Poggio . 2000 . Incremental and decremental support vector machine learning . In Proceedings of the 13th Conference on Neural Information Processing Systems (NIPS). Gert Cauwenberghs and Tomaso Poggio. 2000. Incremental and decremental support vector machine learning. In Proceedings of the 13th Conference on Neural Information Processing Systems (NIPS)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_2_14_1","unstructured":"Fran\u00e7ois Chollet et al. 2017. Keras. (2017).  Fran\u00e7ois Chollet et al. 2017. Keras. (2017)."},{"key":"e_1_3_2_2_15_1","volume-title":"Proceedings of the 26th USENIX Security Symposium (USENIX Security).","author":"Chua Zheng Leong","year":"2017","unstructured":"Zheng Leong Chua , Shiqi Shen , Prateek Saxena , and Zhenkai Liang . 2017 . Neural Nets Can Learn Function Type Signatures From Binaries . In Proceedings of the 26th USENIX Security Symposium (USENIX Security). Zheng Leong Chua, Shiqi Shen, Prateek Saxena, and Zhenkai Liang. 2017. Neural Nets Can Learn Function Type Signatures From Binaries. In Proceedings of the 26th USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of the 16th International Conference on Computer Vision (ICCV).","author":"Fong R.C.","unstructured":"R.C. Fong and A. Vedaldi . 2017. Interpretable Explanations of Black Boxes by Meaningful Perturbation . In Proceedings of the 16th International Conference on Computer Vision (ICCV). R.C. Fong and A. Vedaldi. 2017. Interpretable Explanations of Black Boxes by Meaningful Perturbation. In Proceedings of the 16th International Conference on Computer Vision (ICCV)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298872"},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P).","author":"Gehr Timon","year":"2018","unstructured":"Timon Gehr , Matthew Mirman , Dana Drachsler-Cohen , Petar Tsankov , Swarat Chaudhuri , and Martin Vechev . 2018 . AI 2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation . In Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P). Timon Gehr, Matthew Mirman, Dana Drachsler-Cohen, Petar Tsankov, Swarat Chaudhuri, and Martin Vechev. 2018. AI 2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation. In Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_2_20_1","volume-title":"Proceedings of the 3rd International Conference on Learning Representations (ICLR).","author":"Goodfellow Ian J.","year":"2015","unstructured":"Ian J. Goodfellow , Jonathon Shlens , and Christian Szegedy . 2015 . Explaining and harnessing adversarial examples . In Proceedings of the 3rd International Conference on Learning Representations (ICLR). Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. In Proceedings of the 3rd International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_2_21_1","volume-title":"Adversarial perturbations against deep neural networks for malware classification. arXiv preprint arXiv:1606.04435","author":"Grosse Kathrin","year":"2016","unstructured":"Kathrin Grosse , Nicolas Papernot , Praveen Manoharan , Michael Backes , and Patrick McDaniel . 2016. Adversarial perturbations against deep neural networks for malware classification. arXiv preprint arXiv:1606.04435 ( 2016 ). Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, and Patrick McDaniel. 2016. Adversarial perturbations against deep neural networks for malware classification. arXiv preprint arXiv:1606.04435 (2016)."},{"key":"e_1_3_2_2_22_1","unstructured":"The Santa Cruz Operation Inc. 1997. System V application binary interface. (1997).  The Santa Cruz Operation Inc. 1997. System V application binary interface. (1997)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Anil K. Jain and B. Chandrasekaran. 1982. Dimensionality and Sample Size Considerations in Pattern Recognition Practice. Handbook of Statistics (1982).  Anil K. Jain and B. Chandrasekaran. 1982. Dimensionality and Sample Size Considerations in Pattern Recognition Practice. Handbook of Statistics (1982).","DOI":"10.1016\/S0169-7161(82)02042-2"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.494"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Ian T Jolliffe. 1986. Principal component analysis and factor analysis. In Principal component analysis.  Ian T Jolliffe. 1986. Principal component analysis and factor analysis. In Principal component analysis.","DOI":"10.1007\/978-1-4757-1904-8"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1994.6.2.181"},{"key":"e_1_3_2_2_28_1","volume-title":"Variable selection in finite mixture of regression models. Journal of the american Statistical association","author":"Khalili Abbas","year":"2007","unstructured":"Abbas Khalili and Jiahua Chen . 2007. Variable selection in finite mixture of regression models. Journal of the american Statistical association ( 2007 ). Abbas Khalili and Jiahua Chen. 2007. Variable selection in finite mixture of regression models. Journal of the american Statistical association (2007)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/3305381.3305576"},{"key":"e_1_3_2_2_30_1","volume-title":"Proceedings of the 25th Conference on Neural Information Processing Systems (NIPS).","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky , Ilya Sutskever , and Geoffrey E Hinton . 2012 . Imagenet classification with deep convolutional neural networks . In Proceedings of the 25th Conference on Neural Information Processing Systems (NIPS). Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Proceedings of the 25th Conference on Neural Information Processing Systems (NIPS)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939874"},{"key":"e_1_3_2_2_32_1","volume-title":"Understanding Neural Networks through Representation Erasure. arXiv preprint arXiv:1612.08220","author":"Li Jiwei","year":"2016","unstructured":"Jiwei Li , Will Monroe , and Dan Jurafsky . 2016. Understanding Neural Networks through Representation Erasure. arXiv preprint arXiv:1612.08220 ( 2016 ). Jiwei Li, Will Monroe, and Dan Jurafsky. 2016. Understanding Neural Networks through Representation Erasure. arXiv preprint arXiv:1612.08220 (2016)."},{"key":"e_1_3_2_2_33_1","volume-title":"Proceedings of the 5th International Conference on Learning Representations (ICLR).","author":"Liu Yanpei","year":"2017","unstructured":"Yanpei Liu , Xinyun Chen , Chang Liu , and Dawn Song . 2017 . Delving into transferable adversarial examples and black-box attacks . In Proceedings of the 5th International Conference on Learning Representations (ICLR). Yanpei Liu, Xinyun Chen, Chang Liu, and Dawn Song. 2017. Delving into transferable adversarial examples and black-box attacks. In Proceedings of the 5th International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_2_34_1","volume-title":"Proceedings of the 30th Conference on Neural Information Processing Systems (NIPS).","author":"Lundberg Scott M","year":"2017","unstructured":"Scott M Lundberg and Su-In Lee . 2017 . A unified approach to interpreting model predictions . In Proceedings of the 30th Conference on Neural Information Processing Systems (NIPS). Scott M Lundberg and Su-In Lee. 2017. A unified approach to interpreting model predictions. In Proceedings of the 30th Conference on Neural Information Processing Systems (NIPS)."},{"key":"e_1_3_2_2_35_1","unstructured":"Mengersen K. Marin J.M. and C.P. Robert. 2005. Bayesian modelling and inference on mixtures of distributions. Handbook of statistics (2005).  Mengersen K. Marin J.M. and C.P. Robert. 2005. Bayesian modelling and inference on mixtures of distributions. Handbook of statistics (2005)."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"e_1_3_2_2_37_1","volume-title":"Finite mixture modeling with mixture outcomes using the EM algorithm. Biometrics","author":"Muth\u00e9n Bengt","year":"1999","unstructured":"Bengt Muth\u00e9n and Kerby Shedden . 1999. Finite mixture modeling with mixture outcomes using the EM algorithm. Biometrics ( 1999 ). Bengt Muth\u00e9n and Kerby Shedden. 1999. Finite mixture modeling with mixture outcomes using the EM algorithm. Biometrics (1999)."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-2496(02)00028-7"},{"key":"e_1_3_2_2_39_1","volume":"199","author":"Olshausen Bruno A","unstructured":"Bruno A Olshausen and David J Field. 199 6. Emergence of simple-cell receptive field properties by learning a sparse code for natural images. Nature (1996). Bruno A Olshausen and David J Field. 1996. Emergence of simple-cell receptive field properties by learning a sparse code for natural images. Nature (1996).","journal-title":"David J Field."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"e_1_3_2_2_41_1","volume-title":"Scikit-learn: Machine learning in Python. Journal of machine learning research","author":"Pedregosa Fabian","year":"2011","unstructured":"Fabian Pedregosa , Ga\u00ebl Varoquaux , Alexandre Gramfort , Vincent Michel , Bertrand Thirion , Olivier Grisel , Mathieu Blondel , Peter Prettenhofer , Ron Weiss , Vincent Dubourg , 2011 . Scikit-learn: Machine learning in Python. Journal of machine learning research (2011). Fabian Pedregosa, Ga\u00ebl Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, et al. 2011. Scikit-learn: Machine learning in Python. Journal of machine learning research (2011)."}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243792","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243792","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243792","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:18Z","timestamp":1750212498000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243792"}},"subtitle":["Explaining Deep Learning based Security Applications"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":41,"alternative-id":["10.1145\/3243734.3243792","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243792","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}