{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:25:01Z","timestamp":1771064701792,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":4,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NVIDIA GPU Grant Program"},{"name":"Cyber Florida"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1809000"],"award-info":[{"award-number":["CNS-1809000"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011673","name":"National Research Foundation","doi-asserted-by":"publisher","award":["2016K1A1A2912757"],"award-info":[{"award-number":["2016K1A1A2912757"]}],"id":[{"id":"10.13039\/501100011673","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3326296","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"290-291","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Breaking graph-based IoT malware detection systems using adversarial examples"],"prefix":"10.1145","author":[{"given":"Ahmed","family":"Abusnaina","sequence":"first","affiliation":[{"name":"University of Central Florida"}]},{"given":"Aminollah","family":"Khormali","sequence":"additional","affiliation":[{"name":"University of Central Florida"}]},{"given":"Hisham","family":"Alasmary","sequence":"additional","affiliation":[{"name":"University of Central Florida"}]},{"given":"Jeman","family":"Park","sequence":"additional","affiliation":[{"name":"University of Central Florida"}]},{"given":"Afsah","family":"Anwar","sequence":"additional","affiliation":[{"name":"University of Central Florida"}]},{"given":"Ulku","family":"Meteriz","sequence":"additional","affiliation":[{"name":"University of Central Florida"}]},{"given":"Aziz","family":"Mohaisen","sequence":"additional","affiliation":[{"name":"University of Central Florida"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems. In 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019","author":"Abusnaina Ahmed","year":"2019","unstructured":"Ahmed Abusnaina , Aminollah Khormali , Hisham Alasmary , Jeman Park , Afsah Anwar , and Aziz Mohaisen . 2019 . Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems. In 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019 , Dallas, TX, USA , July 7-10, 2019. Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, and Aziz Mohaisen. 2019. Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems. In 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019, Dallas, TX, USA, July 7-10, 2019."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04648-4_22"},{"key":"e_1_3_2_1_3_1","volume-title":"Adversarial Examples for Malware Detection. In 22nd European Symposium on Research Computer Security. 62--79","author":"Grosse Kathrin","unstructured":"Kathrin Grosse , Nicolas Papernot , Praveen Manoharan , Michael Backes , and Patrick D . McDaniel. 2017 . Adversarial Examples for Malware Detection. In 22nd European Symposium on Research Computer Security. 62--79 . Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, and Patrick D. McDaniel. 2017. Adversarial Examples for Malware Detection. In 22nd European Symposium on Research Computer Security. 62--79."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.04.001"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Miami Florida","acronym":"WiSec '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3326296","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3326296","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3326296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3326296"}},"subtitle":["poster"],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":4,"alternative-id":["10.1145\/3317549.3326296","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3326296","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}