{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T02:09:20Z","timestamp":1774922960774,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.1145\/3338501.3357374","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"page":"37-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":62,"title":["Malware Detection on Highly Imbalanced Data through Sequence Modeling"],"prefix":"10.1145","author":[{"given":"Rajvardhan","family":"Oak","sequence":"first","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Min","family":"Du","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"David","family":"Yan","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Harshvardhan","family":"Takawale","sequence":"additional","affiliation":[{"name":"BITS Pilani, Hyderabad, UNK, India"}]},{"given":"Idan","family":"Amit","sequence":"additional","affiliation":[{"name":"Palo Alto Networks, Tel-Aviv, Israel"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15618-7_5"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_2_1_3_1","volume-title":"Challenges and DataSets. The AAAI-19 Workshop on Engineering Dependable and Secure Machine Learning Systems (2019","author":"Amit Idan","year":"2019"},{"key":"e_1_3_2_1_4_1","first-page":"23","article-title":"Drebin: Effective and explainable detection of android malware in your pocket","volume":"14","author":"Arp Daniel","year":"2014","journal-title":"Ndss"},{"key":"e_1_3_2_1_5_1","volume-title":"International Journal of Computer Science And Network Security (IJCSNS)","volume":"12","author":"Rad Babak Bashari","year":"2012"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Nitesh V. Chawla and Nathalie Japkowicz. 2004. Editorial: special issue on learning from imbalanced data sets. SIGKDD Explor. Newsl (2004) 1--6.  Nitesh V. Chawla and Nathalie Japkowicz. 2004. Editorial: special issue on learning from imbalanced data sets. SIGKDD Explor. Newsl (2004) 1--6.","DOI":"10.1145\/1007730.1007733"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.20"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Hamid Darabian Ali Dehghantanha Sattar Hashemi Sajad Homayoun and Kim-Kwang Raymond Choo. 2019. An opcode-based technique for polymorphic Internet of Things malware detection. Concurrency and Computation: Practice and Experience (2019) e5173.  Hamid Darabian Ali Dehghantanha Sattar Hashemi Sajad Homayoun and Kim-Kwang Raymond Choo. 2019. An opcode-based technique for polymorphic Internet of Things malware detection. Concurrency and Computation: Practice and Experience (2019) e5173.","DOI":"10.1002\/cpe.5173"},{"key":"e_1_3_2_1_10_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2014.52006"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000074"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of The 28th USENIX Security Symposium. USENIX.","author":"Guo Wenbo","year":"2019"},{"key":"e_1_3_2_1_15_1","unstructured":"David M. Halbfinger and Ronen Bergman. 2019 Gantz Netanyahu's Challenger Faces Lurid Questions After Iran Hacked His Phone. https:\/\/www.nytimes.com\/2019\/03\/15\/world\/middleeast\/gantz-netanyahus-challenger-faces-lurid-questions-after-iran-hacked-his-phone.html  David M. Halbfinger and Ronen Bergman. 2019 Gantz Netanyahu's Challenger Faces Lurid Questions After Iran Hacked His Phone. https:\/\/www.nytimes.com\/2019\/03\/15\/world\/middleeast\/gantz-netanyahus-challenger-faces-lurid-questions-after-iran-hacked-his-phone.html"},{"key":"e_1_3_2_1_16_1","unstructured":"Jiawei Han Jian Pei and Micheline Kamber. 2011. Data mining: concepts and techniques. Elsevier.  Jiawei Han Jian Pei and Micheline Kamber. 2011. Data mining: concepts and techniques. Elsevier."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation Vol. 9 8 (1997) 1735--1780.  Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation Vol. 9 8 (1997) 1735--1780.","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_18_1","volume-title":"Android Malware Detection Based on Useful API Calls and Machine Learning. In 2018 IEEE First International Conference on Artificial Intelligence and Knowledge Engineering (AIKE). IEEE, 175--178","author":"Jung Jaemin","year":"2018"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.007"},{"key":"e_1_3_2_1_20_1","volume-title":"The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER","author":"Kiss Nicolas","year":"2016"},{"key":"e_1_3_2_1_21_1","unstructured":"Lichman. 2013. UCI Machine Learning Data Repository. http:\/\/archive.ics.uci.edu\/ml  Lichman. 2013. UCI Machine Learning Data Repository. http:\/\/archive.ics.uci.edu\/ml"},{"key":"e_1_3_2_1_22_1","unstructured":"Oren Liebermann. 2019. How a hacked phone may have led killers to Khashoggi. https:\/\/edition.cnn.com\/2019\/01\/12\/middleeast\/khashoggi-phone-malware-intl\/index.html  Oren Liebermann. 2019. How a hacked phone may have led killers to Khashoggi. https:\/\/edition.cnn.com\/2019\/01\/12\/middleeast\/khashoggi-phone-malware-intl\/index.html"},{"key":"e_1_3_2_1_23_1","volume-title":"Advances in Neural Information Processing Systems 26","author":"Mikolov Tomas"},{"key":"e_1_3_2_1_24_1","unstructured":"Palo Alto Networks. 2019 a. AutoFocus Threat intelligence for security analysts. https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/autofocus  Palo Alto Networks. 2019 a. AutoFocus Threat intelligence for security analysts. https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/autofocus"},{"key":"e_1_3_2_1_25_1","unstructured":"Palo Alto Networks. 2019 b. WILDFIRE MALWARE ANALYSIS Find and stop unknown attacks automatically. https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/wildfire  Palo Alto Networks. 2019 b. WILDFIRE MALWARE ANALYSIS Find and stop unknown attacks automatically. https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/wildfire"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2013.53"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the first instructional conference on machine learning","volume":"242","author":"Juan"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00266"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_23"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.34"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Bernhard Sch\u00f6lkopf John C Platt John Shawe-Taylor Alex J Smola and Robert C Williamson. 2001. Estimating the support of a high-dimensional distribution. Neural computation Vol. 13 7 (2001) 1443--1471.  Bernhard Sch\u00f6lkopf John C Platt John Shawe-Taylor Alex J Smola and Robert C Williamson. 2001. Estimating the support of a high-dimensional distribution. Neural computation Vol. 13 7 (2001) 1443--1471.","DOI":"10.1162\/089976601750264965"},{"key":"e_1_3_2_1_32_1","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014).  Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 2013 conference on empirical methods in natural language processing. 1631--1642","author":"Socher Richard","year":"2013"},{"key":"e_1_3_2_1_34_1","volume-title":"Innovative Security Solutions for Information Technology and Communications: 11th International Conference, SecITC","author":"Sogukpinar Ibrahim","year":"2018"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Xin Su Dafang Zhang Wenjia Li and Kai Zhao. 2016. A deep learning approach to android malware feature learning and detection. In 2016 IEEE Trustcom\/BigDataSE\/ISPA. IEEE 244--251.  Xin Su Dafang Zhang Wenjia Li and Kai Zhao. 2016. A deep learning approach to android malware feature learning and detection. In 2016 IEEE Trustcom\/BigDataSE\/ISPA. IEEE 244--251.","DOI":"10.1109\/TrustCom.2016.0070"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Fei Sun Jun Liu Jian Wu Changhua Pei Xiao Lin Wenwu Ou and Peng Jiang. 2019. BERT4Rec: Sequential Recommendation with Bidirectional Encoder Representations from Transformer. arXiv preprint arXiv:1904.06690 (2019).  Fei Sun Jun Liu Jian Wu Changhua Pei Xiao Lin Wenwu Ou and Peng Jiang. 2019. BERT4Rec: Sequential Recommendation with Bidirectional Encoder Representations from Transformer. arXiv preprint arXiv:1904.06690 (2019).","DOI":"10.1145\/3357384.3357895"},{"key":"e_1_3_2_1_37_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998--6008.  Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998--6008."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.32"},{"key":"e_1_3_2_1_39_1","unstructured":"Alex Warstadt Amanpreet Singh and Samuel R Bowman. 2018. Neural network acceptability judgments. arXiv preprint arXiv:1805.12471 (2018).  Alex Warstadt Amanpreet Singh and Samuel R Bowman. 2018. Neural network acceptability judgments. arXiv preprint arXiv:1805.12471 (2018)."},{"key":"e_1_3_2_1_40_1","unstructured":"Wikipedia contributors. 2019. Confusion matrix -- Wikipedia The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Confusion_matrix&oldid=906886050. [Online; accessed 28-August-2019].  Wikipedia contributors. 2019. Confusion matrix -- Wikipedia The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Confusion_matrix&oldid=906886050. [Online; accessed 28-August-2019]."},{"key":"e_1_3_2_1_41_1","unstructured":"Zhilin Yang Zihang Dai Yiming Yang Jaime Carbonell Ruslan Salakhutdinov and Quoc V. Le. 2019. XLNet: Generalized Autoregressive Pretraining for Language Understanding. arxiv: cs.CL\/1906.08237  Zhilin Yang Zihang Dai Yiming Yang Jaime Carbonell Ruslan Salakhutdinov and Quoc V. Le. 2019. XLNet: Generalized Autoregressive Pretraining for Language Understanding. arxiv: cs.CL\/1906.08237"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315261"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3203422.3203430"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-010-0001-0"},{"key":"e_1_3_2_1_45_1","unstructured":"Bo Zong Qi Song Martin Renqiang Min Wei Cheng Cristian Lumezanu Daeki Cho and Haifeng Chen. 2018. Deep autoencoding gaussian mixture model for unsupervised anomaly detection. (2018).  Bo Zong Qi Song Martin Renqiang Min Wei Cheng Cristian Lumezanu Daeki Cho and Haifeng Chen. 2018. Deep autoencoding gaussian mixture model for unsupervised anomaly detection. (2018)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Barret Zoph Deniz Yuret Jonathan May and Kevin Knight. 2016. Transfer learning for low-resource neural machine translation. arXiv preprint arXiv:1604.02201 (2016).  Barret Zoph Deniz Yuret Jonathan May and Kevin Knight. 2016. Transfer learning for low-resource neural machine translation. arXiv preprint arXiv:1604.02201 (2016).","DOI":"10.18653\/v1\/D16-1163"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338501.3357374","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338501.3357374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:49Z","timestamp":1750201969000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338501.3357374"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":46,"alternative-id":["10.1145\/3338501.3357374","10.1145\/3338501"],"URL":"https:\/\/doi.org\/10.1145\/3338501.3357374","relation":{},"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}