{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:41Z","timestamp":1750220681754,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,21]],"date-time":"2020-09-21T00:00:00Z","timestamp":1600646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,21]]},"DOI":"10.1145\/3384217.3385625","type":"proceedings-article","created":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T04:14:50Z","timestamp":1598415290000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["WOLF"],"prefix":"10.1145","author":[{"given":"Sohaib","family":"Kiani","sequence":"first","affiliation":[{"name":"University of Kansas"}]},{"given":"Sana","family":"Awan","sequence":"additional","affiliation":[{"name":"University of Kansas"}]},{"given":"Jun","family":"Huan","sequence":"additional","affiliation":[{"name":"StylingAI Inc"}]},{"given":"Fengjun","family":"Li","sequence":"additional","affiliation":[{"name":"University of Kansas"}]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[{"name":"University of Kansas"}]}],"member":"320","published-online":{"date-parts":[[2020,9,21]]},"reference":[{"unstructured":"I. Sutskever A. Krizhevsky and G. Hinton. 2012.  I. Sutskever A. Krizhevsky and G. Hinton. 2012.","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.5555\/3157382.3157543"},{"volume-title":"Drebin: Efficient and Explainable Detection of Android Malware in Your Pocket. In 21st Annual Network and Distributed System Security Symposium (NDSS).","author":"Arp D.","unstructured":"D. Arp , M. Spreitzenbarth , M. Huebner , H. Gascon , and K. Rieck . 2014 . Drebin: Efficient and Explainable Detection of Android Malware in Your Pocket. In 21st Annual Network and Distributed System Security Symposium (NDSS). D. Arp, M. Spreitzenbarth, M. Huebner, H. Gascon, and K. Rieck. 2014. Drebin: Efficient and Explainable Detection of Android Malware in Your Pocket. In 21st Annual Network and Distributed System Security Symposium (NDSS).","key":"e_1_3_2_1_3_1"},{"volume-title":"Data Analysis, Machine Learning and Applications. Studies in Classification, Data Analysis, and Knowledge Organization","author":"Berthold Michael R.","unstructured":"Michael R. Berthold , Nicolas Cebron , Fabian Dill , Thomas R. Gabriel , Tobias K\u00f6tter , Thorsten Meinl , Peter Ohl , Christoph Sieb , Kilian Thiel , and Bernd Wiswedel . 2008. The Konstanz Information Miner (KNIME) . In Data Analysis, Machine Learning and Applications. Studies in Classification, Data Analysis, and Knowledge Organization . Springer Berlin , Heidelberg . Michael R. Berthold, Nicolas Cebron, Fabian Dill, Thomas R. Gabriel, Tobias K\u00f6tter, Thorsten Meinl, Peter Ohl, Christoph Sieb, Kilian Thiel, and Bernd Wiswedel. 2008. The Konstanz Information Miner (KNIME). In Data Analysis, Machine Learning and Applications. Studies in Classification, Data Analysis, and Knowledge Organization. Springer Berlin, Heidelberg.","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/2487575.2487629"},{"unstructured":"Chih-Chung Chang and Chin-Jen Lin. 2011.  Chih-Chung Chang and Chin-Jen Lin. 2011.","key":"e_1_3_2_1_6_1"},{"unstructured":"C.Y.Peng J.Lee K. Land and G.M. Ingersoll. 2002.  C.Y.Peng J.Lee K. Land and G.M. Ingersoll. 2002.","key":"e_1_3_2_1_7_1"},{"unstructured":"Misha Denil David Matheson and Nando de Frietas. 2002.  Misha Denil David Matheson and Nando de Frietas. 2002.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","first-page":"332","volume-title":"Proceedings of the Ninth International Workshop on Artificial Intelligence and Statistics","author":"Eyheramendy S.","year":"2003","unstructured":"S. Eyheramendy , D.D. Lewis , and D. Madigan . 2003. On the Naive Bayes model for text categorization . In Proceedings of the Ninth International Workshop on Artificial Intelligence and Statistics ( 2003 ), pp. 332 -- 339 . S. Eyheramendy, D.D. Lewis, and D. Madigan. 2003. On the Naive Bayes model for text categorization. In Proceedings of the Ninth International Workshop on Artificial Intelligence and Statistics (2003), pp. 332--339."},{"key":"e_1_3_2_1_10_1","volume-title":"Scikit-learn: Machine learning in Python. In The Journal of Machine Learning Research. 2825--2830.","author":"Pedregosa","year":"2011","unstructured":"Pedregosa F., Varoquaux G., Gramfort A., and Grisel Duchesnay E. Michel V., Thirion. 2011 . Scikit-learn: Machine learning in Python. In The Journal of Machine Learning Research. 2825--2830. Pedregosa F., Varoquaux G., Gramfort A., and Grisel Duchesnay E. Michel V., Thirion. 2011. Scikit-learn: Machine learning in Python. In The Journal of Machine Learning Research. 2825--2830."},{"doi-asserted-by":"crossref","unstructured":"Y. Freund and Schapire R. 1997. A decision theoretic generalization of on-line learning and an application to boosting. In Journal of Computer and System Sciences 119--139.  Y. Freund and Schapire R. 1997. A decision theoretic generalization of on-line learning and an application to boosting. In Journal of Computer and System Sciences 119--139.","key":"e_1_3_2_1_11_1","DOI":"10.1006\/jcss.1997.1504"},{"unstructured":"Benyamin Ghojogh and Mark Crowley. 2019. Linear and Quadratic Discriminant Analysis: Tutorial. arXiv:1906.02590 [stat.ML]  Benyamin Ghojogh and Mark Crowley. 2019. Linear and Quadratic Discriminant Analysis: Tutorial. arXiv:1906.02590 [stat.ML]","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"crossref","unstructured":"Kirthevasan Kandasamy Jeff Schneider and Barnabas Poczos. 2017. Query Efficient Posterior Estimation in Scientific Experiments via Bayesian Active Learning. In Artificial Intelligence Journal (AIJ).  Kirthevasan Kandasamy Jeff Schneider and Barnabas Poczos. 2017. Query Efficient Posterior Estimation in Scientific Experiments via Bayesian Active Learning. In Artificial Intelligence Journal (AIJ).","key":"e_1_3_2_1_13_1","DOI":"10.1016\/j.artint.2016.11.002"},{"key":"e_1_3_2_1_14_1","volume-title":"MLbase: A Distributed Machine-learning System. In 6th Biennial Conference on Innovative Data Systems Research (CIDR).","author":"Kraska Tim","year":"2013","unstructured":"Tim Kraska , Ameet Talwalkar , Rean Griffith John Duchi , Michael Franklin , and Michael Jordan . 2013 . MLbase: A Distributed Machine-learning System. In 6th Biennial Conference on Innovative Data Systems Research (CIDR). Tim Kraska, Ameet Talwalkar, Rean Griffith John Duchi, Michael Franklin, and Michael Jordan. 2013. MLbase: A Distributed Machine-learning System. In 6th Biennial Conference on Innovative Data Systems Research (CIDR)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1002\/cpe.994"},{"key":"e_1_3_2_1_16_1","volume-title":"Retrieved","author":"Lichman","year":"2013","unstructured":"Lichman M. 2013 . UCI Machine Learning Repository . Retrieved February 28, 2019 from http:\/\/archive.ics.uci.edu\/ml Lichman M. 2013. UCI Machine Learning Repository. Retrieved February 28, 2019 from http:\/\/archive.ics.uci.edu\/ml"},{"key":"e_1_3_2_1_17_1","volume-title":"Moore","author":"Olson Randal S.","year":"2016","unstructured":"Randal S. Olson and Jason H . Moore . 2016 . TPOT : A Tree-based Pipeline Optimization Tool for Automating Machine Learning. In The Journal of Machine Learning Research (JMLR) . 66--74. Randal S. Olson and Jason H. Moore. 2016. TPOT: A Tree-based Pipeline Optimization Tool for Automating Machine Learning. In The Journal of Machine Learning Research (JMLR). 66--74."},{"volume-title":"Proceedings of the 122nd ACM SIGKDD international conference on Knowledge discovery and data mining. 579--588","author":"Pivarski Jim","unstructured":"Jim Pivarski , Collin Bennett , and Robert L. Grossman . 2016. Deploying Analytics with the Portable Format for Analytics (PFA) . In Proceedings of the 122nd ACM SIGKDD international conference on Knowledge discovery and data mining. 579--588 . Jim Pivarski, Collin Bennett, and Robert L. Grossman. 2016. Deploying Analytics with the Portable Format for Analytics (PFA). In Proceedings of the 122nd ACM SIGKDD international conference on Knowledge discovery and data mining. 579--588.","key":"e_1_3_2_1_18_1"},{"volume-title":"Python machine learning : unlock deeper insights into machine learning with this vital guide to cutting-edge predictive analytics (1st. ed.)","author":"Raschka Sebastian","unstructured":"Sebastian Raschka . 2015. Python machine learning : unlock deeper insights into machine learning with this vital guide to cutting-edge predictive analytics (1st. ed.) . Packt Publishing Ltd , irmingham B3 2PB, UK. Sebastian Raschka. 2015. Python machine learning : unlock deeper insights into machine learning with this vital guide to cutting-edge predictive analytics (1st. ed.). Packt Publishing Ltd, irmingham B3 2PB, UK.","key":"e_1_3_2_1_19_1"},{"unstructured":"T. Schaul J. Bayer D. Wierstra F. Sehnke T. R\u00fcckstie\u00df Y. Sun M. Felder and J. Schmidhuber. 2010. PyBrain. In The Journal of Machine Learning Research (JMLR).  T. Schaul J. Bayer D. Wierstra F. Sehnke T. R\u00fcckstie\u00df Y. Sun M. Felder and J. Schmidhuber. 2010. PyBrain. In The Journal of Machine Learning Research (JMLR).","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","volume-title":"Adams","author":"Snoek Jasper","year":"2012","unstructured":"Jasper Snoek , Hugo Larochelle , and Ryan P . Adams . 2012 . Practical bayesian optimization of machine learning algorithms. In Advances in neural information processing systems. Jasper Snoek, Hugo Larochelle, and Ryan P. Adams. 2012. Practical bayesian optimization of machine learning algorithms. In Advances in neural information processing systems."},{"key":"e_1_3_2_1_22_1","volume-title":"Shanghai archives of psychiatry","author":"Song Yan-Yan","year":"2015","unstructured":"Yan-Yan Song and Ying Lu. 2015. Decision tree methods: applications for classification and prediction . In Shanghai archives of psychiatry vol. 27 ,2 ( 2015 ): 130--5. Yan-Yan Song and Ying Lu. 2015. Decision tree methods: applications for classification and prediction. In Shanghai archives of psychiatry vol. 27,2 (2015): 130--5."},{"volume-title":"A Survey on Transfer Learning","author":"Yang Qiang","unstructured":"Qiang Yang and Sinno Jialin Pan . 2010. A Survey on Transfer Learning . In IEEE Transactions on Knowledge & Data Engineering . 1345--1359. Qiang Yang and Sinno Jialin Pan. 2010. A Survey on Transfer Learning. In IEEE Transactions on Knowledge & Data Engineering. 1345--1359.","key":"e_1_3_2_1_23_1"}],"event":{"acronym":"HotSoS '20","name":"HotSoS '20: Hot Topics in the Science of Security","location":"Lawrence Kansas"},"container-title":["Proceedings of the 7th Symposium on Hot Topics in the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3384217.3385625","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3384217.3385625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:24Z","timestamp":1750197804000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3384217.3385625"}},"subtitle":["automated machine learning workflow management framework for malware detection and other applications"],"short-title":[],"issued":{"date-parts":[[2020,9,21]]},"references-count":23,"alternative-id":["10.1145\/3384217.3385625","10.1145\/3384217"],"URL":"https:\/\/doi.org\/10.1145\/3384217.3385625","relation":{},"subject":[],"published":{"date-parts":[[2020,9,21]]},"assertion":[{"value":"2020-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}