{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:30:58Z","timestamp":1759091458223,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T00:00:00Z","timestamp":1599696000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,10]]},"DOI":"10.1145\/3410530.3414411","type":"proceedings-article","created":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T19:56:53Z","timestamp":1599940613000},"page":"131-134","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["DOOM"],"prefix":"10.1145","author":[{"given":"Mohit","family":"Sewak","sequence":"first","affiliation":[{"name":"BITS Pilani, Goa, India"}]},{"given":"Sanjay K.","family":"Sahay","sequence":"additional","affiliation":[{"name":"BITS Pilani, Goa, India"}]},{"given":"Hemant","family":"Rathore","sequence":"additional","affiliation":[{"name":"BITS Pilani, Goa, India"}]}],"member":"320","published-online":{"date-parts":[[2020,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0084-2"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJMIS.2010.039240"},{"key":"e_1_3_2_1_3_1","volume-title":"Deterministic Policy Gradient Algorithms. In ICML'14 -","volume":"32","author":"David Silver","year":"2014","unstructured":"David Silver et. al. 2014 . Deterministic Policy Gradient Algorithms. In ICML'14 - Volume 32 (ICML'14). JMLR.org, I-387--I-395. David Silver et. al. 2014. Deterministic Policy Gradient Algorithms. In ICML'14 - Volume 32 (ICML'14). JMLR.org, I-387--I-395."},{"key":"e_1_3_2_1_4_1","volume-title":"Lillicrap et. al","author":"Timothy","year":"2015","unstructured":"Timothy P. Lillicrap et. al . 2015 . Continuous control with deep reinforcement learning. CoRR abs\/1509.02971 (2015). arXiv:1509.02971 Timothy P. Lillicrap et. al. 2015. Continuous control with deep reinforcement learning. CoRR abs\/1509.02971 (2015). arXiv:1509.02971"},{"key":"e_1_3_2_1_5_1","volume-title":"Human-level control through deep reinforcement learning. Nature 518, 7540","author":"Volodymyr Mnih","year":"2015","unstructured":"Volodymyr Mnih et. al. 2015. Human-level control through deep reinforcement learning. Nature 518, 7540 ( 2015 ), 529--533. Volodymyr Mnih et. al. 2015. Human-level control through deep reinforcement learning. Nature 518, 7540 (2015), 529--533."},{"key":"e_1_3_2_1_6_1","volume-title":"Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. CoRR abs\/1702.05983","author":"Hu Weiwei","year":"2017","unstructured":"Weiwei Hu and Ying Tan . 2017. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. CoRR abs\/1702.05983 ( 2017 ). arXiv:1702.05983 Weiwei Hu and Ying Tan. 2017. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. CoRR abs\/1702.05983 (2017). arXiv:1702.05983"},{"key":"e_1_3_2_1_7_1","volume-title":"IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection. CoRR abs\/1809.02077","author":"Lin Zilong","year":"2018","unstructured":"Zilong Lin , Yong Shi , and Zhi Xue . 2018 . IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection. CoRR abs\/1809.02077 (2018). arXiv:1809.02077 Zilong Lin, Yong Shi, and Zhi Xue. 2018. IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection. CoRR abs\/1809.02077 (2018). arXiv:1809.02077"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0248-7"},{"key":"e_1_3_2_1_9_1","volume-title":"International Conference on Intelligent Systems Design and Applications. Springer, 659--667","author":"Rathore Hemant","year":"2018","unstructured":"Hemant Rathore , Sanjay K Sahay , Palash Chaturvedi , and Mohit Sewak . 2018 . Android malicious application classification using clustering . In International Conference on Intelligent Systems Design and Applications. Springer, 659--667 . Hemant Rathore, Sanjay K Sahay, Palash Chaturvedi, and Mohit Sewak. 2018. Android malicious application classification using clustering. In International Conference on Intelligent Systems Design and Applications. Springer, 659--667."},{"volume-title":"Information and Communication Technology for Sustainable Development","author":"Sahay Sanjay K","key":"e_1_3_2_1_10_1","unstructured":"Sanjay K Sahay , Ashu Sharma , and Hemant Rathore . 2020. Evolution of Malware and Its Detection Techniques . In Information and Communication Technology for Sustainable Development . Springer , 139--150. Sanjay K Sahay, Ashu Sharma, and Hemant Rathore. 2020. Evolution of Malware and Its Detection Techniques. In Information and Communication Technology for Sustainable Development. Springer, 139--150."},{"key":"e_1_3_2_1_11_1","volume-title":"Proximal Policy Optimization Algorithms. CoRR abs\/1707.06347","author":"Schulman John","year":"2017","unstructured":"John Schulman , Filip Wolski , Prafulla Dhariwal , Alec Radford , and Oleg Klimov . 2017. Proximal Policy Optimization Algorithms. CoRR abs\/1707.06347 ( 2017 ). John Schulman, Filip Wolski, Prafulla Dhariwal, Alec Radford, and Oleg Klimov. 2017. Proximal Policy Optimization Algorithms. CoRR abs\/1707.06347 (2017)."},{"key":"e_1_3_2_1_12_1","volume-title":"Deep Reinforcement Learning: Frontiers of Artificial Intelligence","author":"Sewak Mohit","unstructured":"Mohit Sewak . 2019. Deep Reinforcement Learning: Frontiers of Artificial Intelligence ( 1 st ed.). Springer Publishing Company, Inc orporated. Mohit Sewak. 2019. Deep Reinforcement Learning: Frontiers of Artificial Intelligence (1st ed.). Springer Publishing Company, Incorporated.","edition":"1"},{"volume-title":"19th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing. 293--296.","author":"Sewak Mohit","key":"e_1_3_2_1_13_1","unstructured":"Mohit Sewak , Sanjay K. Sahay , and Hemant Rathore . 2018. Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection . In 19th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing. 293--296. Mohit Sewak, Sanjay K. Sahay, and Hemant Rathore. 2018. Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection. In 19th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing. 293--296."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2020.8648"},{"key":"e_1_3_2_1_15_1","volume-title":"Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems. IWCMC'19","author":"Usama Muhammad","year":"2019","unstructured":"Muhammad Usama , Muhammad Asim , Siddique Latif , Junaid Qadir , and Ala I . Al-Fuqaha. 2019 . Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems. IWCMC'19 ( 2019 ), 78--83. Muhammad Usama, Muhammad Asim, Siddique Latif, Junaid Qadir, and Ala I. Al-Fuqaha. 2019. Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems. IWCMC'19 (2019), 78--83."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"M. Usama M. Asim S. Latif J. Qadir and Ala-Al-Fuqaha. 2019. Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems. 78--83.  M. Usama M. Asim S. Latif J. Qadir and Ala-Al-Fuqaha. 2019. Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems. 78--83.","DOI":"10.1109\/IWCMC.2019.8766353"},{"key":"e_1_3_2_1_17_1","volume-title":"Deep Reinforcement Learning with Double Q-learning. CoRR abs\/1509.06461","author":"van Hasselt Hado","year":"2015","unstructured":"Hado van Hasselt , Arthur Guez , and David Silver . 2015. Deep Reinforcement Learning with Double Q-learning. CoRR abs\/1509.06461 ( 2015 ). arXiv:1509.06461 Hado van Hasselt, Arthur Guez, and David Silver. 2015. Deep Reinforcement Learning with Double Q-learning. CoRR abs\/1509.06461 (2015). arXiv:1509.06461"},{"volume-title":"ICC'2019","author":"Wu D.","key":"e_1_3_2_1_18_1","unstructured":"D. Wu , B. Fang , J. Wang , Q. Liu , and X. Cui . 2019. Evading Machine Learning Botnet Detection Models via Deep Reinforcement Learning . In ICC'2019 . 1--6. D. Wu, B. Fang, J. Wang, Q. Liu, and X. Cui. 2019. Evading Machine Learning Botnet Detection Models via Deep Reinforcement Learning. In ICC'2019. 1--6."}],"event":{"name":"UbiComp\/ISWC '20: 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and 2020 ACM International Symposium on Wearable Computers","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Virtual Event Mexico","acronym":"UbiComp\/ISWC '20"},"container-title":["Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410530.3414411","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3410530.3414411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:59Z","timestamp":1750195919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410530.3414411"}},"subtitle":["a novel adversarial-DRL-based op-code level metamorphic malware obfuscator for the enhancement of IDS"],"short-title":[],"issued":{"date-parts":[[2020,9,10]]},"references-count":18,"alternative-id":["10.1145\/3410530.3414411","10.1145\/3410530"],"URL":"https:\/\/doi.org\/10.1145\/3410530.3414411","relation":{},"subject":[],"published":{"date-parts":[[2020,9,10]]},"assertion":[{"value":"2020-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}