{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:39:45Z","timestamp":1772041185738,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/P009301\/1"],"award-info":[{"award-number":["EP\/P009301\/1"]}]},{"name":"China Scholarship Council (CSC)","award":["201906470085"],"award-info":[{"award-number":["201906470085"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,15]]},"DOI":"10.1145\/3474369.3486873","type":"proceedings-article","created":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T11:13:28Z","timestamp":1635419608000},"page":"123-134","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Investigating Labelless Drift Adaptation for Malware Detection"],"prefix":"10.1145","author":[{"given":"Zeliang","family":"Kan","sequence":"first","affiliation":[{"name":"King's College London &amp; University College London, London, United Kingdom"}]},{"given":"Feargus","family":"Pendlebury","sequence":"additional","affiliation":[{"name":"International Computer Science Institute, University College London, &amp; Royal Holloway, University of London, London, United Kingdom"}]},{"given":"Fabio","family":"Pierazzi","sequence":"additional","affiliation":[{"name":"King's College London, London, United Kingdom"}]},{"given":"Lorenzo","family":"Cavallaro","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24310"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_2_1_3_1","volume-title":"ESSoS (Lecture Notes in Computer Science","volume":"67","author":"Allix Kevin","year":"2015","unstructured":"Kevin Allix , Tegawend\u00e9 F. Bissyand\u00e9 , Jacques Klein , and Yves Le Traon . 2015 . Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection . In ESSoS (Lecture Notes in Computer Science , Vol. 8978). Springer, 51-- 67 . Kevin Allix, Tegawend\u00e9 F. Bissyand\u00e9, Jacques Klein, and Yves Le Traon. 2015. Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. In ESSoS (Lecture Notes in Computer Science, Vol. 8978). Springer, 51--67."},{"key":"e_1_3_2_1_4_1","volume-title":"Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning. CoRR","author":"Anderson Hyrum S.","year":"2018","unstructured":"Hyrum S. Anderson , Anant Kharkar , Bobby Filar , David Evans , and Phil Roth . 2018. Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning. CoRR , Vol. abs\/ 1801 .08917 ( 2018 ). Hyrum S. Anderson, Anant Kharkar, Bobby Filar, David Evans, and Phil Roth. 2018. Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning. CoRR, Vol. abs\/1801.08917 (2018)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474369.3486864"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of the USENIX Security Symposium.","author":"Arp Daniel","year":"2022","unstructured":"Daniel Arp , Erwin Quiring , Feargus Pendlebury , Alexander Warnecke , Fabio Pierazzi , Christian Wressnegger , Lorenzo Cavallaro , and Konrad Rieck . 2022 . Dos and Don'ts of Machine Learning in Computer Security . In Proc. of the USENIX Security Symposium. Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, and Konrad Rieck. 2022. Dos and Don'ts of Machine Learning in Computer Security. In Proc. of the USENIX Security Symposium."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"e_1_3_2_1_8_1","volume-title":"Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation. CoRR","author":"Barbero Federico","year":"2020","unstructured":"Federico Barbero , Feargus Pendlebury , Fabio Pierazzi , and Lorenzo Cavallaro . 2020 . Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation. CoRR , Vol. abs\/ 2010 .03856 (2020). Federico Barbero, Feargus Pendlebury, Fabio Pierazzi, and Lorenzo Cavallaro. 2020. Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation. CoRR, Vol. abs\/2010.03856 (2020)."},{"key":"e_1_3_2_1_9_1","volume-title":"Online algorithms","author":"Blum Avrim","unstructured":"Avrim Blum . 1998. On-line algorithms in machine learning . In Online algorithms . Springer , 306--325. Avrim Blum. 1998. On-line algorithms in machine learning. In Online algorithms. Springer, 306--325."},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of the ACM Conference on Learning Theory (COLT).","author":"Blum Avrim","unstructured":"Avrim Blum and Tom M. Mitchell . 1998. Combining Labeled and Unlabeled Data with Co-Training . In Proc. of the ACM Conference on Learning Theory (COLT). Avrim Blum and Tom M. Mitchell. 1998. Combining Labeled and Unlabeled Data with Co-Training. In Proc. of the ACM Conference on Learning Theory (COLT)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2251352"},{"key":"e_1_3_2_1_12_1","volume-title":"Semi-Supervised Classification by Low Density Separation","author":"Chapelle Olivier","unstructured":"Olivier Chapelle and Alexander Zien . 2005. Semi-Supervised Classification by Low Density Separation . In AISTATS. Society for Artificial Intelligence and Statistics . Olivier Chapelle and Alexander Zien. 2005. Semi-Supervised Classification by Low Density Separation. In AISTATS. Society for Artificial Intelligence and Statistics."},{"key":"e_1_3_2_1_13_1","volume-title":"Machine Learning","volume":"20","author":"Cortes Corinna","year":"1995","unstructured":"Corinna Cortes and Vladimir Vapnik . 1995 . Support-Vector Networks . Machine Learning , Vol. 20 , 3 (1995). Corinna Cortes and Vladimir Vapnik. 1995. Support-Vector Networks. Machine Learning, Vol. 20, 3 (1995)."},{"key":"e_1_3_2_1_14_1","volume-title":"Online Passive-Aggressive Algorithms. Journal of Machine Learning Research (JMLR)","author":"Crammer Koby","year":"2006","unstructured":"Koby Crammer , Ofer Dekel , Joseph Keshet , Shai Shalev-Shwartz , and Yoram Singer . 2006. Online Passive-Aggressive Algorithms. Journal of Machine Learning Research (JMLR) ( 2006 ). Koby Crammer, Ofer Dekel, Joseph Keshet, Shai Shalev-Shwartz, and Yoram Singer. 2006. Online Passive-Aggressive Algorithms. Journal of Machine Learning Research (JMLR) (2006)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996758.2996769"},{"key":"e_1_3_2_1_16_1","volume-title":"Reverse engineering, Malware and goodware Analysis of Android applications. https:\/\/github.com\/androguard","author":"Desnos Anthony","year":"2019","unstructured":"Anthony Desnos . [n.,d.]. Androguard. Reverse engineering, Malware and goodware Analysis of Android applications. https:\/\/github.com\/androguard . Accessed : May 2019 . Anthony Desnos. [n.,d.]. Androguard. Reverse engineering, Malware and goodware Analysis of Android applications. https:\/\/github.com\/androguard. Accessed: May 2019."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390190"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of the ACM Conference on Learning Theory (COLT).","author":"Duchi John C.","year":"2010","unstructured":"John C. Duchi , Elad Hazan , and Yoram Singer . 2010 . Adaptive Subgradient Methods for Online Learning and Stochastic Optimization . In Proc. of the ACM Conference on Learning Theory (COLT). John C. Duchi, Elad Hazan, and Yoram Singer. 2010. Adaptive Subgradient Methods for Online Learning and Stochastic Optimization. In Proc. of the ACM Conference on Learning Theory (COLT)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"B. Frenay and M. Verleysen. 2014. Classification in the Presence of Label Noise: A Survey. IEEE Transactions on Neural Networks and Learning Systems (2014).  B. Frenay and M. Verleysen. 2014. Classification in the Presence of Label Noise: A Survey. IEEE Transactions on Neural Networks and Learning Systems (2014).","DOI":"10.1109\/TNNLS.2013.2292894"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1364-6613(99)01294-2"},{"key":"e_1_3_2_1_21_1","volume-title":"A survey on concept drift adaptation. Comput. Surveys","author":"Gama Jo","year":"2014","unstructured":"Jo a o Gama , Indre Zliobaite , Albert Bifet , Mykola Pechenizkiy , and Abdelhamid Bouchachia . 2014. A survey on concept drift adaptation. Comput. Surveys ( 2014 ). Jo a o Gama, Indre Zliobaite, Albert Bifet, Mykola Pechenizkiy, and Abdelhamid Bouchachia. 2014. A survey on concept drift adaptation. Comput. Surveys (2014)."},{"key":"e_1_3_2_1_22_1","unstructured":"Yves Grandvalet and Yoshua Bengio. 2004. Semi-supervised Learning by Entropy Minimization. In Advances in Neural Information Processing Systems (NeurIPS).  Yves Grandvalet and Yoshua Bengio. 2004. Semi-supervised Learning by Entropy Minimization. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of the USENIX Security Symposium.","author":"Jordaney Roberto","year":"2017","unstructured":"Roberto Jordaney , Kumar Sharad , Santanu K. Dash , Zhi Wang , Davide Papini , Ilia Nouretdinov , and Lorenzo Cavallaro . 2017 . Transcend: Detecting Concept Drift in Malware Classification Models . In Proc. of the USENIX Security Symposium. Roberto Jordaney, Kumar Sharad, Santanu K. Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, and Lorenzo Cavallaro. 2017. Transcend: Detecting Concept Drift in Malware Classification Models. In Proc. of the USENIX Security Symposium."},{"key":"e_1_3_2_1_24_1","volume-title":"AVPASS: Leaking and Bypassing Antivirus Detection Model Automatically. In Black Hat USA Briefings (Black Hat USA).","author":"Jung Jinho","year":"2017","unstructured":"Jinho Jung , Chanil Jeon , Max Wolotsky , Insu Yun , and Taesoo Kim . 2017 . AVPASS: Leaking and Bypassing Antivirus Detection Model Automatically. In Black Hat USA Briefings (Black Hat USA). Las Vegas, NV . Jinho Jung, Chanil Jeon, Max Wolotsky, Insu Yun, and Taesoo Kim. 2017. AVPASS: Leaking and Bypassing Antivirus Detection Model Automatically. In Black Hat USA Briefings (Black Hat USA). Las Vegas, NV."},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. of the ACM Workshop on Artificial Intelligence and Security (AISec).","author":"Kantchelian Alex","unstructured":"Alex Kantchelian , Sadia Afroz , Ling Huang , Aylin Caliskan Islam , Brad Miller , Michael Carl Tschantz , Rachel Greenstadt , Anthony D. Joseph , and J. D. Tygar . 2013. Approaches to adversarial drift . In Proc. of the ACM Workshop on Artificial Intelligence and Security (AISec). Alex Kantchelian, Sadia Afroz, Ling Huang, Aylin Caliskan Islam, Brad Miller, Michael Carl Tschantz, Rachel Greenstadt, Anthony D. Joseph, and J. D. Tygar. 2013. Approaches to adversarial drift. In Proc. of the ACM Workshop on Artificial Intelligence and Security (AISec)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11651"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. of the USENIX Security Symposium.","author":"Kharraz Amin","year":"2016","unstructured":"Amin Kharraz , Sajjad Arshad , Collin Mulliner , William K. Robertson , and Engin Kirda . 2016 . UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware . In Proc. of the USENIX Security Symposium. Amin Kharraz, Sajjad Arshad, Collin Mulliner, William K. Robertson, and Engin Kirda. 2016. UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. In Proc. of the USENIX Security Symposium."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1611835114"},{"key":"e_1_3_2_1_29_1","unstructured":"Balaji Lakshminarayanan Alexander Pritzel and Charles Blundell. 2017. Simple and Scalable Predictive Uncertainty Estimation using Deep Ensembles. In Advances in Neural Information Processing Systems (NeurIPS).  Balaji Lakshminarayanan Alexander Pritzel and Charles Blundell. 2017. Simple and Scalable Predictive Uncertainty Estimation using Deep Ensembles. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. of the ICML Workshop on Challenges in Representation Learning (WREPL).","author":"Lee Dong-Hyun","year":"2004","unstructured":"Dong-Hyun Lee . 2004 . Pseudo-Label: The Simple and Efficient Semi-Supervised Learning Method for Deep Neural Networks . In Proc. of the ICML Workshop on Challenges in Representation Learning (WREPL). Dong-Hyun Lee. 2004. Pseudo-Label: The Simple and Efficient Semi-Supervised Learning Method for Deep Neural Networks. In Proc. of the ICML Workshop on Challenges in Representation Learning (WREPL)."},{"key":"e_1_3_2_1_31_1","volume-title":"Gale","author":"Lewis David D.","year":"1994","unstructured":"David D. Lewis and William A . Gale . 1994 . A Sequential Algorithm for Training Text Classifiers. In SIGIR. ACM\/Springer , 3--12. David D. Lewis and William A. Gale. 1994. A Sequential Algorithm for Training Text Classifiers. In SIGIR. ACM\/Springer, 3--12."},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. of the International Conference on Machine Learning (ICML).","author":"Lipton Zachary C.","unstructured":"Zachary C. Lipton , Yu-Xiang Wang , and Alexander J. Smola . 2018. Detecting and Correcting for Label Shift with Black Box Predictors . In Proc. of the International Conference on Machine Learning (ICML). Zachary C. Lipton, Yu-Xiang Wang, and Alexander J. Smola. 2018. Detecting and Correcting for Label Shift with Black Box Predictors. In Proc. of the International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23353"},{"key":"e_1_3_2_1_34_1","volume-title":"Cohen","author":"McCloskey Michael","year":"1989","unstructured":"Michael McCloskey and Neal J . Cohen . 1989 . Catastrophic Interference in Connectionist Networks : The Sequential Learning Problem. Psychology of Learning and Motivation, Vol. 24 . Academic Press , 109--165. Michael McCloskey and Neal J. Cohen. 1989. Catastrophic Interference in Connectionist Networks: The Sequential Learning Problem. Psychology of Learning and Motivation, Vol. 24. Academic Press, 109--165."},{"key":"e_1_3_2_1_35_1","volume-title":"Proc. of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA).","author":"Miller Brad","unstructured":"Brad Miller , Alex Kantchelian , Michael Carl Tschantz , Sadia Afroz , Rekha Bachwani , Riyaz Faizullabhoy , Ling Huang , Vaishaal Shankar , Tony Wu , George Yiu , Anthony D. Joseph , and J. D. Tygar . 2016. Reviewer Integration and Performance Measurement for Malware Detection . In Proc. of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph, and J. D. Tygar. 2016. Reviewer Integration and Performance Measurement for Malware Detection. In Proc. of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)."},{"key":"e_1_3_2_1_36_1","volume-title":"A unifying view on dataset shift in classification. Pattern Recognition","author":"Moreno-Torres Jose G.","year":"2012","unstructured":"Jose G. Moreno-Torres , Troy Raeder , Roc\u00edo Ala\u00edz-Rodr\u00edguez , Nitesh V. Chawla , and Francisco Herrera . 2012. A unifying view on dataset shift in classification. Pattern Recognition ( 2012 ). Jose G. Moreno-Torres, Troy Raeder, Roc\u00edo Ala\u00edz-Rodr\u00edguez, Nitesh V. Chawla, and Francisco Herrera. 2012. A unifying view on dataset shift in classification. Pattern Recognition (2012)."},{"key":"e_1_3_2_1_37_1","volume-title":"In-the-Wild Age Database. In CVPR Workshops. IEEE Computer Society","author":"Moschoglou Stylianos","year":"2017","unstructured":"Stylianos Moschoglou , Athanasios Papaioannou , Christos Sagonas , Jiankang Deng , Irene Kotsia , and Stefanos Zafeiriou . 2017 . AgeDB: The First Manually Collected , In-the-Wild Age Database. In CVPR Workshops. IEEE Computer Society , 1997--2005. Stylianos Moschoglou, Athanasios Papaioannou, Christos Sagonas, Jiankang Deng, Irene Kotsia, and Stefanos Zafeiriou. 2017. AgeDB: The First Manually Collected, In-the-Wild Age Database. In CVPR Workshops. IEEE Computer Society, 1997--2005."},{"key":"e_1_3_2_1_38_1","volume-title":"Adaptive, and Scalable Android Malware Detection Through Online Learning","author":"Narayanan Annamalai","year":"2017","unstructured":"Annamalai Narayanan , Mahinthan Chandramohan , Lihui Chen , and Yang Liu . 2017. Context-Aware , Adaptive, and Scalable Android Malware Detection Through Online Learning . IEEE Transactions on Emerging Topics in Computational Intelligence (TETCI) ( 2017 ). Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, and Yang Liu. 2017. Context-Aware, Adaptive, and Scalable Android Malware Detection Through Online Learning. IEEE Transactions on Emerging Topics in Computational Intelligence (TETCI) (2017)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727508"},{"key":"e_1_3_2_1_40_1","volume-title":"McDaniel","author":"Papernot Nicolas","year":"2018","unstructured":"Nicolas Papernot and Patrick D . McDaniel . 2018 . Deep k-Nearest Neighbors : Towards Confident, Interpretable and Robust Deep Learning. CoRR , Vol. abs\/ 1803 .04765 (2018). arxiv: 1803.04765 Nicolas Papernot and Patrick D. McDaniel. 2018. Deep k-Nearest Neighbors: Towards Confident, Interpretable and Robust Deep Learning. CoRR, Vol. abs\/1803.04765 (2018). arxiv: 1803.04765"},{"key":"e_1_3_2_1_41_1","volume-title":"Proc. of the USENIX Security Symposium.","author":"Pendlebury Feargus","year":"2019","unstructured":"Feargus Pendlebury , Fabio Pierazzi , Roberto Jordaney , Johannes Kinder , and Lorenzo Cavallaro . 2019 . TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time . In Proc. of the USENIX Security Symposium. Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, and Lorenzo Cavallaro. 2019. TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. In Proc. of the USENIX Security Symposium."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00073"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Joaquin Quionero-Candela Masashi Sugiyama Anton Schwaighofer and Neil D. Lawrence. 2009. Dataset Shift in Machine Learning. The MIT Press.  Joaquin Quionero-Candela Masashi Sugiyama Anton Schwaighofer and Neil D. Lawrence. 2009. Dataset Shift in Machine Learning. The MIT Press.","DOI":"10.7551\/mitpress\/9780262170055.001.0001"},{"key":"e_1_3_2_1_44_1","volume-title":"Proc. of the International Conference on Learning Representations (ICLR).","author":"Rizve Mamshad Nayeem","year":"2021","unstructured":"Mamshad Nayeem Rizve , Kevin Duarte , Yogesh Singh Rawat , and Mubarak Shah . 2021 a In Defense of Pseudo-Labeling: An Uncertainty-Aware Pseudo-label Selection Framework for Semi-Supervised Learning . In Proc. of the International Conference on Learning Representations (ICLR). Mamshad Nayeem Rizve, Kevin Duarte, Yogesh Singh Rawat, and Mubarak Shah. 2021 a In Defense of Pseudo-Labeling: An Uncertainty-Aware Pseudo-label Selection Framework for Semi-Supervised Learning. In Proc. of the International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_45_1","volume-title":"2021 b. In defense of pseudo-labeling: An uncertainty-aware pseudo-label selection framework for semi-supervised learning. arXiv preprint arXiv:2101.06329","author":"Rizve Mamshad Nayeem","year":"2021","unstructured":"Mamshad Nayeem Rizve , Kevin Duarte , Yogesh S Rawat , and Mubarak Shah . 2021 b. In defense of pseudo-labeling: An uncertainty-aware pseudo-label selection framework for semi-supervised learning. arXiv preprint arXiv:2101.06329 ( 2021 ). Mamshad Nayeem Rizve, Kevin Duarte, Yogesh S Rawat, and Mubarak Shah. 2021 b. In defense of pseudo-labeling: An uncertainty-aware pseudo-label selection framework for semi-supervised learning. arXiv preprint arXiv:2101.06329 (2021)."},{"key":"e_1_3_2_1_46_1","volume-title":"Microsoft Malware Classification Challenge. CoRR","author":"Ronen Royi","year":"2018","unstructured":"Royi Ronen , Marian Radu , Corina Feuerstein , Elad Yom-Tov , and Mansour Ahmadi . 2018. Microsoft Malware Classification Challenge. CoRR , Vol. abs\/ 1802 .10135 ( 2018 ). Royi Ronen, Marian Radu, Corina Feuerstein, Elad Yom-Tov, and Mansour Ahmadi. 2018. Microsoft Malware Classification Challenge. CoRR, Vol. abs\/1802.10135 (2018)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465361"},{"key":"e_1_3_2_1_48_1","volume-title":"Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, and Prateek Mittal.","author":"Sehwag Vikash","year":"2019","unstructured":"Vikash Sehwag , Arjun Nitin Bhagoji , Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, and Prateek Mittal. 2019 . Better the Devil you Know : An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples. CoRR , Vol. abs\/ 1905 .01726 (2019). Vikash Sehwag, Arjun Nitin Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, and Prateek Mittal. 2019. Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples. CoRR, Vol. abs\/1905.01726 (2019)."},{"key":"e_1_3_2_1_50_1","volume-title":"Active Learning","author":"Settles Burr","unstructured":"Burr Settles . 2012. Active Learning . Morgan & Claypool Publishers . Burr Settles. 2012. Active Learning. Morgan & Claypool Publishers."},{"key":"e_1_3_2_1_51_1","volume-title":"Kurt Mehlhorn, and Karsten M. Borgwardt.","author":"Shervashidze Nino","year":"2011","unstructured":"Nino Shervashidze , Pascal Schweitzer , Erik Jan van Leeuwen , Kurt Mehlhorn, and Karsten M. Borgwardt. 2011 . Weisfeiler-Lehman Graph Kernels. Journal of Machine Learning Research (JMLR) ( 2011). Nino Shervashidze, Pascal Schweitzer, Erik Jan van Leeuwen, Kurt Mehlhorn, and Karsten M. Borgwardt. 2011. Weisfeiler-Lehman Graph Kernels. Journal of Machine Learning Research (JMLR) (2011)."},{"key":"e_1_3_2_1_52_1","volume-title":"ECCV (5) (Lecture Notes in Computer Science","author":"Shi Weiwei","unstructured":"Weiwei Shi , Yihong Gong , Chris Ding , Zhiheng Ma , Xiaoyu Tao , and Nanning Zheng . 2018. Transductive Semi-Supervised Deep Learning Using Min-Max Features . In ECCV (5) (Lecture Notes in Computer Science , Vol. 11209). Springer, 311-- 327 . Weiwei Shi, Yihong Gong, Chris Ding, Zhiheng Ma, Xiaoyu Tao, and Nanning Zheng. 2018. Transductive Semi-Supervised Deep Learning Using Min-Max Features. In ECCV (5) (Lecture Notes in Computer Science, Vol. 11209). Springer, 311--327."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381896.2381910"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-020-00105-y"},{"key":"e_1_3_2_1_55_1","volume-title":"Rosli Salleh, and Lorenzo Cavallaro.","author":"Tam Kimberly","year":"2017","unstructured":"Kimberly Tam , Ali Feizollah , Nor Badrul Anuar , Rosli Salleh, and Lorenzo Cavallaro. 2017 . The Evolution of Android Malware and Android Analysis Techniques. Comput. Surveys ( 2017). Kimberly Tam, Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, and Lorenzo Cavallaro. 2017. The Evolution of Android Malware and Android Analysis Techniques. Comput. Surveys (2017)."},{"key":"e_1_3_2_1_56_1","volume-title":"Proc. of the USENIX Security Symposium.","author":"Tong Liang","year":"2019","unstructured":"Liang Tong , Bo Li , Chen Hajaj , Chaowei Xiao , Ning Zhang , and Yevgeniy Vorobeychik . 2019 . Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features . In Proc. of the USENIX Security Symposium. Liang Tong, Bo Li, Chen Hajaj, Chaowei Xiao, Ning Zhang, and Yevgeniy Vorobeychik. 2019. Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features. In Proc. of the USENIX Security Symposium."},{"key":"e_1_3_2_1_57_1","volume-title":"Proc. of the PMLR Workshop on Conformal Prediction and its Applications (COPA)","volume":"91","author":"Vovk Vladimir","year":"2018","unstructured":"Vladimir Vovk , Ilia Nouretdinov , Valery Manokhin , and Alexander Gammerman . 2018 . Cross-conformal predictive distributions . In Proc. of the PMLR Workshop on Conformal Prediction and its Applications (COPA) , Vol. 91 . PMLR. Vladimir Vovk, Ilia Nouretdinov, Valery Manokhin, and Alexander Gammerman. 2018. Cross-conformal predictive distributions. In Proc. of the PMLR Workshop on Conformal Prediction and its Applications (COPA), Vol. 91. PMLR."},{"key":"e_1_3_2_1_58_1","volume-title":"Dual Averaging Methods for Regularized Stochastic Learning and Online Optimization. Journal of Machine Learning Research (JMLR)","author":"Xiao Lin","year":"2010","unstructured":"Lin Xiao . 2010. Dual Averaging Methods for Regularized Stochastic Learning and Online Optimization. Journal of Machine Learning Research (JMLR) ( 2010 ). Lin Xiao. 2010. Dual Averaging Methods for Regularized Stochastic Learning and Online Optimization. Journal of Machine Learning Research (JMLR) (2010)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00014"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23115"},{"key":"e_1_3_2_1_61_1","volume-title":"Proc. of the USENIX Security Symposium.","author":"Yang Limin","year":"2021","unstructured":"Limin Yang , Wenbo Guo , Qingying Hao , Arridhana Ciptadi , Ali Ahmadzadehand , Xinyu Xing , and Gang Wang . 2021 . CADE: Detecting and Explaining Concept Drift Samples for Security Applications . In Proc. of the USENIX Security Symposium. Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadehand, Xinyu Xing, and Gang Wang. 2021. CADE: Detecting and Explaining Concept Drift Samples for Security Applications. In Proc. of the USENIX Security Symposium."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417291"},{"key":"e_1_3_2_1_63_1","volume-title":"Proc. of the International Conference on Machine Learning (ICML).","author":"Zinkevich Martin","year":"2003","unstructured":"Martin Zinkevich . 2003 . Online Convex Programming and Generalized Infinitesimal Gradient Ascent . In Proc. of the International Conference on Machine Learning (ICML). Martin Zinkevich. 2003. Online Convex Programming and Generalized Infinitesimal Gradient Ascent. In Proc. of the International Conference on Machine Learning (ICML)."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474369.3486873","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474369.3486873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:26Z","timestamp":1750188626000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474369.3486873"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":62,"alternative-id":["10.1145\/3474369.3486873","10.1145\/3474369"],"URL":"https:\/\/doi.org\/10.1145\/3474369.3486873","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}