{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:09Z","timestamp":1750220469603,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3488932.3497763","type":"proceedings-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T04:23:26Z","timestamp":1653366206000},"page":"479-493","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards a Utopia of Dataset Sharing"],"prefix":"10.1145","author":[{"given":"Ping-Jui","family":"Chuang","sequence":"first","affiliation":[{"name":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan Roc"}]},{"given":"Chih-Fan","family":"Hsu","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan Roc"}]},{"given":"Yung-Tien","family":"Chu","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan Roc"}]},{"given":"Szu-Chun","family":"Huang","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan Roc"}]},{"given":"Chun-Ying","family":"Huang","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan Roc"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n.d.]. VirusTotal. https:\/\/www.virustotal.com\/  [n.d.]. VirusTotal. https:\/\/www.virustotal.com\/"},{"key":"e_1_3_2_2_2_1","unstructured":"2018. A free resource for researchers and practitioners to find and follow the latest state-of-the-art ML papers and code. Online. https:\/\/paperswithcode.com\/.  2018. A free resource for researchers and practitioners to find and follow the latest state-of-the-art ML papers and code. Online. https:\/\/paperswithcode.com\/."},{"key":"e_1_3_2_2_3_1","unstructured":"2019. APT Malware Dataset. Online. https:\/\/github.com\/cyber-research\/ APTMalware.  2019. APT Malware Dataset. Online. https:\/\/github.com\/cyber-research\/ APTMalware."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24310"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857713"},{"volume-title":"Security in Computing and Communications, Sabu M. Thampi, Gregorio Martinez Perez, Ryan Ko, and Danda B","author":"Ajeena Beegom A. S.","key":"e_1_3_2_2_7_1","unstructured":"A. S. Ajeena Beegom and Gayatri Ashok . 2020. Malware Detection in Android Applications Using Integrated Static Features . In Security in Computing and Communications, Sabu M. Thampi, Gregorio Martinez Perez, Ryan Ko, and Danda B . Rawat (Eds.). Springer Singapore , Singapore , 1--10. A. S. Ajeena Beegom and Gayatri Ashok. 2020. Malware Detection in Android Applications Using Integrated Static Features. In Security in Computing and Communications, Sabu M. Thampi, Gregorio Martinez Perez, Ryan Ko, and Danda B. Rawat (Eds.). Springer Singapore, Singapore, 1--10."},{"key":"e_1_3_2_2_8_1","volume-title":"EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models. ArXiv e-prints (April","author":"Anderson H. S.","year":"2018","unstructured":"H. S. Anderson and P. Roth . 2018 . EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models. ArXiv e-prints (April 2018). arxiv: 1804.04637 [cs.CR] H. S. Anderson and P. Roth. 2018. EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models. ArXiv e-prints (April 2018). arxiv: 1804.04637 [cs.CR]"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/IKT.2013.6620049"},{"key":"e_1_3_2_2_10_1","volume-title":"David Petrou, Daniel Ramage, and Jason Roselander.","author":"Bonawitz Keith","year":"2019","unstructured":"Keith Bonawitz , Hubert Eichner , Wolfgang Grieskamp , Dzmitry Huba , Alex Ingerman , Vladimir Ivanov , Chloe Kiddon , Jakub Konecny , Stefano Mazzocchi , H. Brendan McMahan , Timon Van Overveldt , David Petrou, Daniel Ramage, and Jason Roselander. 2019 . Towards Federated Learning at Scale : System Design . http:\/\/arxiv.org\/abs\/1902.01046 cite arxiv:1902.01046. Keith Bonawitz, Hubert Eichner, Wolfgang Grieskamp, Dzmitry Huba, Alex Ingerman, Vladimir Ivanov, Chloe Kiddon, Jakub Konecny, Stefano Mazzocchi, H. Brendan McMahan, Timon Van Overveldt, David Petrou, Daniel Ramage, and Jason Roselander. 2019. Towards Federated Learning at Scale: System Design. http:\/\/arxiv.org\/abs\/1902.01046 cite arxiv:1902.01046."},{"key":"e_1_3_2_2_11_1","volume-title":"YARIX: Scalable YARA-based Malware Intelligence. In USENIX Security Symposium.","author":"Brengel Michael","year":"2021","unstructured":"Michael Brengel and Christian Rossow . 2021 . YARIX: Scalable YARA-based Malware Intelligence. In USENIX Security Symposium. Michael Brengel and Christian Rossow. 2021. YARIX: Scalable YARA-based Malware Intelligence. In USENIX Security Symposium."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/829502.830043"},{"key":"e_1_3_2_2_13_1","volume-title":"Ogerta Elezaj","author":"Catak Ferhat Ozgur","year":"2020","unstructured":"Ferhat Ozgur Catak , Ahmet Faruk Yaz? , Ogerta Elezaj , and Javed Ahmed. 2020 . Deep learning based Sequential model for malware analysis using Windows exe API Calls. PeerJ Computer Science , Vol. 6 (July 2020), e285. https:\/\/doi.org\/10.7717\/peerj-cs.285 10.7717\/peerj-cs.285 Ferhat Ozgur Catak, Ahmet Faruk Yaz?, Ogerta Elezaj, and Javed Ahmed. 2020. Deep learning based Sequential model for malware analysis using Windows exe API Calls. PeerJ Computer Science, Vol. 6 (July 2020), e285. https:\/\/doi.org\/10.7717\/peerj-cs.285"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509965"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_2_16_1","volume-title":"Heng Yin, Xiaorui Pan, Tongxin Li, Xueqiang Wang, and XiaoFeng Wang.","author":"Duan Yue","year":"2018","unstructured":"Yue Duan , Mu Zhang , Abhishek Vasisht Bhaskar , Heng Yin, Xiaorui Pan, Tongxin Li, Xueqiang Wang, and XiaoFeng Wang. 2018 . Things You May Not Know About Android (Un) Packers: A Systematic Study based on Whole-System Emulation.. In NDSS. Yue Duan, Mu Zhang, Abhishek Vasisht Bhaskar, Heng Yin, Xiaorui Pan, Tongxin Li, Xueqiang Wang, and XiaoFeng Wang. 2018. Things You May Not Know About Android (Un) Packers: A Systematic Study based on Whole-System Emulation.. In NDSS."},{"key":"e_1_3_2_2_17_1","volume-title":"Differential Privacy: A Survey of Results. In Theory and Applications of Models of Computation,","author":"Dwork Cynthia","year":"2008","unstructured":"Cynthia Dwork . 2008 . Differential Privacy: A Survey of Results. In Theory and Applications of Models of Computation, , Manindra Agrawal, Dingzhu Du, Zhenhua Duan, and Angsheng Li (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 1--19. Cynthia Dwork. 2008. Differential Privacy: A Survey of Results. In Theory and Applications of Models of Computation,, Manindra Agrawal, Dingzhu Du, Zhenhua Duan, and Angsheng Li (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1--19."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.11.001"},{"key":"e_1_3_2_2_19_1","volume-title":"MobiDroid: A Performance-Sensitive Malware Detection System on Mobile Platform. In 2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS). 61--70","author":"Feng Ruitao","year":"2019","unstructured":"Ruitao Feng , Sen Chen , Xiaofei Xie , Lei Ma , Guozhu Meng , Yang Liu , and Shang-Wei Lin . 2019 . MobiDroid: A Performance-Sensitive Malware Detection System on Mobile Platform. In 2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS). 61--70 . https:\/\/doi.org\/10.1109\/ICECCS.2019.00014 10.1109\/ICECCS.2019.00014 Ruitao Feng, Sen Chen, Xiaofei Xie, Lei Ma, Guozhu Meng, Yang Liu, and Shang-Wei Lin. 2019. MobiDroid: A Performance-Sensitive Malware Detection System on Mobile Platform. In 2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS). 61--70. https:\/\/doi.org\/10.1109\/ICECCS.2019.00014"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101873"},{"key":"e_1_3_2_2_21_1","volume-title":"Rudd","author":"Harang Richard","year":"2020","unstructured":"Richard Harang and Ethan M . Rudd . 2020 . SOREL-20M: A Large Scale Benchmark Dataset for Malicious PE Detection . arxiv: 2012.07634 [cs.CR] Richard Harang and Ethan M. Rudd. 2020. SOREL-20M: A Large Scale Benchmark Dataset for Malicious PE Detection. arxiv: 2012.07634 [cs.CR]"},{"key":"e_1_3_2_2_22_1","volume-title":"Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 770--778","author":"He Kaiming","year":"2016","unstructured":"Kaiming He , Xiangyu Zhang , Shaoqing Ren , and Jian Sun . 2016 . Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 770--778 . https:\/\/doi.org\/10.1109\/CVPR.2016.90 10.1109\/CVPR.2016.90 Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 770--778. https:\/\/doi.org\/10.1109\/CVPR.2016.90"},{"volume-title":"Media Watermarking, Security, and Forensics III,, Nasir D","author":"Hsu Chao-Yung","key":"e_1_3_2_2_23_1","unstructured":"Chao-Yung Hsu , Chun-Shien Lu , and Soo-Chang Pei . 2011. Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction . In Media Watermarking, Security, and Forensics III,, Nasir D . Memon, Jana Dittmann, Adnan M. Alattar, and Edward J. Delp III (Eds.), Vol. 7880 . International Society for Optics and Photonics, SPIE , 32--48. https:\/\/doi.org\/10.1117\/12.873325 10.1117\/12.873325 Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei. 2011. Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction. In Media Watermarking, Security, and Forensics III,, Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, and Edward J. Delp III (Eds.), Vol. 7880. International Society for Optics and Photonics, SPIE, 32--48. https:\/\/doi.org\/10.1117\/12.873325"},{"key":"e_1_3_2_2_24_1","unstructured":"Cylance Inc. 2012. VirusShare.com - Because Sharing is Caring. Online. https:\/\/virusshare.com\/.  Cylance Inc. 2012. VirusShare.com - Because Sharing is Caring. Online. https:\/\/virusshare.com\/."},{"key":"e_1_3_2_2_25_1","volume-title":"Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks. Big Data Analytics for Cyber Security","author":"Jeong Young-Seob","year":"2019","unstructured":"Young-Seob Jeong , Jiyoung Woo , and Ah Reum Kang . 2019. Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks. Big Data Analytics for Cyber Security , Vol. 2019 ( 2019 ), AID 8485365. Young-Seob Jeong, Jiyoung Woo, and Ah Reum Kang. 2019. Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks. Big Data Analytics for Cyber Security, Vol. 2019 (2019), AID 8485365."},{"key":"e_1_3_2_2_26_1","volume-title":"Martin","author":"Jurafsky Daniel","year":"2009","unstructured":"Daniel Jurafsky and James H . Martin . 2009 . Speech and Language Processing (2nd Edition). Prentice-Hall , Inc., USA. Daniel Jurafsky and James H. Martin. 2009. Speech and Language Processing (2nd Edition). Prentice-Hall, Inc., USA."},{"key":"e_1_3_2_2_27_1","unstructured":"Kaggle. 2013. Dogs vs. Cats. Online. https:\/\/www.kaggle.com\/c\/dogs-vs-cats.  Kaggle. 2013. Dogs vs. Cats. Online. https:\/\/www.kaggle.com\/c\/dogs-vs-cats."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC45622.2019.8938236"},{"key":"e_1_3_2_2_29_1","unstructured":"Kaspersky. 2019. Check if your device has been targeted by the ShadowHammer cyberattack. Online. https:\/\/shadowhammer.kaspersky.com\/.  Kaspersky. 2019. Check if your device has been targeted by the ShadowHammer cyberattack. Online. https:\/\/shadowhammer.kaspersky.com\/."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24475"},{"key":"e_1_3_2_2_31_1","volume-title":"Think locally, act globally: Federated learning with local and global representations. arXiv preprint arXiv:2001.01523","author":"Liang Paul Pu","year":"2020","unstructured":"Paul Pu Liang , Terrance Liu , Liu Ziyin , Ruslan Salakhutdinov , and Louis-Philippe Morency . 2020. Think locally, act globally: Federated learning with local and global representations. arXiv preprint arXiv:2001.01523 ( 2020 ). Paul Pu Liang, Terrance Liu, Liu Ziyin, Ruslan Salakhutdinov, and Louis-Philippe Morency. 2020. Think locally, act globally: Federated learning with local and global representations. arXiv preprint arXiv:2001.01523 (2020)."},{"key":"e_1_3_2_2_32_1","volume-title":"Using Federated Learning on Malware Classification. In 2020 22nd International Conference on Advanced Communication Technology (ICACT). 585--589","author":"Lin Kuang-Yao","year":"2020","unstructured":"Kuang-Yao Lin and Wei-Ren Huang . 2020 . Using Federated Learning on Malware Classification. In 2020 22nd International Conference on Advanced Communication Technology (ICACT). 585--589 . https:\/\/doi.org\/10.23919\/ICACT48636.2020.9061261 10.23919\/ICACT48636.2020.9061261 Kuang-Yao Lin and Wei-Ren Huang. 2020. Using Federated Learning on Malware Classification. In 2020 22nd International Conference on Advanced Communication Technology (ICACT). 585--589. https:\/\/doi.org\/10.23919\/ICACT48636.2020.9061261"},{"key":"e_1_3_2_2_33_1","volume-title":"Ensemble Distillation for Robust Model Fusion in Federated Learning. CoRR","author":"Lin Tao","year":"2020","unstructured":"Tao Lin , Lingjing Kong , Sebastian U. Stich , and Martin Jaggi . 2020. Ensemble Distillation for Robust Model Fusion in Federated Learning. CoRR , Vol. abs\/ 2006 .07242 ( 2020 ). arxiv: 2006.07242 https:\/\/arxiv.org\/abs\/2006.07242 Tao Lin, Lingjing Kong, Sebastian U. Stich, and Martin Jaggi. 2020. Ensemble Distillation for Robust Model Fusion in Federated Learning. CoRR, Vol. abs\/2006.07242 (2020). arxiv: 2006.07242 https:\/\/arxiv.org\/abs\/2006.07242"},{"key":"e_1_3_2_2_34_1","volume-title":"Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem. In Network and Distributed System Security (NDSS) Symposium, NDSS","volume":"20","author":"Mantovani Alessandro","year":"2020","unstructured":"Alessandro Mantovani , Simone Aonzo , Xabier Ugarte-Pedrero , Alessio Merlo , and Davide Balzarotti . 2020 . Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem. In Network and Distributed System Security (NDSS) Symposium, NDSS , Vol. 20 . Alessandro Mantovani, Simone Aonzo, Xabier Ugarte-Pedrero, Alessio Merlo, and Davide Balzarotti. 2020. Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem. In Network and Distributed System Security (NDSS) Symposium, NDSS, Vol. 20."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0100148"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0944-y"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Lakshmanan Nataraj S. Karthikeyan Gregoire Jacob and B.S. Manjunath. 2011. Malware Images: Visualization and Automatic Classification. In International Symposium on Visualization for Cyber Security (VizSec). https:\/\/vision.ece.ucsb.edu\/sites\/default\/files\/publications\/nataraj_vizsec_2011_paper.pdf  Lakshmanan Nataraj S. Karthikeyan Gregoire Jacob and B.S. Manjunath. 2011. Malware Images: Visualization and Automatic Classification. In International Symposium on Visualization for Cyber Security (VizSec). https:\/\/vision.ece.ucsb.edu\/sites\/default\/files\/publications\/nataraj_vizsec_2011_paper.pdf","DOI":"10.1145\/2016904.2016908"},{"volume-title":"Applied Informatics,","author":"Odusami Modupe","key":"e_1_3_2_2_39_1","unstructured":"Modupe Odusami , Olusola Abayomi-Alli , Sanjay Misra , Olamilekan Shobayo , Robertas Damasevicius , and Rytis Maskeliunas . 2018. Android Malware Detection: A Survey . In Applied Informatics, , Hector Florez, Cesar Diaz, and Jaime Chavarriaga (Eds.). Springer International Publishing , Cham , 255--266. Modupe Odusami, Olusola Abayomi-Alli, Sanjay Misra, Olamilekan Shobayo, Robertas Damasevicius, and Rytis Maskeliunas. 2018. Android Malware Detection: A Survey. In Applied Informatics,, Hector Florez, Cesar Diaz, and Jaime Chavarriaga (Eds.). Springer International Publishing, Cham, 255--266."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2979670"},{"key":"e_1_3_2_2_41_1","unstructured":"Edward Raff Jon Barker Jared Sylvester Robert Brandon Bryan Catanzaro and Charles Nicholas. 2017. Malware Detection by Eating a Whole EXE. arxiv: 1710.09435 [stat.ML]  Edward Raff Jon Barker Jared Sylvester Robert Brandon Bryan Catanzaro and Charles Nicholas. 2017. Malware Detection by Eating a Whole EXE. arxiv: 1710.09435 [stat.ML]"},{"key":"#cr-split#-e_1_3_2_2_42_1.1","doi-asserted-by":"crossref","unstructured":"Jos\u00e9 Luis Rojo-\u00c1lvarez Manel Mart\u00ednez-Ram\u00f3n Jordi Mu\u00f1oz-Mar\u00ed and Gustau Camps-Valls. 2018. From Signal Processing to Machine Learning. 1--11. https:\/\/doi.org\/10.1002\/9781118705810.ch1 10.1002\/9781118705810.ch1","DOI":"10.1002\/9781118705810.ch1"},{"key":"#cr-split#-e_1_3_2_2_42_1.2","doi-asserted-by":"crossref","unstructured":"Jos\u00e9 Luis Rojo-\u00c1lvarez Manel Mart\u00ednez-Ram\u00f3n Jordi Mu\u00f1oz-Mar\u00ed and Gustau Camps-Valls. 2018. From Signal Processing to Machine Learning. 1--11. https:\/\/doi.org\/10.1002\/9781118705810.ch1","DOI":"10.1002\/9781118705810.ch1"},{"key":"e_1_3_2_2_43_1","volume-title":"Microsoft Malware Classification Challenge. CoRR","author":"Ronen Royi","year":"2018","unstructured":"Royi Ronen , Marian Radu , Corina Feuerstein , Elad Yom-Tov , and Mansour Ahmadi . 2018. Microsoft Malware Classification Challenge. CoRR , Vol. abs\/ 1802 .10135 ( 2018 ). arxiv: 1802.10135 http:\/\/arxiv.org\/abs\/1802.10135 Royi Ronen, Marian Radu, Corina Feuerstein, Elad Yom-Tov, and Mansour Ahmadi. 2018. Microsoft Malware Classification Challenge. CoRR, Vol. abs\/1802.10135 (2018). arxiv: 1802.10135 http:\/\/arxiv.org\/abs\/1802.10135"},{"key":"e_1_3_2_2_44_1","volume-title":"On the Convergence of Federated Optimization in Heterogeneous Networks. CoRR","author":"Sahu Anit Kumar","year":"2018","unstructured":"Anit Kumar Sahu , Tian Li , Maziar Sanjabi , Manzil Zaheer , Ameet Talwalkar , and Virginia Smith . 2018. On the Convergence of Federated Optimization in Heterogeneous Networks. CoRR , Vol. abs\/ 1812 .06127 ( 2018 ). arxiv: 1812.06127 http:\/\/arxiv.org\/abs\/1812.06127 Anit Kumar Sahu, Tian Li, Maziar Sanjabi, Manzil Zaheer, Ameet Talwalkar, and Virginia Smith. 2018. On the Convergence of Federated Optimization in Heterogeneous Networks. CoRR, Vol. abs\/1812.06127 (2018). arxiv: 1812.06127 http:\/\/arxiv.org\/abs\/1812.06127"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2017.8229841"},{"key":"e_1_3_2_2_48_1","volume-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition. In International Conference on Learning Representations.","author":"Simonyan Karen","year":"2015","unstructured":"Karen Simonyan and Andrew Zisserman . 2015 . Very Deep Convolutional Networks for Large-Scale Image Recognition. In International Conference on Learning Representations. Karen Simonyan and Andrew Zisserman. 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1979.4766902"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102483"},{"key":"e_1_3_2_2_51_1","volume-title":"Phung","author":"Vu Duc-Ly","year":"2019","unstructured":"Duc-Ly Vu , Trong-Kha Nguyen , Tam V. Nguyen , Tu N. Nguyen , Fabio Massacci , and Phu H . Phung . 2019 . A Convolutional Transformation Network for Malware Classification . arxiv: 1909.07227 [cs.CR] Duc-Ly Vu, Trong-Kha Nguyen, Tam V. Nguyen, Tu N. Nguyen, Fabio Massacci, and Phu H. Phung. 2019. A Convolutional Transformation Network for Malware Classification. arxiv: 1909.07227 [cs.CR]"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24167"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293318"},{"key":"e_1_3_2_2_54_1","volume-title":"ACM Comput. Surv.","volume":"53","author":"Wang Yaqing","year":"2020","unstructured":"Yaqing Wang , Quanming Yao , James T. Kwok , and Lionel M. Ni . 2020 b. Generalizing from a Few Examples: A Survey on Few-Shot Learning . ACM Comput. Surv. , Vol. 53 , 3, Article 63 ( 2020 ), 34 pages. https:\/\/doi.org\/10.1145\/3386252 10.1145\/3386252 Yaqing Wang, Quanming Yao, James T. Kwok, and Lionel M. Ni. 2020 b. Generalizing from a Few Examples: A Survey on Few-Shot Learning. ACM Comput. Surv., Vol. 53, 3, Article 63 (2020), 34 pages. https:\/\/doi.org\/10.1145\/3386252"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3014245"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264746.3264784"},{"key":"e_1_3_2_2_57_1","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID}","author":"Yuan Lun-Pin","year":"2019","unstructured":"Lun-Pin Yuan , Wenjun Hu , Ting Yu , Peng Liu , and Sencun Zhu . 2019 . Towards large-scale hunting for Android negative-day malware . In 22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2019). 533--545. Lun-Pin Yuan, Wenjun Hu, Ting Yu, Peng Liu, and Sencun Zhu. 2019. Towards large-scale hunting for Android negative-day malware. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2019). 533--545."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106775"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417291"},{"key":"e_1_3_2_2_60_1","volume-title":"Quick and Accurate Android Malware Detection Based on Sensitive APIs. In 2018 IEEE International Conference on Smart Internet of Things (SmartIoT). 143--148","author":"Zhao Chunlei","year":"2018","unstructured":"Chunlei Zhao , Wenbai Zheng , Liangyi Gong , Mengzhe Zhang , and Chundong Wang . 2018 . Quick and Accurate Android Malware Detection Based on Sensitive APIs. In 2018 IEEE International Conference on Smart Internet of Things (SmartIoT). 143--148 . https:\/\/doi.org\/10.1109\/SmartIoT.2018.00034 10.1109\/SmartIoT.2018.00034 Chunlei Zhao, Wenbai Zheng, Liangyi Gong, Mengzhe Zhang, and Chundong Wang. 2018. Quick and Accurate Android Malware Detection Based on Sensitive APIs. In 2018 IEEE International Conference on Smart Internet of Things (SmartIoT). 143--148. https:\/\/doi.org\/10.1109\/SmartIoT.2018.00034"},{"volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20). 2361--2378.","author":"Zhu Shuofei","key":"e_1_3_2_2_61_1","unstructured":"Shuofei Zhu , Jianjun Shi , Limin Yang , Boqin Qin , Ziyi Zhang , Linhai Song , and Gang Wang . 2020. Measuring and modeling the label dynamics of online anti-malware engines . In 29th {USENIX} Security Symposium ({USENIX} Security 20). 2361--2378. Shuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, and Gang Wang. 2020. Measuring and modeling the label dynamics of online anti-malware engines. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 2361--2378."}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Nagasaki Japan","acronym":"ASIA CCS '22"},"container-title":["Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3497763","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488932.3497763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:29Z","timestamp":1750193309000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3497763"}},"subtitle":["A Case Study on Machine Learning-based Malware Detection Algorithms"],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":62,"alternative-id":["10.1145\/3488932.3497763","10.1145\/3488932"],"URL":"https:\/\/doi.org\/10.1145\/3488932.3497763","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}