{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:33Z","timestamp":1750220313168,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,14]],"date-time":"2022-02-14T00:00:00Z","timestamp":1644796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,14]]},"DOI":"10.1145\/3511616.3513103","type":"proceedings-article","created":{"date-parts":[[2022,3,22]],"date-time":"2022-03-22T00:21:13Z","timestamp":1647908473000},"page":"91-95","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Statically Detecting Adversarial Malware through Randomised Chaining"],"prefix":"10.1145","author":[{"given":"Matthew","family":"Crawford","sequence":"first","affiliation":[{"name":"University of Adelaide, Australia"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Adelaide, Australia"}]},{"given":"Ruoxi","family":"Sun","sequence":"additional","affiliation":[{"name":"University of Adelaide, Australia"}]},{"given":"Minhui","family":"Xue","sequence":"additional","affiliation":[{"name":"University of Adelaide, Australia"}]}],"member":"320","published-online":{"date-parts":[[2022,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Cyber security statistics. https:\/\/purplesec.us\/resources\/cyber-security-statistics\/  [n.d.]. Cyber security statistics. https:\/\/purplesec.us\/resources\/cyber-security-statistics\/"},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Machine Learning in Cybersecurity. https:\/\/www.kaspersky.com\/enterprise-security\/wiki-section\/products\/machine-learning-in-cybersecurity  [n.d.]. Machine Learning in Cybersecurity. https:\/\/www.kaspersky.com\/enterprise-security\/wiki-section\/products\/machine-learning-in-cybersecurity"},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. Training the Avast machine learning engine. https:\/\/www.avast.com\/en-us\/technology\/ai-and-machine-learning  [n.d.]. Training the Avast machine learning engine. https:\/\/www.avast.com\/en-us\/technology\/ai-and-machine-learning"},{"key":"e_1_3_2_1_4_1","volume-title":"Ember: An open dataset for training static PE malware machine learning models. arXiv preprint arXiv:1804.04637(2018).","author":"Anderson S","year":"2018","unstructured":"Hyrum\u00a0 S Anderson and Phil Roth . 2018 . Ember: An open dataset for training static PE malware machine learning models. arXiv preprint arXiv:1804.04637(2018). Hyrum\u00a0S Anderson and Phil Roth. 2018. Ember: An open dataset for training static PE malware machine learning models. arXiv preprint arXiv:1804.04637(2018)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3072166"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3082330"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484543"},{"key":"e_1_3_2_1_8_1","volume-title":"In Proceedings of the Network and Distributed System Security Symposium, NDSS","author":"Laskov Pavel","year":"2013","unstructured":"Pavel Laskov . 2013 . Detection of malicious pdf files based on hierarchical document structure . In In Proceedings of the Network and Distributed System Security Symposium, NDSS 2013. Citeseer. Pavel Laskov. 2013. Detection of malicious pdf files based on hierarchical document structure. In In Proceedings of the Network and Distributed System Security Symposium, NDSS 2013. Citeseer."},{"key":"e_1_3_2_1_9_1","unstructured":"Deqiang Li Tian Qiu Shuo Chen Qianmu Li and Shouhuai Xu. 2021. Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?arxiv:2109.09654\u00a0[cs.CR]  Deqiang Li Tian Qiu Shuo Chen Qianmu Li and Shouhuai Xu. 2021. Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?arxiv:2109.09654\u00a0[cs.CR]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484576"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3021407"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420987"},{"key":"e_1_3_2_1_13_1","unstructured":"Wei Song Xuezixiang Li Sadia Afroz Deepali Garg Dmitry Kuznetsov and Heng Yin. 2020. MAB-Malware: A Reinforcement Learning Framework for Attacking Static Malware Classifiers. arXiv preprint arXiv:2003.03100(2020).  Wei Song Xuezixiang Li Sadia Afroz Deepali Garg Dmitry Kuznetsov and Heng Yin. 2020. MAB-Malware: A Reinforcement Learning Framework for Attacking Static Malware Classifiers. arXiv preprint arXiv:2003.03100(2020)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00101"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430615"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383219.3383247"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484547"},{"key":"e_1_3_2_1_18_1","unstructured":"Wei Wang Ruoxi Sun Tian Dong Shaofeng Li Minhui Xue Gareth Tyson and Haojin Zhu. 2021. Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks. arxiv:2111.10085\u00a0[cs.CR]  Wei Wang Ruoxi Sun Tian Dong Shaofeng Li Minhui Xue Gareth Tyson and Haojin Zhu. 2021. Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks. arxiv:2111.10085\u00a0[cs.CR]"},{"key":"e_1_3_2_1_19_1","volume-title":"Minhui Xue, Alina Oprea, and Haifeng Qian.","author":"Wen Jialin","year":"2021","unstructured":"Jialin Wen , Benjamin Zi\u00a0Hao Zhao , Minhui Xue, Alina Oprea, and Haifeng Qian. 2021 . With great dispersion comes greater resilience: Efficient poisoning attacks and defenses for linear regression models. IEEE Transactions on Information Forensics and Security ( 2021). Jialin Wen, Benjamin Zi\u00a0Hao Zhao, Minhui Xue, Alina Oprea, and Haifeng Qian. 2021. With great dispersion comes greater resilience: Efficient poisoning attacks and defenses for linear regression models. IEEE Transactions on Information Forensics and Security (2021)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468218.3469046"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23115"}],"event":{"name":"ACSW 2022: Australasian Computer Science Week 2022","acronym":"ACSW 2022","location":"Brisbane Australia"},"container-title":["Australasian Computer Science Week 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511616.3513103","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3511616.3513103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:47Z","timestamp":1750191107000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511616.3513103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,14]]},"references-count":21,"alternative-id":["10.1145\/3511616.3513103","10.1145\/3511616"],"URL":"https:\/\/doi.org\/10.1145\/3511616.3513103","relation":{},"subject":[],"published":{"date-parts":[[2022,2,14]]},"assertion":[{"value":"2022-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}