{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:45Z","timestamp":1750220265236,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T00:00:00Z","timestamp":1645660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,24]]},"DOI":"10.1145\/3524304.3524312","type":"proceedings-article","created":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T16:13:59Z","timestamp":1654532039000},"page":"55-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Fast identification method of malicious code based on extreme learning machine"],"prefix":"10.1145","author":[{"given":"Bei","family":"Gong","sequence":"first","affiliation":[{"name":"Beijing university of technology, China"}]},{"given":"Zhenhu","family":"Ning","sequence":"additional","affiliation":[{"name":"Beijing university of technology, China"}]},{"given":"Junmiao","family":"Liang","sequence":"additional","affiliation":[{"name":"Beijing university of technology, China"}]},{"given":"Shanshan","family":"Tu","sequence":"additional","affiliation":[{"name":"Beijing university of technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_2_1","first-page":"985","volume-title":"IEEE International Joint Conference on Neural Networks","author":"Huang G B","year":"2004","unstructured":"Huang G B , Zhu Q Y , Siew C K . Extreme learning machine: a new learning scheme of feedforward neural networks[C] . IEEE International Joint Conference on Neural Networks , 2004 , 2: 985 - 990 . Huang G B, Zhu Q Y, Siew C K. Extreme learning machine: a new learning scheme of feedforward neural networks[C]. IEEE International Joint Conference on Neural Networks, 2004, 2: 985-990."},{"key":"e_1_3_2_1_3_1","first-page":"985","volume-title":"IEEE International Joint Conference on Neural Networks","author":"Huang G B","year":"2004","unstructured":"Huang G B , Zhu Q Y , Siew C K . Extreme learning machine: a new learning scheme of feedforward neural networks[C] . IEEE International Joint Conference on Neural Networks , 2004 , 2: 985 - 990 . Huang G B, Zhu Q Y, Siew C K. Extreme learning machine: a new learning scheme of feedforward neural networks[C]. IEEE International Joint Conference on Neural Networks, 2004, 2: 985-990."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.03.015"},{"volume-title":"Malware images: visualization and automatic classification[C]\/\/Proceedings of the 8th international symposium on visualization for cyber security. 2011: 1-7","author":"Nataraj L","key":"e_1_3_2_1_5_1","unstructured":"Nataraj L , Karthikeyan S , Jacob G , Malware images: visualization and automatic classification[C]\/\/Proceedings of the 8th international symposium on visualization for cyber security. 2011: 1-7 . Nataraj L, Karthikeyan S, Jacob G, Malware images: visualization and automatic classification[C]\/\/Proceedings of the 8th international symposium on visualization for cyber security. 2011: 1-7."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.06.014"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2474-6"},{"key":"e_1_3_2_1_8_1","volume-title":"Microsoft malware classification challenge[J]. arXiv preprint arXiv:1802.10135","author":"Ronen R","year":"2018","unstructured":"Ronen R , Radu M , Feuerstein C , Microsoft malware classification challenge[J]. arXiv preprint arXiv:1802.10135 , 2018 . Ronen R, Radu M, Feuerstein C, Microsoft malware classification challenge[J]. arXiv preprint arXiv:1802.10135, 2018."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2018.07.011"},{"key":"e_1_3_2_1_10_1","volume-title":"Cost-sensitive learning of deep feature representations from imbalanced data[J]","author":"Khan S H","year":"2017","unstructured":"Khan S H , Hayat M , Bennamoun M , Cost-sensitive learning of deep feature representations from imbalanced data[J] . IEEE transactions on neural networks and learning systems, 2017 , 29(8): 3573-3587. Khan S H, Hayat M, Bennamoun M, Cost-sensitive learning of deep feature representations from imbalanced data[J]. IEEE transactions on neural networks and learning systems, 2017, 29(8): 3573-3587."}],"event":{"name":"ICSCA 2022: 2022 11th International Conference on Software and Computer Applications","acronym":"ICSCA 2022","location":"Melaka Malaysia"},"container-title":["2022 11th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524304.3524312","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3524304.3524312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:57Z","timestamp":1750188657000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524304.3524312"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,24]]},"references-count":10,"alternative-id":["10.1145\/3524304.3524312","10.1145\/3524304"],"URL":"https:\/\/doi.org\/10.1145\/3524304.3524312","relation":{},"subject":[],"published":{"date-parts":[[2022,2,24]]},"assertion":[{"value":"2022-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}