{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T06:00:18Z","timestamp":1770357618802,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","award":["NRF-2016K1A1A2912757"],"award-info":[{"award-number":["NRF-2016K1A1A2912757"]}],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2020R1A2C2009372"],"award-info":[{"award-number":["NRF-2020R1A2C2009372"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1145\/3545948.3545960","type":"proceedings-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T11:21:49Z","timestamp":1666005709000},"page":"308-320","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems"],"prefix":"10.1145","author":[{"given":"Ahmed","family":"Abusnaina","sequence":"first","affiliation":[{"name":"Meta, United States of America"}]},{"given":"Afsah","family":"Anwar","sequence":"additional","affiliation":[{"name":"Northeastern University, United States of America"}]},{"given":"Sultan","family":"Alshamrani","sequence":"additional","affiliation":[{"name":"University of Central Florida, United States of America"}]},{"given":"Abdulrahman","family":"Alabduljabbar","sequence":"additional","affiliation":[{"name":"University of Central Florida, United States of America"}]},{"given":"RhongHo","family":"Jang","sequence":"additional","affiliation":[{"name":"Wayne State University, United States of America"}]},{"given":"DaeHun","family":"Nyang","sequence":"additional","affiliation":[{"name":"Ewha Womans University, South Korea"}]},{"given":"David","family":"Mohaisen","sequence":"additional","affiliation":[{"name":"University of Central Florida, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. CyberIOCs. Available at [Online]: https:\/\/freeiocs.cyberiocs.pro\/.  2019. CyberIOCs. Available at [Online]: https:\/\/freeiocs.cyberiocs.pro\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2019. Radare2. Available at [Online]: https:\/\/rada.re\/r\/.  2019. Radare2. Available at [Online]: https:\/\/rada.re\/r\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2019. VirusTotal. Available at [Online]: https:\/\/www.virustotal.com.  2019. VirusTotal. Available at [Online]: https:\/\/www.virustotal.com."},{"key":"e_1_3_2_1_4_1","unstructured":"2022. Smart Yet Flawed: IoT Device Vulnerabilities Explained. Available at [Online]: https:\/\/bit.ly\/2MBykDx.  2022. Smart Yet Flawed: IoT Device Vulnerabilities Explained. Available at [Online]: https:\/\/bit.ly\/2MBykDx."},{"key":"e_1_3_2_1_5_1","unstructured":"2022. Strip: GNU binary Utility. Available at [Online]: https:\/\/sourceware.org\/binutils\/docs\/binutils\/strip.html.  2022. Strip: GNU binary Utility. Available at [Online]: https:\/\/sourceware.org\/binutils\/docs\/binutils\/strip.html."},{"key":"e_1_3_2_1_6_1","unstructured":"2022. UCL Data Compression Library. Available at [Online]: http:\/\/www.oberhumer.com\/opensource\/ucl\/.  2022. UCL Data Compression Library. Available at [Online]: http:\/\/www.oberhumer.com\/opensource\/ucl\/."},{"key":"e_1_3_2_1_7_1","unstructured":"2022. UPX: the Ultimate Packer for eXecutables. Available at [Online]: https:\/\/upx.github.io\/.  2022. UPX: the Ultimate Packer for eXecutables. Available at [Online]: https:\/\/upx.github.io\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2022. VirusShare. Available at [Online]: https:\/\/virusshare.com\/.  2022. VirusShare. Available at [Online]: https:\/\/virusshare.com\/."},{"key":"e_1_3_2_1_9_1","volume-title":"Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems. In International Conference on Computational Data and Social Networks. 268\u2013281","author":"Abusnaina Ahmed","year":"2019","unstructured":"Ahmed Abusnaina , Hisham Alasmary , Mohammed Abuhamad , Saeed Salem , DaeHun Nyang , and Aziz Mohaisen . 2019 . Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems. In International Conference on Computational Data and Social Networks. 268\u2013281 . Ahmed Abusnaina, Hisham Alasmary, Mohammed Abuhamad, Saeed Salem, DaeHun Nyang, and Aziz Mohaisen. 2019. Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems. In International Conference on Computational Data and Social Networks. 268\u2013281."},{"key":"e_1_3_2_1_10_1","volume-title":"Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems. In IEEE International Conference on Distributed Computing Systems, ICDCS.","author":"Abusnaina Ahmed","year":"2019","unstructured":"Ahmed Abusnaina , Aminollah Khormali , Hisham Alasmary , Jeman Park , Afsah Anwar , and Aziz Mohaisen . 2019 . Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems. In IEEE International Conference on Distributed Computing Systems, ICDCS. Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, and Aziz Mohaisen. 2019. Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems. In IEEE International Conference on Distributed Computing Systems, ICDCS."},{"key":"e_1_3_2_1_11_1","volume-title":"Limits of Machine Learning Classifiers Based on Static Analysis Features. In Network and Distributed Systems Security (NDSS) Symposium.","author":"Aghakhani Hojjat","year":"2020","unstructured":"Hojjat Aghakhani , Fabio Gritti , Francesco Mecca , Martina Lindorfer , Stefano Ortolani , Davide Balzarotti , Giovanni Vigna , and Christopher Kruegel . 2020 . When Malware is Packin\u2019Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features. In Network and Distributed Systems Security (NDSS) Symposium. Hojjat Aghakhani, Fabio Gritti, Francesco Mecca, Martina Lindorfer, Stefano Ortolani, Davide Balzarotti, Giovanni Vigna, and Christopher Kruegel. 2020. When Malware is Packin\u2019Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features. In Network and Distributed Systems Security (NDSS) Symposium."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857713"},{"key":"e_1_3_2_1_13_1","volume-title":"Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach","author":"Alasmary Hisham","year":"2019","unstructured":"Hisham Alasmary , Aminollah Khormali , Afsah Anwar , Jeman Park , Jinchun Choi , Ahmed Abusnaina , Amro Awad , DaeHun Nyang , and Aziz Mohaisen . 2019. Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach . IEEE Internet of Things Journal( 2019 ). Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, Ahmed Abusnaina, Amro Awad, DaeHun Nyang, and Aziz Mohaisen. 2019. Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach. IEEE Internet of Things Journal(2019)."},{"key":"e_1_3_2_1_14_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Alrawi Omar","year":"2021","unstructured":"Omar Alrawi , Charles Lever , Kevin Valakuzhy , Kevin Snow , Fabian Monrose , Manos Antonakakis , 2021 . The Circle Of Life: A {Large-Scale} Study of The {IoT} Malware Lifecycle . In 30th USENIX Security Symposium (USENIX Security 21) . 3505\u20133522. Omar Alrawi, Charles Lever, Kevin Valakuzhy, Kevin Snow, Fabian Monrose, Manos Antonakakis, 2021. The Circle Of Life: A {Large-Scale} Study of The {IoT} Malware Lifecycle. In 30th USENIX Security Symposium (USENIX Security 21). 3505\u20133522."},{"key":"e_1_3_2_1_15_1","unstructured":"Manos Antonakakis Tim April Michael Bailey Matt Bernhard Elie Bursztein Jaime Cochran Zakir Durumeric J\u00a0Alex Halderman Luca Invernizzi Michalis Kallitsis 2017. Understanding the mirai botnet. In USENIX security symposium (USENIX Security). 1093\u20131110.  Manos Antonakakis Tim April Michael Bailey Matt Bernhard Elie Bursztein Jaime Cochran Zakir Durumeric J\u00a0Alex Halderman Luca Invernizzi Michalis Kallitsis 2017. Understanding the mirai botnet. In USENIX security symposium (USENIX Security). 1093\u20131110."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61078-4_25"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_8"},{"key":"e_1_3_2_1_18_1","volume-title":"Towards Evaluating the Robustness of Neural Networks. In IEEE Symposium on Security and Privacy, SP. 39\u201357","author":"Carlini Nicholas","year":"2017","unstructured":"Nicholas Carlini and David\u00a0 A. Wagner . 2017 . Towards Evaluating the Robustness of Neural Networks. In IEEE Symposium on Security and Privacy, SP. 39\u201357 . Nicholas Carlini and David\u00a0A. Wagner. 2017. Towards Evaluating the Robustness of Neural Networks. In IEEE Symposium on Security and Privacy, SP. 39\u201357."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Zhenxiang Chen Qiben Yan Hongbo Han Shanshan Wang Lizhi Peng Lin Wang and Bo Yang. 2018. Machine learning based mobile malware detection using highly imbalanced network traffic. Inf. Sci. 433-434(2018) 346\u2013364.  Zhenxiang Chen Qiben Yan Hongbo Han Shanshan Wang Lizhi Peng Lin Wang and Bo Yang. 2018. Machine learning based mobile malware detection using highly imbalanced network traffic. Inf. Sci. 433-434(2018) 346\u2013364.","DOI":"10.1016\/j.ins.2017.04.044"},{"key":"e_1_3_2_1_21_1","volume-title":"Understanding Linux Malware. In IEEE Symposium on Security & Privacy.","author":"Cozzi Emanuele","year":"2018","unstructured":"Emanuele Cozzi , Mariano Graziano , Yanick Fratantonio , and Davide Balzarotti . 2018 . Understanding Linux Malware. In IEEE Symposium on Security & Privacy. Emanuele Cozzi, Mariano Graziano, Yanick Fratantonio, and Davide Balzarotti. 2018. Understanding Linux Malware. In IEEE Symposium on Security & Privacy."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427256"},{"key":"e_1_3_2_1_23_1","unstructured":"Developers. 2019. GitHub. Available at [Online]: https:\/\/github.com\/.  Developers. 2019. GitHub. Available at [Online]: https:\/\/github.com\/."},{"key":"e_1_3_2_1_24_1","volume-title":"Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations, ICLR.","author":"Goodfellow J.","year":"2015","unstructured":"Ian\u00a0 J. Goodfellow , Jonathon Shlens , and Christian Szegedy . 2015 . Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations, ICLR. Ian\u00a0J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations, ICLR."},{"key":"e_1_3_2_1_25_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Graziano Mariano","year":"2015","unstructured":"Mariano Graziano , Davide Canali , Leyla Bilge , Andrea Lanzi , and Davide Balzarotti . 2015 . Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence . In 24th USENIX Security Symposium (USENIX Security 15) . Mariano Graziano, Davide Canali, Leyla Bilge, Andrea Lanzi, and Davide Balzarotti. 2015. Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence. In 24th USENIX Security Symposium (USENIX Security 15)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"e_1_3_2_1_27_1","volume-title":"International Conference on Learning Representations, ICLR.","author":"Guo Chuan","year":"2018","unstructured":"Chuan Guo , Mayank Rana , Moustapha Cisse , and Laurens van\u00a0der Maaten . 2018 . Countering Adversarial Images using Input Transformations . In International Conference on Learning Representations, ICLR. Chuan Guo, Mayank Rana, Moustapha Cisse, and Laurens van\u00a0der Maaten. 2018. Countering Adversarial Images using Input Transformations. In International Conference on Learning Representations, ICLR."},{"key":"e_1_3_2_1_28_1","unstructured":"Shengyuan Hu Tao Yu Chuan Guo Wei-Lun Chao and Kilian\u00a0Q Weinberger. 2019. A new defense against adversarial images: Turning a weakness into a strength. In Neural Information Processing Systems NeurIPS.  Shengyuan Hu Tao Yu Chuan Guo Wei-Lun Chao and Kilian\u00a0Q Weinberger. 2019. A new defense against adversarial images: Turning a weakness into a strength. In Neural Information Processing Systems NeurIPS."},{"key":"e_1_3_2_1_29_1","volume-title":"Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. arXiv preprint arXiv:1702.05983 abs\/1702.05983","author":"Hu Weiwei","year":"2017","unstructured":"Weiwei Hu and Ying Tan . 2017. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. arXiv preprint arXiv:1702.05983 abs\/1702.05983 ( 2017 ). Weiwei Hu and Ying Tan. 2017. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. arXiv preprint arXiv:1702.05983 abs\/1702.05983 (2017)."},{"key":"e_1_3_2_1_30_1","volume-title":"An integrated approach to software engineering","author":"Jalote Pankaj","unstructured":"Pankaj Jalote . 2012. An integrated approach to software engineering . Springer Science & Business Media . Pankaj Jalote. 2012. An integrated approach to software engineering. Springer Science & Business Media."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2013.6597204"},{"key":"e_1_3_2_1_32_1","volume-title":"Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. In The European Signal Processing Conference, EUSIPCO. 533\u2013537","author":"Kolosnjaji Bojan","year":"2018","unstructured":"Bojan Kolosnjaji , Ambra Demontis , Battista Biggio , Davide Maiorca , Giorgio Giacinto , Claudia Eckert , and Fabio Roli . 2018 . Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. In The European Signal Processing Conference, EUSIPCO. 533\u2013537 . Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, and Fabio Roli. 2018. Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. In The European Signal Processing Conference, EUSIPCO. 533\u2013537."},{"key":"e_1_3_2_1_33_1","volume-title":"Workshop on Security in Machine Learning (NIPS).","author":"Kreuk Felix","year":"2018","unstructured":"Felix Kreuk , Assi Barak , Shir Aviv-Reuven , Moran Baruch , Benny Pinkas , and Joseph Keshet . 2018 . Deceiving end-to-end deep learning malware detectors using adversarial examples . In Workshop on Security in Machine Learning (NIPS). Felix Kreuk, Assi Barak, Shir Aviv-Reuven, Moran Baruch, Benny Pinkas, and Joseph Keshet. 2018. Deceiving end-to-end deep learning malware detectors using adversarial examples. In Workshop on Security in Machine Learning (NIPS)."},{"key":"e_1_3_2_1_34_1","volume-title":"the 5th International Conference on Learning Representations, ICLR.","author":"Kurakin Alexey","year":"2017","unstructured":"Alexey Kurakin , Ian\u00a0 J. Goodfellow , and Samy Bengio . 2017 . Adversarial examples in the physical world . In the 5th International Conference on Learning Representations, ICLR. Alexey Kurakin, Ian\u00a0J. Goodfellow, and Samy Bengio. 2017. Adversarial examples in the physical world. In the 5th International Conference on Learning Representations, ICLR."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2789219"},{"key":"e_1_3_2_1_36_1","volume-title":"SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I(Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol.\u00a0304)","author":"Li Zhiqiang","year":"2019","unstructured":"Zhiqiang Li , Jun Sun , Qiben Yan , Witawas Srisa-an, and Yutaka Tsutano . 2019 . Obfusifier: Obfuscation-Resistant Android Malware Detection System. In Security and Privacy in Communication Networks - 15th EAI International Conference , SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I(Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol.\u00a0304) , Songqing Chen, Kim-Kwang\u00a0Raymond Choo, Xinwen Fu, Wenjing Lou, and Aziz Mohaisen (Eds.). Springer, 214\u2013234. Zhiqiang Li, Jun Sun, Qiben Yan, Witawas Srisa-an, and Yutaka Tsutano. 2019. Obfusifier: Obfuscation-Resistant Android Malware Detection System. In Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I(Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol.\u00a0304), Songqing Chen, Kim-Kwang\u00a0Raymond Choo, Xinwen Fu, Wenjing Lou, and Aziz Mohaisen (Eds.). Springer, 214\u2013234."},{"key":"e_1_3_2_1_37_1","volume-title":"Deep learning for image-based mobile malware detection. Journal of Computer Virology and Hacking Techniques","author":"Mercaldo Francesco","year":"2020","unstructured":"Francesco Mercaldo and Antonella Santone . 2020. Deep learning for image-based mobile malware detection. Journal of Computer Virology and Hacking Techniques ( 2020 ), 1\u201315. Francesco Mercaldo and Antonella Santone. 2020. Deep learning for image-based mobile malware detection. Journal of Computer Virology and Hacking Techniques (2020), 1\u201315."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.04.001"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_40_1","volume-title":"Learning Linux Binary Analysis","author":"O\u2019Neill Ryan\u00a0Elfmaster","unstructured":"Ryan\u00a0Elfmaster O\u2019Neill . 2016. Learning Linux Binary Analysis . Packt Publishing . Ryan\u00a0Elfmaster O\u2019Neill. 2016. Learning Linux Binary Analysis. Packt Publishing."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.007"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_2_1_43_1","volume-title":"The Limitations of Deep Learning in Adversarial Settings. In IEEE European Symposium on Security and Privacy. 372\u2013387","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick\u00a0 D. McDaniel , Somesh Jha , Matt Fredrikson , Z.\u00a0 Berkay Celik , and Ananthram Swami . 2016 . The Limitations of Deep Learning in Adversarial Settings. In IEEE European Symposium on Security and Privacy. 372\u2013387 . Nicolas Papernot, Patrick\u00a0D. McDaniel, Somesh Jha, Matt Fredrikson, Z.\u00a0Berkay Celik, and Ananthram Swami. 2016. The Limitations of Deep Learning in Adversarial Settings. In IEEE European Symposium on Security and Privacy. 372\u2013387."},{"key":"e_1_3_2_1_44_1","unstructured":"Giorgio Severi Jim Meyer Scott Coull and Alina Oprea. 2021. Exploring Backdoor Poisoning Attacks Against Malware Classifiers. In USENIX security symposium (USENIX Security). 1093\u20131110.  Giorgio Severi Jim Meyer Scott Coull and Alina Oprea. 2021. Exploring Backdoor Poisoning Attacks Against Malware Classifiers. In USENIX security symposium (USENIX Security). 1093\u20131110."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2795549"},{"key":"e_1_3_2_1_46_1","volume-title":"Lightweight Classification of IoT Malware Based on Image Recognition. In IEEE Annual Computer Software and Applications Conference, COMPSAC. IEEE Computer Society, 664\u2013669","author":"Su Jiawei","year":"2018","unstructured":"Jiawei Su , Danilo\u00a0Vasconcellos Vargas , Sanjiva Prasad , Daniele Sgandurra , Yaokai Feng , and Kouichi Sakurai . 2018 . Lightweight Classification of IoT Malware Based on Image Recognition. In IEEE Annual Computer Software and Applications Conference, COMPSAC. IEEE Computer Society, 664\u2013669 . Jiawei Su, Danilo\u00a0Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, and Kouichi Sakurai. 2018. Lightweight Classification of IoT Malware Based on Image Recognition. In IEEE Annual Computer Software and Applications Conference, COMPSAC. IEEE Computer Society, 664\u2013669."},{"key":"e_1_3_2_1_47_1","volume-title":"International Conference on Learning Representations, ICLR.","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian\u00a0 J. Goodfellow , and Rob Fergus . 2014 . Intriguing properties of neural networks . In International Conference on Learning Representations, ICLR. Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian\u00a0J. Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In International Conference on Learning Representations, ICLR."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Danish Vasan Mamoun Alazab Sobia Wassan Babak Safaei and Qin Zheng. 2020. Image-based malware classification using ensemble of CNN architectures (IMCEC). Computers & Security(2020) 101748.  Danish Vasan Mamoun Alazab Sobia Wassan Babak Safaei and Qin Zheng. 2020. Image-based malware classification using ensemble of CNN architectures (IMCEC). Computers & Security(2020) 101748.","DOI":"10.1016\/j.cose.2020.101748"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the USENIX Security Symposium, USENIX Security. 1281\u20131297","author":"Wang Bolun","year":"2018","unstructured":"Bolun Wang , Yuanshun Yao , Bimal Viswanath , Haitao Zheng , and Ben\u00a0 Y. Zhao . 2018 . With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning . In Proceedings of the USENIX Security Symposium, USENIX Security. 1281\u20131297 . Bolun Wang, Yuanshun Yao, Bimal Viswanath, Haitao Zheng, and Ben\u00a0Y. Zhao. 2018. With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning. In Proceedings of the USENIX Security Symposium, USENIX Security. 1281\u20131297."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.11.008"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.45"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2014.7001385"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02450-5_11"},{"key":"e_1_3_2_1_54_1","volume-title":"Fabio Di\u00a0Troia, and Mark Stamp.","author":"Yajamanam Sravani","year":"2018","unstructured":"Sravani Yajamanam , Vikash Raja\u00a0Samuel Selvin , Fabio Di\u00a0Troia, and Mark Stamp. 2018 . Deep Learning versus Gist Descriptors for Image-based Malware Classification.. In Icissp . 553\u2013561. Sravani Yajamanam, Vikash Raja\u00a0Samuel Selvin, Fabio Di\u00a0Troia, and Mark Stamp. 2018. Deep Learning versus Gist Descriptors for Image-based Malware Classification.. In Icissp. 553\u2013561."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.09.082"}],"event":{"name":"RAID 2022: 25th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Limassol Cyprus","acronym":"RAID 2022"},"container-title":["Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545960","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545948.3545960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:27Z","timestamp":1750188627000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545960"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":55,"alternative-id":["10.1145\/3545948.3545960","10.1145\/3545948"],"URL":"https:\/\/doi.org\/10.1145\/3545948.3545960","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}