{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T06:20:44Z","timestamp":1764829244971,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T00:00:00Z","timestamp":1724112000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,20]]},"DOI":"10.1145\/3685650.3685668","type":"proceedings-article","created":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T10:19:28Z","timestamp":1726654768000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient PDF Malware Detection Method Using Highly Compact Features"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-6870-7543","authenticated-orcid":false,"given":"Ran","family":"Liu","sequence":"first","affiliation":[{"name":"Univ. of Maryland, Baltimore County"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1383-8120","authenticated-orcid":false,"given":"Cynthia","family":"Matuszek","sequence":"additional","affiliation":[{"name":"Univ. of Maryland, Baltimore County"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9494-7139","authenticated-orcid":false,"given":"Charles","family":"Nicholas","sequence":"additional","affiliation":[{"name":"Univ. of Maryland, Baltimore County"}]}],"member":"320","published-online":{"date-parts":[[2024,9,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.57"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Michele Elingiusti Leonardo Aniello Leonardo Querzoni and Roberto Baldoni. 2018. PDF-Malware Detection: A Survey and Taxonomy of Current Techniques (sprinter ed.). Advances in Information Security. 169--191 pages. https:\/\/doi.org\/10.1007\/978-3-319-73951-9","DOI":"10.1007\/978-3-319-73951-9"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData59044.2023.10386516"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081950"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3332184"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420987"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23078"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.20"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-016-0045-0"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/3361338.3361359"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23115"},{"key":"e_1_3_2_1_13_1","volume-title":"The 29th USENIX Conference on Security Symposium (SEC'20)","author":"Yizheng Chen","year":"2020","unstructured":"Chen Yizheng, Wang Shiqi, She Dongdong, and Jana Suman. 2020. On training robust PDF malware classifiers. In The 29th USENIX Conference on Security Symposium (SEC'20)."}],"event":{"name":"DocEng '24: ACM Symposium on Document Engineering 2024","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"San Jose CA USA","acronym":"DocEng '24"},"container-title":["Proceedings of the ACM Symposium on Document Engineering 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3685650.3685668","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3685650.3685668","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:26Z","timestamp":1750295846000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3685650.3685668"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,20]]},"references-count":13,"alternative-id":["10.1145\/3685650.3685668","10.1145\/3685650"],"URL":"https:\/\/doi.org\/10.1145\/3685650.3685668","relation":{},"subject":[],"published":{"date-parts":[[2024,8,20]]},"assertion":[{"value":"2024-09-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}