{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T10:17:35Z","timestamp":1758709055474},"reference-count":11,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2019,8,1]]},"DOI":"10.1587\/transinf.2018edl8259","type":"journal-article","created":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T22:10:52Z","timestamp":1564611052000},"page":"1581-1585","source":"Crossref","is-referenced-by-count":3,"title":["Graph Similarity Metric Using Graph Convolutional Network: Application to Malware Similarity Match"],"prefix":"10.1587","volume":"E102.D","author":[{"given":"Bing-lin","family":"ZHAO","sequence":"first","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fu-dong","family":"LIU","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zheng","family":"SHAN","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yi-hang","family":"CHEN","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jian","family":"LIU","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Nanjing University of Finance and Economics"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] H. Gascon, F. Yamaguchi, D. Arp, and K. Rieck, \u201cStructural detection of android malware using embedded call graphs,\u201d Proc. 2013 ACM workshop on Artificial intelligence and security, pp.45-54, ACM, 2013. 10.1145\/2517312.2517315","DOI":"10.1145\/2517312.2517315"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] G. Lyu, H. Yin, X. Yu, and S. Luo, \u201cA Local Characteristic Image Restoration Based on Convolutional Neural Network,\u201d IEICE Trans. Inf. &amp; Syst., vol.E99-D, no.8, pp.2190-2193, 2016. 10.1587\/transinf.2016edl8021","DOI":"10.1587\/transinf.2016EDL8021"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] S.H. Shin, W.J. Jang, H.W. Yun, et al., \u201cEncoding detection and bit rate classification of AMR-coded speech based on deep neural network,\u201d IEICE Trans. Inf. &amp; Syst., vol.101, 2018,","DOI":"10.1587\/transinf.2017EDL8155"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] D.I. Shuman, S.K. Narang, P. Frossard, A. Ortega, and P.Vandergheynst, \u201cThe emerging field of signal processing on graphs: Extending high-dimensional data analysis to networks and other irregular domains,\u201d IEEE Signal Process. Mag., vol.30, no.3, pp.83-98, 2013. 10.1109\/msp.2012.2235192","DOI":"10.1109\/MSP.2012.2235192"},{"key":"5","unstructured":"[5] M. Defferrard, X. Bresson, and P. Vandergheynst, \u201cConvolutional neural networks on graphs with fast localized spectral filtering,\u201d NIPS, pp.3837-3845, 2016."},{"key":"6","unstructured":"[6] T.N. Kipf and M. Welling, \u201cSemi-supervised classification with graph convolutional networks,\u201d arXiv preprint arXiv:1609.02907, 2016."},{"key":"7","unstructured":"[7] R. Ronen, M. Radu, C. Feuerstein, et al., \u201cMicrosoft Malware Classification Challenge,\u201d http:\/\/arxiv.org\/abs\/1802.10135, 2018."},{"key":"8","unstructured":"[8] J. Bruna, W. Zaremba, A. Szlam, et al., \u201cSpectral networks and locally connected networks on graphs,\u201d Computer Science, 2013."},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] X. He, L. Liao, H. Zhang, et al., \u201cNeural Collaborative Filtering,\u201d pp.173-182, 2017.","DOI":"10.1145\/3038912.3052569"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] B.J. Frey and D. Dueck, \u201cClustering by passing messages between data points,\u201d Science, vol.315, no.5814, pp.972-976, 2007. 10.1126\/science.1136800","DOI":"10.1126\/science.1136800"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] J. Drew, T. Moore, and M. Hahsler, \u201cPolymorphic malware detection using sequence classification methods,\u201d IEEE Security and Privacy Workshops, 2016:2.","DOI":"10.1109\/SPW.2016.30"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E102.D\/8\/E102.D_2018EDL8259\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,3]],"date-time":"2019-08-03T03:29:38Z","timestamp":1564802978000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E102.D\/8\/E102.D_2018EDL8259\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,1]]},"references-count":11,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2018edl8259","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,1]]}}}