{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T09:16:09Z","timestamp":1773998169680,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T00:00:00Z","timestamp":1770508800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T00:00:00Z","timestamp":1770508800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026,2,8]]},"DOI":"10.23919\/icact68090.2026.11431538","type":"proceedings-article","created":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T20:03:53Z","timestamp":1773950633000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["An Interpretable Hybrid Model for PDF Malware Detection Using CNN and Vision Transformer"],"prefix":"10.23919","author":[{"given":"Emmanuel Kwesi","family":"Baah","sequence":"first","affiliation":[{"name":"Lancaster University Ghana,Department of Computer Science,Accra,Ghana"}]},{"given":"Dominic","family":"Asamoah","sequence":"additional","affiliation":[{"name":"Kwame Nkrumah University of Science and Technology,Department of Computer Science,Kumasi,Ghana"}]},{"given":"Frederick","family":"Ledi","sequence":"additional","affiliation":[{"name":"Kwame Nkrumah University of Science and Technology,Department of Computer Science,Kumasi,Ghana"}]},{"given":"Anthony Kingsley","family":"Sackey","sequence":"additional","affiliation":[{"name":"Ho Technical University,Department of Computer Science,Ho,Ghana"}]},{"given":"Eric Agyekum Nana","family":"Boamah","sequence":"additional","affiliation":[{"name":"Kwame Nkrumah University of Science and Technology,Department of Computer Science,Kumasi,Ghana"}]},{"given":"Richard Kofi","family":"Doh","sequence":"additional","affiliation":[{"name":"Kwame Nkrumah University of Science and Technology,Department of Computer Science,Kumasi,Ghana"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC58260.2023.10323624"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(19)30064-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3049819"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEM51511.2021.9445341"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3332184"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.09.015"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2020.1723747"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23483"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2018.8659374"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3338504.3357341"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101901"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7611741"},{"key":"ref13","volume-title":"On training robust pdf malware classifiers","author":"Chen","year":"2019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1117\/12.2637518"},{"key":"ref15","volume-title":"A feature set of small size for the pdf malware detection","author":"Liu","year":"2023"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11193142"},{"key":"ref17","first-page":"27","article-title":"A structural and content-based approach for a precise and robust detection of malicious pdf files","volume-title":"Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP)","author":"Maiorca"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23977\/acsat.2017.1001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23115"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WIECON-ECE60392.2023.10456385"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS.2019.00024"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISPDS62779.2024.10667497"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CICN56167.2022.10008374"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s23146507"},{"key":"ref25","article-title":"Convolutional neural network","author":"Wood","year":"2025","journal-title":"DeepAI"},{"key":"ref26","article-title":"What is a convolutional neural network (cnn)? - definition from techtarget","year":"2025","journal-title":"Search Enterprise AI"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00444-8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00676"},{"key":"ref29","article-title":"Vision transformer: What it is & how it works [2024 guide]","author":"Shah","year":"2025","journal-title":"V7 Labs"},{"key":"ref30","volume-title":"Attention is all you need","author":"Vaswani","year":"2017"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.13283"},{"key":"ref32","first-page":"9269","article-title":"The many shapley values for model explanation","volume-title":"Proceedings of the 37th International Conference on Machine Learning (ICML)","volume":"119","author":"Sundararajan","year":"2020"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.5220\/0006609503370344"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3357620"}],"event":{"name":"2026 28th International Conference on Advanced Communications Technology (ICACT)","location":"Pyeong Chang, Korea, Republic of","start":{"date-parts":[[2026,2,8]]},"end":{"date-parts":[[2026,2,11]]}},"container-title":["2026 28th International Conference on Advanced Communications Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11431239\/11431242\/11431538.pdf?arnumber=11431538","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T05:38:18Z","timestamp":1773985098000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11431538\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,8]]},"references-count":34,"URL":"https:\/\/doi.org\/10.23919\/icact68090.2026.11431538","relation":{},"subject":[],"published":{"date-parts":[[2026,2,8]]}}}