{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T01:57:00Z","timestamp":1772243820425,"version":"3.50.1"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.3233\/faia200388","type":"book-chapter","created":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:26:53Z","timestamp":1740115613000},"source":"Crossref","is-referenced-by-count":2,"title":["Black-Box Adversarial Attacks Against Deep Learning Based Malware Binaries Detection with GAN"],"prefix":"10.3233","author":[{"family":"Yuan Junkun","sequence":"additional","affiliation":[]},{"family":"Zhou Shaofang","sequence":"additional","affiliation":[]},{"family":"Lin Lanfen","sequence":"additional","affiliation":[]},{"family":"Wang Feng","sequence":"additional","affiliation":[]},{"family":"Cui Jia","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["Frontiers in Artificial Intelligence and Applications","ECAI 2020"],"original-title":[],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:41:42Z","timestamp":1740116502000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISBN&isbn=978-1-64368-100-9&spage=2536&doi=10.3233\/FAIA200388"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/faia200388","relation":{"is-cited-by":[{"id-type":"doi","id":"10.1186\/s42400-021-00102-9","asserted-by":"object"}]},"ISSN":["0922-6389"],"issn-type":[{"value":"0922-6389","type":"print"}],"subject":[],"published":{"date-parts":[[2020]]}}}