{“id”:“https://openalex.org/W4223964388“,”doi“:”https://doi.org/10.1145/3508398.3519365“,”title“:”Towards Robust Detection of PDF-based Malware“,”display_name“:”Towards Robest Detecting of PDF-based Malware“,”publication_year“:2022,”publiction_date“:”2022-04-14“,”ids“:{”openalex“:”https://openalex.org/W4223964388“,”doi“:”https://doi.org/10.1145/3508398.3519365“},”language“:”en“,”primary_location“:{”is_oa“:false,”landing_page_url“:”https://doi.org/10.1145/3508398.3519365“,”pdf_url“:null,”source“:null,”license“:null',”licence_id“:null,”version“:nuller,”is_accepted“:false,”is_published“:false},”type“:”article“,”type_crossref“:“procesdings-article”,”indexed_in“:[”crossref“],”open_access“:{”is_oa“:false,”oa_status“:”closed“,”oa_url”:null“,”any_repository_has_fulltext“:false}”,”authorships“:[{”author_position“:”first“,”作者“:{”id“:”https://openalex.org/A5083607986“,”display_name“:”Kai Yuan Tay“,”orcid“:null},”institutions“:[{”id“:”https://openalex.org/I2802950585“,”display_name“:”国防科技局“,”ror“:”https://ror.org/02rvm6b03“,”country_code“:”SG“,”type“:“政府”,”世系“:[”https://openalex.org/I1325159900","https://openalex.org/I2802950585“]}],”国家“:[”SG“],”is_corresponding“:false,”raw_author_name“:”Kai Yuan Tay“,”raw _affiliation_strings“:[“新加坡国防科技局”],”affiliations“:[{”raw _affiliation_string“:”新加坡国防科技署“,”,“institution_ids”:[“https://openalex.org/I2802950585“]}]},{”author_position“:”middle“,”author“:{”id“:”https://openalex.org/A5069735972“,”display_name“:”Shawn Chua“,”orcid“:null},”institutions“:[{”id“:”https://openalex.org/I2802950585“,”display_name“:”国防科技局“,”ror“:”https://ror.org/02rvm6b03“,”country_code“:”SG“,”type“:“政府”,”世系“:[”https://openalex.org/I1325159900","https://openalex.org/I2802950585“]}],”国家“:[”SG“],”is_corresponding“:false,”raw_author_name“:”Shawn Chua“,”raw_affiliation_strings“:[“新加坡国防科技局”],”affiliations“:[{”raw_affiliation_string“:”新加坡国防科技署“,”institution_ids“:[https://openalex.org/I2802950585“]}]},{”author_position“:”middle“,”author“:{”id“:”https://openalex.org/A5028815245“,”display_name“:”Melissa Chua“,”orcid“:null},”institutions“:[{”id“:”https://openalex.org/I2802950585“,”display_name“:”国防科技局“,”ror“:”https://ror.org/02rvm6b03“,”country_code“:”SG“,”type“:“政府”,”世系“:[”https://openalex.org/I1325159900","https://openalex.org/I2802950585“]}],”国家“:[”SG“],”is_corresponding“:false,”raw_author_name“:”Melissa Chua“,”raw _ afiliation_strings“:[“新加坡国防科技局”],”affiliations“:[{”raw _affiliation_strong“:”新加坡国防科技署“,”,“institution_ids”:[“https://openalex.org/I2802950585“]}]},{”author_position“:”last“,”author“:{”id“:”https://openalex.org/A501233754“,”display_name“:”Vivek Balachandran“,”orcid“:”https://orcid.org/0000-0003-4847-7150},“机构”:[{“id”:https://openalex.org/I168639165“,”display_name“:”新加坡理工学院“,”ror“:”https://ror.org/01v2c2791“,”country_code“:”SG“,”type“:“教育”,”世系“:[”https://openalex.org/I168639165“]}],”国家“:[”SG“],”is_corresponding“:false,”raw_author_name“:”Vivek Balachandran“,”raw _ afiliation_strings“:[“新加坡理工学院,新加坡”],”affiliations“:[{”raw_ afiliation _string“:”新加坡理工大学,新加坡“,”institution_ids“:[”https://openalex.org/I168639165“]}]}],”countries_distinct_count“:1,”institutions_disting_count”:2,”corresponding_author_ids“:[],”corresponding_institution_ids”:[]、“apc_list”:null,”apc_payd“:null、”fwci“:0.273、“has_fulltext”:false,”cited_by_count?:1,“cited_by_percentile_year”:{“min”:64,”max“:74},”biblio“:{”volume“:nul”,“issue”:null,“first_page”:空,“last_page”:空},“is_retracted“:false,”is_paratext“:fase,”primary_topic“:{”id“:”https://openalex.org/T11241“,”display_name“:”Android恶意软件的特征描述和检测“,”score“:1.0,”subfield“:{”id“:”https://openalex.org/subfields/1711“,”display_name“:”信号处理“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},”主题“:[{”id“:”https://openalex.org/T11241“,”display_name“:”Android恶意软件的特征描述和检测“,”score“:1.0,”subfield“:{”id“:”https://openalex.org/subfields/1711“,”display_name“:”信号处理“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},{”id“:”https://openalex.org/T11644“,”display_name“:”检测和预防网络钓鱼攻击“,”score“:0.9994,”subfield“:{”id“:”https://openalex.org/subfields/1710“,”display_name“:”Information Systems“},”field“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},{”id“:”https://openalex.org/T10400“,”display_name“:”网络入侵检测和防御机制“,”score“:0.9989,”subfield“:{”id“:”https://openalex.org/subfields/1705“,”display_name“:”计算机网络和通信“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}}],”关键词“:[{”id“:”https://openalex.org/keywords/intrusion-detection网站“,”display_name“:”入侵检测“,”score“:0.506262},{”id“:”https://openalex.org/keywords/detection网站“,”display_name“:”Detection“,”score“:0.50509}],”concepts“:[{”id“:”https://openalex.org/C7863114,“wikidata”:https://www.wikidata.org/wiki/Q192627网址“,”display_name“:”Mimicry“,”level“:2,”score“:0.9153763},{”id“:”https://openalex.org/C63479239,“wikidata”:https://www.wikidata.org/wiki/Q7353546“,”display_name“:”健壮性(进化)“,”level“:3,”score“:0.6837091},{”id“:”https://openalex.org/C41008148,“wikidata”:https://www.wikidata.org/wiki/Q21198“,”display_name“:”计算机科学“,”level“:0,”score“:0.67168593},{”id“:”https://openalex.org/C541664917,“wikidata”:https://www.wikidata.org/wiki/Q14001“,”display_name“:”恶意软件“,”level“:2,”score“:0.6045523},{”id“:”https://openalex.org/C154945302,“wikidata”:https://www.wikidata.org/wiki/Q11660“,”display_name“:”人工智能“,”level“:1,”score“:0.4666626},{”id“:”https://openalex.org/C95623464,“wikidata”:https://www.wikidata.org/wiki/Q1096149“,”display_name“:”分类器(UML)“,”level“:2,”score“:0.46641123},{”id“:”https://openalex.org/C119857082,“wikidata”:https://www.wikidata.org/wiki/Q2539“,”display_name“:”机器学习“,”level“:1,”score“:0.3609951},{”id“:”https://openalex.org/C86803240,“wikidata”:https://www.wikidata.org/wiki/Q420“,”display_name“:”生物学“,”等级“:0,”分数“:0.19647366},{”id“:”https://openalex.org/C38652104,“wikidata”:https://www.wikidata.org/wiki/Q3510521“,”display_name“:”计算机安全“,”level“:1,”score“:0.10669759},{”id“:”https://openalex.org/C18903297,“wikidata”:https://www.wikidata.org/wiki/Q7150“,”display_name“:”生态学“,”level“:1,”score“:0.0},{”id“:”https://openalex.org/C55493867,“wikidata”:https://www.wikidata.org/wiki/Q7094“,”display_name“:”Biochemistry“,”level“:1,”score“:0.0},{”id“:”https://openalex.org/C104317684,“wikidata”:https://www.wikidata.org/wiki/Q7187“,”display_name“:”Gene“,”level“:2,”score“:0.0}],”mesh“:[],”locations_count“:1,”location“:[{”is_oa“:false,”landing_page_url“:”https://doi.org/10.1145/3508398.3519365“,”pdf_url“:null,”source“:null,”license“:null:”license_id“:null,”version“:nuller,”is_accepted“:false,”is_published“:false}],”best_oa_location“:nul,”sustainable_development_goals“:[],”grants“:[],”datasets“:],”versions“:[]:”,“referenced_works_count”:7,“referrenced_works”:[”https://openalex.org/W2014466911","https://openalex.org/W2082190528","https://openalex.org/W2525598640","https://openalex.org/W2574797807网址","https://openalex.org/W2789247308","https://openalex.org/W3102476541","https://openalex.org/W4299360567“],”related_works“:[”https://openalex.org/W4232883466","https://openalex.org/W3196321079","https://openalex.org/W3158429762","https://openalex.org/W2566749067","https://openalex.org/W23799994817","https://openalex.org/W2373086291","https://openalex.org/W2332959588","https://openalex.org/W2159218316","https://openalex.org/W2132785383","https://openalex.org/W1980659691“],”ngrams_url“:”https://api.openalex.org/works/W4223964388/ngrams“,”“abstract_inverted_index”:{“With”:[0],“the”:[1,20,33,42],“invertible”:[2],“popularity”:[3],“of”:[4,22,45],“PDF”,“:[5,46],“severtive”:[6],“studies”:[7],“into”:[8],“PDF”:[9,24],“恶意软件”:[10],“and”:[11,28,84,98105128],“their”:[12,53],“evasive”:[13],“变体“:[14],”have“:[15],”been“:[16],”conducted“:[17],”to“:[18,60,70,87],”test“:[19],”鲁棒性“:[21],“基于ML”:[23],“分类器”:[25],“框架”:[26],“Hidost”:[27,40,97],“Mimicus。“:[29,99],“As”:[30],“heavy”:[31],“documented”,“:[32],”basical“:[34],”difference“:[35],”between“:[36],”they“:[37],”is“:[38121],”that“:[39,61503],”investigation“:[41],”logic“:[43],”structure“:[44],”while“:[47118],”Mimicus“:[48113127],”detected“:[49],”恶意“:[50,66],”indicators““:[51],”贯穿“:[52],”结构“:[54],”特征。“:[55],”“然而,”:[56],“那里”:[57],“存在”:[58],“技术”:[59],“变异”:[61],“这样”:[62,64],“特征”:[63],“PDF”:[67],“是”:[68,92107],“能”:[69],“绕过”:[71],“这些”:[72],“分类器”。“:[73],“In”:[74],“this”:[75],“work”,:[76],“we”:77],“investived”:[78],“three”:/79],“known”:[80],“attacks:”:【81】,“Mimicry”,“:[82],“Mimimicry+”:[83],“Reverse”:[85119],“Mimicry”:[86104],“compare”:88],“how”:[89],“effect”:[90108122],“they”:[91],“In”:[93,96109112116126],“evading”:[94],“分类器”:[95],“The”:[100],“results”:[101]显示“:[102],”模仿+“:[106],”绕过“:[110],”模型“:[11125],”但是“:[114],”不是“:[115],”Hidost,“:[117],”模拟“:[120],“对抗”:[123],“两者”:[124],“Hidost。“:[129]},”cited_by_api_url“:”https://api.openalex.org/works?filter=cites:W4223964388“,”counts_by_year“:[{”年“:2022,”引用_by_count“:1}],”更新日期“:”2024-07-28T11:19:33.269679“,”创建日期“:“2022-04-19”}