iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3564625.3564661
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:29:15Z","timestamp":1725773355285},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,5]]},"DOI":"10.1145\/3564625.3564661","type":"proceedings-article","created":{"date-parts":[[2022,12,2]],"date-time":"2022-12-02T20:01:29Z","timestamp":1670011289000},"page":"267-278","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-7712-7884","authenticated-orcid":false,"given":"Xutong","family":"Wang","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8023-3941","authenticated-orcid":false,"given":"Chaoge","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1485-2832","authenticated-orcid":false,"given":"Xiaohui","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4711-4251","authenticated-orcid":false,"given":"Zhi","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China"}]},{"given":"Jie","family":"Yin","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China"}]},{"given":"Xiang","family":"Cui","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory, China"}]}],"member":"320","published-online":{"date-parts":[[2022,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Detonating a bad rabbit: Windows Defender Antivirus and layered machine learning defenses. https:\/\/www.microsoft.com\/security\/blog\/2017\/12\/11\/detonating-a-bad-rabbit-windows-defender-antivirus-and-layered-machine-learning-defenses\/. 2017. Detonating a bad rabbit: Windows Defender Antivirus and layered machine learning defenses. https:\/\/www.microsoft.com\/security\/blog\/2017\/12\/11\/detonating-a-bad-rabbit-windows-defender-antivirus-and-layered-machine-learning-defenses\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2018. MalwareGuard: FireEye\u2019s Machine Learning Model to Detect and Prevent Malware. https:\/\/www.fireeye.com\/blog\/products-and-services\/2018\/07\/malwareguard-fireeye-machine-learning-model-to-detect-and-prevent-malware.html. 2018. MalwareGuard: FireEye\u2019s Machine Learning Model to Detect and Prevent Malware. https:\/\/www.fireeye.com\/blog\/products-and-services\/2018\/07\/malwareguard-fireeye-machine-learning-model-to-detect-and-prevent-malware.html."},{"volume-title":"Applying machine learning classifiers to dynamic android malware detection at scale. In 2013 9th international wireless communications and mobile computing conference (IWCMC)","author":"Amos Brandon","key":"e_1_3_2_1_3_1","unstructured":"Brandon Amos , Hamilton Turner , and Jules White . 2013. Applying machine learning classifiers to dynamic android malware detection at scale. In 2013 9th international wireless communications and mobile computing conference (IWCMC) . IEEE , 1666\u20131671. Brandon Amos, Hamilton Turner, and Jules White. 2013. Applying machine learning classifiers to dynamic android malware detection at scale. In 2013 9th international wireless communications and mobile computing conference (IWCMC). IEEE, 1666\u20131671."},{"key":"e_1_3_2_1_4_1","unstructured":"Hyrum\u00a0S Anderson and Phil Roth. 2018. Ember: an open dataset for training static pe malware machine learning models. arXiv preprint arXiv:1804.04637(2018). Hyrum\u00a0S Anderson and Phil Roth. 2018. Ember: an open dataset for training static pe malware machine learning models. arXiv preprint arXiv:1804.04637(2018)."},{"volume-title":"Drebin: Effective and explainable detection of android malware in your pocket.. In Ndss, Vol.\u00a014. 23\u201326.","year":"2014","author":"Arp Daniel","key":"e_1_3_2_1_5_1","unstructured":"Daniel Arp , Michael Spreitzenbarth , Malte Hubner , Hugo Gascon , Konrad Rieck , and CERT Siemens . 2014 . Drebin: Effective and explainable detection of android malware in your pocket.. In Ndss, Vol.\u00a014. 23\u201326. Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, and CERT Siemens. 2014. Drebin: Effective and explainable detection of android malware in your pocket.. In Ndss, Vol.\u00a014. 23\u201326."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2018.8362326"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.35"},{"key":"e_1_3_2_1_9_1","unstructured":"Bryant Chen Wilka Carvalho Nathalie Baracaldo Heiko Ludwig Benjamin Edwards Taesung Lee Ian Molloy and Biplav Srivastava. 2018. Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728(2018). Bryant Chen Wilka Carvalho Nathalie Baracaldo Heiko Ludwig Benjamin Edwards Taesung Lee Ian Molloy and Biplav Srivastava. 2018. Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728(2018)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485837"},{"volume-title":"26th USENIX Security Symposium (USENIX Security 17)","year":"2017","author":"Chua Zheng\u00a0Leong","key":"e_1_3_2_1_11_1","unstructured":"Zheng\u00a0Leong Chua , Shiqi Shen , Prateek Saxena , and Zhenkai Liang . 2017 . Neural nets can learn function type signatures from binaries . In 26th USENIX Security Symposium (USENIX Security 17) . 99\u2013116. Zheng\u00a0Leong Chua, Shiqi Shen, Prateek Saxena, and Zhenkai Liang. 2017. Neural nets can learn function type signatures from binaries. In 26th USENIX Security Symposium (USENIX Security 17). 99\u2013116."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.11"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01617"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTS52701.2021.9608852"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359790"},{"volume-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733(2017).","year":"2017","author":"Gu Tianyu","key":"e_1_3_2_1_16_1","unstructured":"Tianyu Gu , Brendan Dolan-Gavitt , and Siddharth Garg . 2017 . Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733(2017). Tianyu Gu, Brendan Dolan-Gavitt, and Siddharth Garg. 2017. Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733(2017)."},{"key":"e_1_3_2_1_17_1","unstructured":"Junfeng Guo Ang Li and Cong Liu. 2022. Backdoor detection in reinforcement learning. arXiv preprint arXiv:2202.03609(2022). Junfeng Guo Ang Li and Cong Liu. 2022. Backdoor detection in reinforcement learning. arXiv preprint arXiv:2202.03609(2022)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IBCAST.2019.8667136"},{"volume-title":"Lightgbm: A highly efficient gradient boosting decision tree. Advances in neural information processing systems 30","year":"2017","author":"Ke Guolin","key":"e_1_3_2_1_19_1","unstructured":"Guolin Ke , Qi Meng , Thomas Finley , Taifeng Wang , Wei Chen , Weidong Ma , Qiwei Ye , and Tie-Yan Liu . 2017 . Lightgbm: A highly efficient gradient boosting decision tree. Advances in neural information processing systems 30 (2017). Guolin Ke, Qi Meng, Thomas Finley, Taifeng Wang, Wei Chen, Weidong Ma, Qiwei Ye, and Tie-Yan Liu. 2017. Lightgbm: A highly efficient gradient boosting decision tree. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813642"},{"volume-title":"2014 IEEE symposium on security and privacy. IEEE, 197\u2013211","year":"2014","author":"Laskov Pavel","key":"e_1_3_2_1_21_1","unstructured":"Pavel Laskov 2014 . Practical evasion of a learning-based classifier: A case study . In 2014 IEEE symposium on security and privacy. IEEE, 197\u2013211 . Pavel Laskov 2014. Practical evasion of a learning-based classifier: A case study. In 2014 IEEE symposium on security and privacy. IEEE, 197\u2013211."},{"volume-title":"Isolation forest. In 2008 eighth ieee international conference on data mining","author":"Liu Fei\u00a0Tony","key":"e_1_3_2_1_22_1","unstructured":"Fei\u00a0Tony Liu , Kai\u00a0Ming Ting , and Zhi-Hua Zhou . 2008. Isolation forest. In 2008 eighth ieee international conference on data mining . IEEE , 413\u2013422. Fei\u00a0Tony Liu, Kai\u00a0Ming Ting, and Zhi-Hua Zhou. 2008. Isolation forest. In 2008 eighth ieee international conference on data mining. IEEE, 413\u2013422."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Yang Liu Mingyuan Fan Cen Chen Ximeng Liu Zhuo Ma Li Wang and Jianfeng Ma. 2022. Backdoor Defense with Machine Unlearning. arXiv preprint arXiv:2201.09538(2022). Yang Liu Mingyuan Fan Cen Chen Ximeng Liu Zhuo Ma Li Wang and Jianfeng Ma. 2022. Backdoor Defense with Machine Unlearning. arXiv preprint arXiv:2201.09538(2022).","DOI":"10.1109\/INFOCOM48880.2022.9796974"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23300"},{"volume-title":"A unified approach to interpreting model predictions. Advances in neural information processing systems 30","year":"2017","author":"Lundberg M","key":"e_1_3_2_1_26_1","unstructured":"Scott\u00a0 M Lundberg and Su-In Lee . 2017. A unified approach to interpreting model predictions. Advances in neural information processing systems 30 ( 2017 ). Scott\u00a0M Lundberg and Su-In Lee. 2017. A unified approach to interpreting model predictions. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190619.3190637"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23353"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.53"},{"volume-title":"Countermeasures Against Backdoor Attacks Towards Malware Detectors. In International Conference on Cryptology and Network Security. Springer, 295\u2013314","year":"2021","author":"Narisada Shintaro","key":"e_1_3_2_1_30_1","unstructured":"Shintaro Narisada , Yuki Matsumoto , Seira Hidano , Toshihiro Uchibayashi , Takuo Suganuma , Masahiro Hiji , and Shinsaku Kiyomoto . 2021 . Countermeasures Against Backdoor Attacks Towards Malware Detectors. In International Conference on Cryptology and Network Security. Springer, 295\u2013314 . Shintaro Narisada, Yuki Matsumoto, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, and Shinsaku Kiyomoto. 2021. Countermeasures Against Backdoor Attacks Towards Malware Detectors. In International Conference on Cryptology and Network Security. Springer, 295\u2013314."},{"volume-title":"Descent-to-delete: Gradient-based methods for machine unlearning. In Algorithmic Learning Theory. PMLR, 931\u2013962.","year":"2021","author":"Neel Seth","key":"e_1_3_2_1_31_1","unstructured":"Seth Neel , Aaron Roth , and Saeed Sharifi-Malvajerdi . 2021 . Descent-to-delete: Gradient-based methods for machine unlearning. In Algorithmic Learning Theory. PMLR, 931\u2013962. Seth Neel, Aaron Roth, and Saeed Sharifi-Malvajerdi. 2021. Descent-to-delete: Gradient-based methods for machine unlearning. In Algorithmic Learning Theory. PMLR, 931\u2013962."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_5"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04780-1_28"},{"key":"e_1_3_2_1_34_1","unstructured":"Ahmed Salem Rui Wen Michael Backes Shiqing Ma and Yang Zhang. 2020. Dynamic backdoor attacks against machine learning models. arXiv preprint arXiv:2003.03675(2020). Ahmed Salem Rui Wen Michael Backes Shiqing Ma and Yang Zhang. 2020. Dynamic backdoor attacks against machine learning models. arXiv preprint arXiv:2003.03675(2020)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199486"},{"volume-title":"30th USENIX Security Symposium (USENIX Security 21)","year":"2021","author":"Severi Giorgio","key":"e_1_3_2_1_36_1","unstructured":"Giorgio Severi , Jim Meyer , Scott Coull , and Alina Oprea . 2021 . {Explanation-Guided} Backdoor Poisoning Attacks Against Malware Classifiers . In 30th USENIX Security Symposium (USENIX Security 21) . 1487\u20131504. Giorgio Severi, Jim Meyer, Scott Coull, and Alina Oprea. 2021. {Explanation-Guided} Backdoor Poisoning Attacks Against Malware Classifiers. In 30th USENIX Security Symposium (USENIX Security 21). 1487\u20131504."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301168"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420987"},{"volume-title":"Spectral signatures in backdoor attacks. Advances in neural information processing systems 31","year":"2018","author":"Tran Brandon","key":"e_1_3_2_1_39_1","unstructured":"Brandon Tran , Jerry Li , and Aleksander Madry . 2018. Spectral signatures in backdoor attacks. Advances in neural information processing systems 31 ( 2018 ). Brandon Tran, Jerry Li, and Aleksander Madry. 2018. Spectral signatures in backdoor attacks. Advances in neural information processing systems 31 (2018)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354209"}],"event":{"name":"ACSAC: Annual Computer Security Applications Conference","acronym":"ACSAC","location":"Austin TX USA"},"container-title":["Proceedings of the 38th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3564625.3564661","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T06:24:24Z","timestamp":1701757464000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3564661"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,5]]},"references-count":41,"alternative-id":["10.1145\/3564625.3564661","10.1145\/3564625"],"URL":"http:\/\/dx.doi.org\/10.1145\/3564625.3564661","relation":{},"subject":[],"published":{"date-parts":[[2022,12,5]]},"assertion":[{"value":"2022-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}