{"id":"https://openalex.org/W4290996451","doi":"https://doi.org/10.1109/icc45855.2022.9838295","title":"An Incremental Malware Classification Approach Based on Few-Shot Learning","display_name":"An Incremental Malware Classification Approach Based on Few-Shot Learning","publication_year":2022,"publication_date":"2022-05-16","ids":{"openalex":"https://openalex.org/W4290996451","doi":"https://doi.org/10.1109/icc45855.2022.9838295"},"language":"en","primary_location":{"id":"doi:10.1109/icc45855.2022.9838295","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45855.2022.9838295","pdf_url":null,"source":{"id":"https://openalex.org/S4363607711","display_name":"ICC 2022 - IEEE International Conference on Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2022 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072516124","display_name":"Qiang Qian","orcid":"https://orcid.org/0000-0002-3299-2599"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qian Qiang","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","China National Computer Network Emergency Response Technical Team/Coordination Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"China National Computer Network Emergency Response Technical Team/Coordination Center, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056753248","display_name":"Mian Cheng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mian Cheng","raw_affiliation_strings":["China National Computer Network Emergency Response Technical Team/Coordination Center,Beijing,China","China National Computer Network Emergency Response Technical Team/Coordination Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China National Computer Network Emergency Response Technical Team/Coordination Center,Beijing,China","institution_ids":["https://openalex.org/I4210087772"]},{"raw_affiliation_string":"China National Computer Network Emergency Response Technical Team/Coordination Center, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065247251","display_name":"Yang Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210135740","display_name":"Haier Group (China)","ror":"https://ror.org/04a2kft13","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210135740"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Hu","raw_affiliation_strings":["Haier (Beijing) IC Design Co., Ltd,China","Haier (Beijing) IC Design Co., Ltd, China"],"affiliations":[{"raw_affiliation_string":"Haier (Beijing) IC Design Co., Ltd,China","institution_ids":["https://openalex.org/I4210135740"]},{"raw_affiliation_string":"Haier (Beijing) IC Design Co., Ltd, China","institution_ids":["https://openalex.org/I4210135740"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104281006","display_name":"Yuan Zhou","orcid":"https://orcid.org/0009-0008-3650-3861"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Zhou","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","China National Computer Network Emergency Response Technical Team/Coordination Center, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"China National Computer Network Emergency Response Technical Team/Coordination Center, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101598822","display_name":"Jiawei Sun","orcid":"https://orcid.org/0000-0003-1332-6758"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiawei Sun","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100660553","display_name":"Yu Ding","orcid":"https://orcid.org/0009-0007-8422-1781"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Ding","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101604423","display_name":"Zisen Qi","orcid":"https://orcid.org/0009-0008-6340-5749"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zisen Qi","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070762092","display_name":"Fei Jiao","orcid":"https://orcid.org/0000-0003-2007-7729"},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Jiao","raw_affiliation_strings":["Huawei Technology Co., Ltd,China","Huawei Technology Co., Ltd, China"],"affiliations":[{"raw_affiliation_string":"Huawei Technology Co., Ltd,China","institution_ids":["https://openalex.org/I2250955327"]},{"raw_affiliation_string":"Huawei Technology Co., Ltd, China","institution_ids":["https://openalex.org/I2250955327"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5072516124"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210087772","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.8536,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.73803526,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2682","last_page":"2687"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8194435238838196},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7748912572860718},{"id":"https://openalex.org/keywords/shot","display_name":"Shot (pellet)","score":0.6370675563812256},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5617586374282837},{"id":"https://openalex.org/keywords/one-shot","display_name":"One shot","score":0.4786704480648041},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4064220190048218},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.3301115334033966},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23221290111541748},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09227734804153442}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8194435238838196},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7748912572860718},{"id":"https://openalex.org/C2778344882","wikidata":"https://www.wikidata.org/wiki/Q278938","display_name":"Shot (pellet)","level":2,"score":0.6370675563812256},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5617586374282837},{"id":"https://openalex.org/C2992734406","wikidata":"https://www.wikidata.org/wiki/Q413267","display_name":"One shot","level":2,"score":0.4786704480648041},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4064220190048218},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.3301115334033966},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23221290111541748},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09227734804153442},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc45855.2022.9838295","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45855.2022.9838295","pdf_url":null,"source":{"id":"https://openalex.org/S4363607711","display_name":"ICC 2022 - IEEE International Conference on Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2022 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.4399999976158142,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1573526548","https://openalex.org/W2213612645","https://openalex.org/W2601450892","https://openalex.org/W2607510315","https://openalex.org/W2625674597","https://openalex.org/W2798836702","https://openalex.org/W2806076636","https://openalex.org/W2889358441","https://openalex.org/W2896457183","https://openalex.org/W2954148269","https://openalex.org/W2959221393","https://openalex.org/W2963341924","https://openalex.org/W2973368506","https://openalex.org/W2982318303","https://openalex.org/W3000318628","https://openalex.org/W3000411596","https://openalex.org/W3006140559","https://openalex.org/W3008022637","https://openalex.org/W3008497156","https://openalex.org/W3019875810","https://openalex.org/W3048779965","https://openalex.org/W3153387614","https://openalex.org/W3199625283","https://openalex.org/W4288593364","https://openalex.org/W6717697761","https://openalex.org/W6735236233","https://openalex.org/W6736894310","https://openalex.org/W6751705811","https://openalex.org/W6753975912","https://openalex.org/W6755207826","https://openalex.org/W6758314753"],"related_works":["https://openalex.org/W2497720472","https://openalex.org/W4292659306","https://openalex.org/W3044321615","https://openalex.org/W2806221744","https://openalex.org/W2326937258","https://openalex.org/W394267150","https://openalex.org/W2773965352","https://openalex.org/W4294892107","https://openalex.org/W2357748469","https://openalex.org/W2392917037"],"abstract_inverted_index":{"Malware":[0,81],"classification":[1,76,201],"plays":[2],"a":[3,93,118,148,158,210],"fundamental":[4],"role":[5],"among":[6],"all":[7],"the":[8,24,37,41,88,110,124,128,134,163,170,178,182,191,196,200],"related":[9],"tasks.":[10],"Researchers":[11],"and":[12,28,87,100,142,205],"anti-virus":[13],"vendors":[14],"have":[15],"proposed":[16],"deep":[17,33],"learning":[18,34],"(DL)":[19],"methods":[20],"to":[21,56,113,126,168,180,194,198],"deal":[22,57],"with":[23,58,65,117,173],"fast":[25,143],"emerging-malware":[26],"families":[27,44,61,64,115,129,172,208],"samples.":[29,67],"However,":[30],"for":[31],"ordinary":[32],"methods,":[35],"once":[36],"model":[38,112],"is":[39,49,52,90,140,145,190],"trained,":[40],"set":[42],"of":[43,103,120,136,202],"that":[45],"can":[46,107],"be":[47],"recognized":[48],"fixed.":[50],"This":[51],"troublesome":[53],"in":[54,209],"practice":[55],"emerging":[59],"malware":[60,207],"or":[62],"unknown":[63,114,171,204],"scarce":[66],"To":[68,185],"resolve":[69],"this":[70,189],"issue,":[71],"we":[72],"propose":[73],"an":[74],"incremental":[75,166],"approach":[77,156,193],"called":[78],"IMC":[79,106],"(Incremental":[80],"Classification)":[82],"based":[83],"on":[84,157],"few-shot":[85,211],"learning,":[86],"classifier":[89],"implemented":[91],"as":[92],"cosine":[94],"similarity":[95],"function":[96],"between":[97],"extracted":[98],"features":[99],"feature":[101],"vectors":[102],"target":[104],"classes.":[105],"efficiently":[108],"extend":[109],"pre-trained":[111],"dynamically":[116],"handful":[119],"samples":[121],"without":[122],"losing":[123],"ability":[125,167,179],"recognize":[127,181],"it":[130],"has":[131],"\u201cseen\u201d.":[132],"In":[133],"process":[135],"adaptation,":[137],"no":[138],"re-training":[139],"needed":[141],"inference":[144],"realized":[146],"by":[147],"single":[149],"forward":[150],"pass.":[151],"We":[152],"extensively":[153],"evaluate":[154],"our":[155,186],"dataset":[159],"named":[160],"APIMDS":[161],"where":[162],"framework":[164],"achieves":[165],"classify":[169],"high":[174],"accuracy":[175],"while":[176],"maintaining":[177],"known":[183,206],"families.":[184],"best":[187],"knowledge,":[188],"first":[192],"meet":[195],"requirements":[197],"unify":[199],"both":[203],"manner.":[212]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2025-10-10T00:00:00"}
