{"id":"https://openalex.org/W4387760947","doi":"https://doi.org/10.1109/ipccc59175.2023.10253838","title":"Denoising Network of Dynamic Features for Enhanced Malware Classification","display_name":"Denoising Network of Dynamic Features for Enhanced Malware Classification","publication_year":2023,"publication_date":"2023-10-18","ids":{"openalex":"https://openalex.org/W4387760947","doi":"https://doi.org/10.1109/ipccc59175.2023.10253838"},"language":"en","primary_location":{"id":"doi:10.1109/ipccc59175.2023.10253838","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ipccc59175.2023.10253838","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100406653","display_name":"Siyuan Li","orcid":"https://orcid.org/0009-0004-4096-1209"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Siyuan Li","raw_affiliation_strings":["Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079575403","display_name":"Hui Wen","orcid":"https://orcid.org/0000-0003-0854-4152"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Wen","raw_affiliation_strings":["Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079072845","display_name":"Liting Deng","orcid":"https://orcid.org/0000-0001-5411-3885"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liting Deng","raw_affiliation_strings":["Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China","Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100868450","display_name":"Yu Zhou","orcid":"https://orcid.org/0000-0003-2926-212X"},"institutions":[{"id":"https://openalex.org/I4210114441","display_name":"Zhejiang Provincial Public Security Department","ror":"https://ror.org/01z3tch16","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210114441"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Zhou","raw_affiliation_strings":["Jiangsu Provincial Public Security Department,Jiangsu,China","Jiangsu Provincial Public Security Department, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Provincial Public Security Department,Jiangsu,China","institution_ids":["https://openalex.org/I4210114441"]},{"raw_affiliation_string":"Jiangsu Provincial Public Security Department, Jiangsu, China","institution_ids":["https://openalex.org/I4210114441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100339832","display_name":"Wenyuan Zhang","orcid":"https://orcid.org/0000-0002-7287-6883"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenyuan Zhang","raw_affiliation_strings":["Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China","Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100382229","display_name":"Zhi Li","orcid":"https://orcid.org/0000-0001-7071-2976"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Li","raw_affiliation_strings":["Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061643975","display_name":"Limin Sun","orcid":"https://orcid.org/0000-0003-2745-7521"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Limin Sun","raw_affiliation_strings":["Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100406653"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.2038,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.45953052,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"11","issue":null,"first_page":"32","last_page":"39"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8318576812744141},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7647231817245483},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.6060964465141296},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.5552557706832886},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5275287628173828},{"id":"https://openalex.org/keywords/noise-reduction","display_name":"Noise reduction","score":0.5133801698684692},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5055549144744873},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.48714467883110046},{"id":"https://openalex.org/keywords/thresholding","display_name":"Thresholding","score":0.45294708013534546},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4417155981063843},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.43252187967300415},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4109213352203369},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.39782416820526123},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09290289878845215}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8318576812744141},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7647231817245483},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.6060964465141296},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.5552557706832886},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5275287628173828},{"id":"https://openalex.org/C163294075","wikidata":"https://www.wikidata.org/wiki/Q581861","display_name":"Noise reduction","level":2,"score":0.5133801698684692},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5055549144744873},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.48714467883110046},{"id":"https://openalex.org/C191178318","wikidata":"https://www.wikidata.org/wiki/Q2256906","display_name":"Thresholding","level":3,"score":0.45294708013534546},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4417155981063843},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.43252187967300415},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4109213352203369},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39782416820526123},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09290289878845215},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ipccc59175.2023.10253838","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ipccc59175.2023.10253838","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W101596157","https://openalex.org/W1967185446","https://openalex.org/W2074222960","https://openalex.org/W2146842127","https://openalex.org/W2187910102","https://openalex.org/W2503670963","https://openalex.org/W2557513839","https://openalex.org/W2599823825","https://openalex.org/W2775173651","https://openalex.org/W2775516437","https://openalex.org/W2791541601","https://openalex.org/W2799784398","https://openalex.org/W2883822334","https://openalex.org/W2889474744","https://openalex.org/W2890092828","https://openalex.org/W2900633536","https://openalex.org/W2946873049","https://openalex.org/W2977117446","https://openalex.org/W2985792080","https://openalex.org/W2998010923","https://openalex.org/W2998074434","https://openalex.org/W3004698598","https://openalex.org/W3006140559","https://openalex.org/W3037366188","https://openalex.org/W4221112654","https://openalex.org/W4308351818","https://openalex.org/W4318194836","https://openalex.org/W4321786606","https://openalex.org/W4360602064","https://openalex.org/W6604196288","https://openalex.org/W6686901443"],"related_works":["https://openalex.org/W2620652965","https://openalex.org/W2024170198","https://openalex.org/W4296272594","https://openalex.org/W2900526031","https://openalex.org/W2289039654","https://openalex.org/W2728713145","https://openalex.org/W2470502009","https://openalex.org/W2072617132","https://openalex.org/W4360993664","https://openalex.org/W2465235098"],"abstract_inverted_index":{"Malware":[0,33],"classification":[1,47,85,144,157],"based":[2],"on":[3,148],"dynamic":[4,95],"feature":[5],"analysis":[6,96],"works":[7],"by":[8,49],"running":[9],"malware":[10,74,84,156],"in":[11,66,112,123,173],"controlled":[12],"and":[13,42,97,142],"isolated":[14],"environments":[15],"to":[16,31,45,100,116,132,160],"observe":[17],"how":[18],"it":[19],"behaves.":[20],"This":[21],"technology":[22],"widely":[23],"uses":[24],"the":[25,53,67,71,102,113,134,168],"sequence":[26,138],"of":[27,62,73,120,139,170],"run-time":[28],"API":[29,54,103,124,140],"calls":[30,141],"classify.":[32],"often":[34],"adopts":[35],"evasion":[36],"techniques":[37,99],"such":[38],"as":[39],"obfuscation,":[40],"encryption,":[41],"code":[43],"injection":[44],"obfuscate":[46],"results":[48],"introducing":[50],"noise":[51,64,121],"into":[52],"sequence.":[55,104],"The":[56],"existing":[57],"methods":[58],"lack":[59],"explicit":[60,89],"means":[61],"filtering":[63,119],"components":[65,122],"data,":[68],"which":[69],"affects":[70],"accuracy":[72,158],"detection.":[75],"To":[76],"address":[77],"this":[78],"issue,":[79],"we":[80,93,106,166],"propose":[81],"DenoMC,":[82],"a":[83,108,127],"method":[86],"with":[87],"an":[88],"denoising":[90],"module.":[91],"Firstly,":[92],"employ":[94],"embedding":[98],"encode":[101],"Then,":[105],"introduce":[107],"soft":[109],"thresholding":[110],"mechanism":[111],"residual":[114],"network":[115],"achieve":[117],"active":[118],"sequences.":[125],"Finally,":[126],"BiLSTM":[128],"model":[129],"is":[130],"adopted":[131],"enhance":[133],"temporal":[135],"correlation":[136],"among":[137],"improve":[143],"performance.":[145],"Experiments":[146],"conducted":[147],"real":[149],"datasets":[150],"demonstrate":[151],"that":[152],"DenoMC":[153,174],"significantly":[154],"improves":[155],"compared":[159],"other":[161],"state-of-art":[162],"models.":[163],"In":[164],"addition,":[165],"validate":[167],"effectiveness":[169],"each":[171],"module":[172],"through":[175],"extensive":[176],"ablation":[177],"studies.":[178]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
