{"id":"https://openalex.org/W3194345182","doi":"https://doi.org/10.1109/tai.2021.3103139","title":"Learn2Evade: Learning-Based Generative Model for Evading PDF Malware Classifiers","display_name":"Learn2Evade: Learning-Based Generative Model for Evading PDF Malware Classifiers","publication_year":2021,"publication_date":"2021-08-01","ids":{"openalex":"https://openalex.org/W3194345182","doi":"https://doi.org/10.1109/tai.2021.3103139","mag":"3194345182"},"language":"en","primary_location":{"id":"doi:10.1109/tai.2021.3103139","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tai.2021.3103139","pdf_url":"https://ieeexplore.ieee.org/ielx7/9078688/9570826/09512394.pdf","source":{"id":"https://openalex.org/S4210169448","display_name":"IEEE Transactions on Artificial Intelligence","issn_l":"2691-4581","issn":["2691-4581"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ieeexplore.ieee.org/ielx7/9078688/9570826/09512394.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008547463","display_name":"Ho Bae","orcid":"https://orcid.org/0000-0002-5238-3547"},"institutions":[{"id":"https://openalex.org/I138925566","display_name":"Ewha Womans University","ror":"https://ror.org/053fp5c05","country_code":"KR","type":"education","lineage":["https://openalex.org/I138925566"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Ho Bae","raw_affiliation_strings":["Department of Cyber Security, Ewha Womans University, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0000-0002-5238-3547","affiliations":[{"raw_affiliation_string":"Department of Cyber Security, Ewha Womans University, Seoul, South Korea","institution_ids":["https://openalex.org/I138925566"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101410939","display_name":"Younghan Lee","orcid":"https://orcid.org/0000-0001-8414-966X"},"institutions":[{"id":"https://openalex.org/I139264467","display_name":"Seoul National University","ror":"https://ror.org/04h9pn542","country_code":"KR","type":"education","lineage":["https://openalex.org/I139264467"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Younghan Lee","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Seoul National University, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0000-0001-8414-966X","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Seoul National University, Seoul, South Korea","institution_ids":["https://openalex.org/I139264467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101499793","display_name":"Yo-Han Kim","orcid":"https://orcid.org/0000-0002-2699-2496"},"institutions":[{"id":"https://openalex.org/I139264467","display_name":"Seoul National University","ror":"https://ror.org/04h9pn542","country_code":"KR","type":"education","lineage":["https://openalex.org/I139264467"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Yohan Kim","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Seoul National University, Seoul, South Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Seoul National University, Seoul, South Korea","institution_ids":["https://openalex.org/I139264467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066765700","display_name":"Uiwon Hwang","orcid":"https://orcid.org/0000-0001-5054-2236"},"institutions":[{"id":"https://openalex.org/I139264467","display_name":"Seoul National University","ror":"https://ror.org/04h9pn542","country_code":"KR","type":"education","lineage":["https://openalex.org/I139264467"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Uiwon Hwang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Seoul National University, Seoul, South Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Seoul National University, Seoul, South Korea","institution_ids":["https://openalex.org/I139264467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086877012","display_name":"Sungroh Yoon","orcid":"https://orcid.org/0000-0002-2367-197X"},"institutions":[{"id":"https://openalex.org/I139264467","display_name":"Seoul National University","ror":"https://ror.org/04h9pn542","country_code":"KR","type":"education","lineage":["https://openalex.org/I139264467"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sungroh Yoon","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Interdisciplinary Program in Bioinformatics, Interdisciplinary Program in Artificial Intelligence, Automation and Systems Research Institute, Institute of New Media and Communications, and Institute of Engineering Research, Seoul National University, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0000-0002-2367-197X","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Interdisciplinary Program in Bioinformatics, Interdisciplinary Program in Artificial Intelligence, Automation and Systems Research Institute, Institute of New Media and Communications, and Institute of Engineering Research, Seoul National University, Seoul, South Korea","institution_ids":["https://openalex.org/I139264467"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082524666","display_name":"Yunheung Paek","orcid":"https://orcid.org/0000-0002-6412-2926"},"institutions":[{"id":"https://openalex.org/I139264467","display_name":"Seoul National University","ror":"https://ror.org/04h9pn542","country_code":"KR","type":"education","lineage":["https://openalex.org/I139264467"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Yunheung Paek","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Seoul National University, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0000-0002-6412-2926","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Seoul National University, Seoul, South Korea","institution_ids":["https://openalex.org/I139264467"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5008547463"],"corresponding_institution_ids":["https://openalex.org/I138925566"],"apc_list":null,"apc_paid":null,"fwci":1.8524,"has_fulltext":true,"cited_by_count":18,"citation_normalized_percentile":{"value":0.86101808,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"2","issue":"4","first_page":"299","last_page":"313"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7675963044166565},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7383235692977905},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6914178133010864},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6887310147285461},{"id":"https://openalex.org/keywords/discriminator","display_name":"Discriminator","score":0.6047841906547546},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6045430302619934},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.4963446259498596},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.4922007620334625},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4769933819770813},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09025809168815613}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7675963044166565},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7383235692977905},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6914178133010864},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6887310147285461},{"id":"https://openalex.org/C2779803651","wikidata":"https://www.wikidata.org/wiki/Q5282088","display_name":"Discriminator","level":3,"score":0.6047841906547546},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6045430302619934},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.4963446259498596},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.4922007620334625},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4769933819770813},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09025809168815613},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tai.2021.3103139","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tai.2021.3103139","pdf_url":"https://ieeexplore.ieee.org/ielx7/9078688/9570826/09512394.pdf","source":{"id":"https://openalex.org/S4210169448","display_name":"IEEE Transactions on Artificial Intelligence","issn_l":"2691-4581","issn":["2691-4581"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/tai.2021.3103139","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tai.2021.3103139","pdf_url":"https://ieeexplore.ieee.org/ielx7/9078688/9570826/09512394.pdf","source":{"id":"https://openalex.org/S4210169448","display_name":"IEEE Transactions on Artificial Intelligence","issn_l":"2691-4581","issn":["2691-4581"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Artificial Intelligence","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.550000011920929,"id":"https://metadata.un.org/sdg/10"},{"display_name":"Peace, Justice and strong institutions","score":0.4399999976158142,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1001899930","display_name":null,"funder_award_id":"NRF-2020R1A2B5B03095204","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"},{"id":"https://openalex.org/G2203846861","display_name":null,"funder_award_id":"the BK21 FOUR","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"},{"id":"https://openalex.org/G30685149","display_name":null,"funder_award_id":"BK21 FOUR","funder_id":"https://openalex.org/F4320320671","funder_display_name":"National Research Foundation"},{"id":"https://openalex.org/G3692524881","display_name":null,"funder_award_id":"2018-0-00230","funder_id":"https://openalex.org/F4320328359","funder_display_name":"Ministry of Science and ICT, South Korea"},{"id":"https://openalex.org/G4964268064","display_name":null,"funder_award_id":"Grant 2020","funder_id":"https://openalex.org/F4320321365","funder_display_name":"Ewha Womans University"},{"id":"https://openalex.org/G5776525876","display_name":null,"funder_award_id":"2020-0-01840","funder_id":"https://openalex.org/F4320328359","funder_display_name":"Ministry of Science and ICT, South Korea"},{"id":"https://openalex.org/G6307514714","display_name":null,"funder_award_id":"2020-0-01840","funder_id":"https://openalex.org/F4320335489","funder_display_name":"Institute for Information and Communications Technology Promotion"},{"id":"https://openalex.org/G7444592284","display_name":null,"funder_award_id":"2018R1A2B3001628","funder_id":"https://openalex.org/F4320328359","funder_display_name":"Ministry of Science and ICT, South Korea"},{"id":"https://openalex.org/G8790935500","display_name":null,"funder_award_id":"2018R1A2B3001628","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"}],"funders":[{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"},{"id":"https://openalex.org/F4320321292","display_name":"Seoul National University","ror":"https://ror.org/04h9pn542"},{"id":"https://openalex.org/F4320321365","display_name":"Ewha Womans University","ror":"https://ror.org/053fp5c05"},{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"},{"id":"https://openalex.org/F4320328359","display_name":"Ministry of Science and ICT, South Korea","ror":"https://ror.org/01wpjm123"},{"id":"https://openalex.org/F4320335489","display_name":"Institute for Information and Communications Technology Promotion","ror":"https://ror.org/01g0hqq23"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3194345182.pdf","grobid_xml":"https://content.openalex.org/works/W3194345182.grobid-xml"},"referenced_works_count":70,"referenced_works":["https://openalex.org/W145476170","https://openalex.org/W1522301498","https://openalex.org/W1537207920","https://openalex.org/W1665214252","https://openalex.org/W1836465849","https://openalex.org/W1893133781","https://openalex.org/W1910686388","https://openalex.org/W1945616565","https://openalex.org/W1970867218","https://openalex.org/W1988146703","https://openalex.org/W2014466911","https://openalex.org/W2018175892","https://openalex.org/W2038296020","https://openalex.org/W2053307247","https://openalex.org/W2082190528","https://openalex.org/W2103262407","https://openalex.org/W2110889728","https://openalex.org/W2117202485","https://openalex.org/W2162800072","https://openalex.org/W2397135192","https://openalex.org/W2400462880","https://openalex.org/W2401293755","https://openalex.org/W2408141691","https://openalex.org/W2426267443","https://openalex.org/W2525598640","https://openalex.org/W2557044351","https://openalex.org/W2560647685","https://openalex.org/W2570685808","https://openalex.org/W2573650634","https://openalex.org/W2591788621","https://openalex.org/W2734314755","https://openalex.org/W2749572357","https://openalex.org/W2914484425","https://openalex.org/W2949103145","https://openalex.org/W2950864148","https://openalex.org/W2962724315","https://openalex.org/W2963207607","https://openalex.org/W2963389226","https://openalex.org/W2963559848","https://openalex.org/W2964121744","https://openalex.org/W2964311892","https://openalex.org/W2970115835","https://openalex.org/W2971760890","https://openalex.org/W2998147838","https://openalex.org/W3010216895","https://openalex.org/W3015481738","https://openalex.org/W3104158743","https://openalex.org/W4255949318","https://openalex.org/W4256462051","https://openalex.org/W4288104392","https://openalex.org/W4288359148","https://openalex.org/W4295883599","https://openalex.org/W4319988532","https://openalex.org/W6605963037","https://openalex.org/W6631190155","https://openalex.org/W6632085599","https://openalex.org/W6637242042","https://openalex.org/W6638667902","https://openalex.org/W6639864006","https://openalex.org/W6640425456","https://openalex.org/W6711907643","https://openalex.org/W6714069269","https://openalex.org/W6729756640","https://openalex.org/W6730054736","https://openalex.org/W6731927902","https://openalex.org/W6733049761","https://openalex.org/W6734028196","https://openalex.org/W6738602802","https://openalex.org/W6761839128","https://openalex.org/W6849896277"],"related_works":["https://openalex.org/W4293202849","https://openalex.org/W1980965563","https://openalex.org/W1489300767","https://openalex.org/W4380714744","https://openalex.org/W2387995142","https://openalex.org/W4319453655","https://openalex.org/W2057775761","https://openalex.org/W2964074194","https://openalex.org/W2089959425","https://openalex.org/W1966145327"],"abstract_inverted_index":{"Recent":[0],"research":[1],"has":[2,260,352],"shown":[3],"that":[4,77,105,127,175,278,381],"a":[5,17,119,247,341,393,402,412,417,454],"small":[6],"perturbation":[7,441],"to":[8,27,47,162,219,268,426,433,442],"an":[9,102,165],"input":[10],"may":[11],"forcibly":[12],"change":[13],"the":[14,61,93,106,148,155,159,209,217,221,224,252,264,282,361,387,439,443],"prediction":[15],"of":[16,63,92,98,101,121,211,254,263,285,310,344,405,419,430,457],"machine":[18,333],"learning":[19],"(ML)":[20],"model.":[21],"Such":[22,327],"variants":[23,235],"are":[24],"commonly":[25],"referred":[26],"as":[28,140,158,360],"<italic":[29,122],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[30,123,257],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">adversarial":[31],"examples</i>":[32],".":[33],"Early":[34],"studies":[35],"have":[36,320,370],"focused":[37],"mostly":[38],"on":[39,60,392],"ML":[40,86],"models":[41,87,338],"for":[42,52,88,236,272,308,323,401],"image":[43,89],"processing":[44,90],"and":[45,100,196,198,245,334,347,372,432,461,467],"expanded":[46],"other":[48],"applications,":[49],"including":[50],"those":[51,84],"malware":[53,73,132,192,243,325,378,437,452],"classification.":[54],"In":[55,294,365],"this":[56],"article,":[57],"we":[58,117,410],"focus":[59],"problem":[62,79],"finding":[64],"adversarial":[65,125,270,421],"examples":[66],"against":[67,85,188,223,240,464],"ML-based":[68,318,465],"portable":[69],"document":[70],"format":[71],"(PDF)":[72],"classifiers.":[74,326],"We":[75,184],"deem":[76],"our":[78,115,170,186,212,214],"is":[80,216,424],"more":[81,296],"challenging":[82],"than":[83,297],"because":[91],"highly":[94],"complex":[95,283],"data":[96,363],"structure":[97,284],"PDF":[99,108,131,168,182,191,242,286,324,345,359,377,431,436,451],"additional":[103],"constraint":[104],"generated":[107,449],"should":[109],"exhibit":[110],"malicious":[111,150,181,292],"behavior.":[112,151],"To":[113,208,407],"resolve":[114,408],"problem,":[116],"propose":[118,411],"variant":[120,130,167,418],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">generative":[124],"networks</i>":[126],"generate":[128,164,434],"evasive":[129,166,234,376,435,450],"(without":[133],"any":[134],"crash),":[135],"which":[136,306,423],"can":[137,280],"be":[138],"classified":[139],"benign":[141],"by":[142,290,415,471],"various":[143],"existing":[144],"classifiers":[145,193,244,466],"yet":[146],"maintaining":[147],"original":[149,444],"Our":[152,228,446],"model":[153,229],"exploits":[154],"target":[156],"classifier":[157],"second":[160],"discriminator":[161],"rapidly":[163],"with":[169,203,231,340,355,438,453],"new":[171],"feature":[172],"selection":[173],"process":[174],"includes":[176],"unique":[177],"features":[178],"extracted":[179],"from":[180,206,358],"files.":[183],"evaluate":[185],"technique":[187],"three":[189],"representative":[190],"(Hidost\u201913,":[194],"Hidost\u201916,":[195],"PDFrate-v2)":[197],"further":[199],"examine":[200],"its":[201],"effectiveness":[202],"AntiVirus":[204,226,468],"engines":[205,469],"VirusTotal.":[207,472],"best":[210],"knowledge,":[213],"work":[215],"first":[218],"analyze":[220],"performance":[222],"commercial":[225],"engines.":[227],"finds,":[230],"great":[232],"speed,":[233],"all":[237],"selected":[238],"seeds":[239],"state-of-the-art":[241],"raises":[246],"serious":[248],"security":[249],"concern":[250],"in":[251,287,303,374,398],"presence":[253],"adversaries.":[255],"<p":[256],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><i>Impact":[258],"statement</i>\u2014PDF":[259],"been":[261,321,353],"one":[262,304],"most":[265],"popular":[266],"media":[267],"conceal":[269],"contents":[271],"many":[273,317,368],"years.":[274],"The":[275],"reason":[276],"being":[277],"adversaries":[279],"exploit":[281],"their":[288],"favor":[289],"hiding":[291],"content.":[293],"2019,":[295],"73k":[298],"PDF-based":[299],"attacks":[300],"were":[301],"reported":[302],"month,":[305],"accounts":[307],"17%":[309],"newly":[311],"detected":[312],"threats.":[313],"With":[314],"increasing":[315],"popularity,":[316],"techniques":[319],"proposed":[322],"defense":[328,384],"mechanisms":[329],"include":[330],"support":[331],"vector":[332],"random":[335,394],"forest":[336],"classification":[337],"trained":[339,425],"structural":[342],"map":[343],"(Hidost\u201913":[346],"Hidost\u201916).":[348],"Furthermore,":[349],"ensemble":[350],"training":[351,362],"applied":[354],"metadata":[356],"collected":[357],"(PDFrate-v2).":[364],"recent":[366],"studies,":[367],"researchers":[369],"attempted":[371],"succeeded":[373],"generating":[375],"(adversarial":[379],"examples)":[380],"bypass":[382],"such":[383],"techniques.":[385],"However,":[386],"current":[388],"method":[389],"heavily":[390],"relies":[391],"mutation":[395],"algorithm":[396],"resulting":[397],"repeated":[399],"computation":[400],"significant":[403],"period":[404],"time.":[406],"this,":[409],"novel":[413],"solution":[414,447],"employing":[416],"generative":[420],"networks,":[422],"identify":[427],"intrinsic":[428],"properties":[429],"minimum":[440],"PDF.":[445],"successfully":[448],"maximum":[455],"number":[456],"12":[458],"manipulation":[459],"operations":[460],"found":[462],"effective":[463],"provided":[470]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":4}],"updated_date":"2026-05-04T08:30:34.212998","created_date":"2025-10-10T00:00:00"}
