{"id":"https://openalex.org/W2995774794","doi":"https://doi.org/10.1109/tifs.2019.2960647","title":"Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability","display_name":"Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability","publication_year":2019,"publication_date":"2019-12-18","ids":{"openalex":"https://openalex.org/W2995774794","doi":"https://doi.org/10.1109/tifs.2019.2960647","mag":"2995774794"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2019.2960647","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2960647","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028040417","display_name":"Xiaochun Yun","orcid":"https://orcid.org/0000-0003-2849-1086"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaochun Yun","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101673488","display_name":"Ji Huang","orcid":"https://orcid.org/0000-0002-0646-4661"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ji Huang","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005315918","display_name":"Yipeng Wang","orcid":"https://orcid.org/0000-0002-8188-4666"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yipeng Wang","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066426299","display_name":"Tianning Zang","orcid":"https://orcid.org/0000-0003-3583-6249"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianning Zang","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049853160","display_name":"Yuan Zhou","orcid":"https://orcid.org/0000-0002-9198-6586"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Zhou","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100715816","display_name":"Yongzheng Zhang","orcid":"https://orcid.org/0009-0000-1077-3849"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongzheng Zhang","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5028040417"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":3.6863,"has_fulltext":false,"cited_by_count":53,"citation_normalized_percentile":{"value":0.94251892,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"15","issue":null,"first_page":"2225","last_page":"2240"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8672642111778259},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.8423678874969482},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7418889999389648},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.6706684827804565},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5623210668563843},{"id":"https://openalex.org/keywords/notice","display_name":"Notice","score":0.4735866189002991},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.472176730632782},{"id":"https://openalex.org/keywords/language-model","display_name":"Language model","score":0.4209763705730438},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4192652404308319},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.32266226410865784},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1111329197883606},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10193881392478943},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08742037415504456}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8672642111778259},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.8423678874969482},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7418889999389648},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.6706684827804565},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5623210668563843},{"id":"https://openalex.org/C2779913896","wikidata":"https://www.wikidata.org/wiki/Q7063001","display_name":"Notice","level":2,"score":0.4735866189002991},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.472176730632782},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.4209763705730438},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4192652404308319},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.32266226410865784},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1111329197883606},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10193881392478943},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08742037415504456},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2019.2960647","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2960647","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5282436189","display_name":null,"funder_award_id":"61572496","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8909167515","display_name":null,"funder_award_id":"2016YFB0801304","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":60,"referenced_works":["https://openalex.org/W17316494","https://openalex.org/W1554663460","https://openalex.org/W1561983441","https://openalex.org/W1574901103","https://openalex.org/W1647671624","https://openalex.org/W1665214252","https://openalex.org/W1965555277","https://openalex.org/W1972428331","https://openalex.org/W1981294881","https://openalex.org/W2005207065","https://openalex.org/W2099471712","https://openalex.org/W2100307718","https://openalex.org/W2117812871","https://openalex.org/W2123838014","https://openalex.org/W2125838338","https://openalex.org/W2157825442","https://openalex.org/W2160566431","https://openalex.org/W2170240176","https://openalex.org/W2194775991","https://openalex.org/W2302255633","https://openalex.org/W2464432954","https://openalex.org/W2528572867","https://openalex.org/W2546910111","https://openalex.org/W2567070169","https://openalex.org/W2588126298","https://openalex.org/W2753952929","https://openalex.org/W2760820633","https://openalex.org/W2784570262","https://openalex.org/W2786906486","https://openalex.org/W2889547652","https://openalex.org/W2890863483","https://openalex.org/W2890928763","https://openalex.org/W2904027722","https://openalex.org/W2912464539","https://openalex.org/W2940958568","https://openalex.org/W2954590176","https://openalex.org/W2960612889","https://openalex.org/W2962879692","https://openalex.org/W2962940036","https://openalex.org/W2963012544","https://openalex.org/W2963970792","https://openalex.org/W2964201867","https://openalex.org/W4234559128","https://openalex.org/W4242212377","https://openalex.org/W4295521014","https://openalex.org/W4300906944","https://openalex.org/W4320013936","https://openalex.org/W4388297464","https://openalex.org/W6600692465","https://openalex.org/W6633578641","https://openalex.org/W6636915900","https://openalex.org/W6637242042","https://openalex.org/W6685053522","https://openalex.org/W6698183232","https://openalex.org/W6719105664","https://openalex.org/W6729497825","https://openalex.org/W6731370813","https://openalex.org/W6732249622","https://openalex.org/W6735913928","https://openalex.org/W6779669310"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W3187581118","https://openalex.org/W3143747655","https://openalex.org/W2901835651","https://openalex.org/W2883616266","https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W4285325964","https://openalex.org/W2388837172"],"abstract_inverted_index":{"A":[0],"botnet":[1],"is":[2,86,189,218],"a":[3,61,155,254],"network":[4],"of":[5,32,42,45,83,93,144,157,193,211],"remote-controlled":[6],"devices":[7],"that":[8,40,87,177,223,247],"are":[9,48,91,203],"infected":[10],"with":[11,64],"malware":[12],"controlled":[13],"by":[14,50,261],"botmasters":[15],"in":[16,124,231],"order":[17],"to":[18,110],"launch":[19],"cyber":[20],"attacks.":[21],"To":[22],"evade":[23],"detection,":[24],"the":[25,29,74,120,162,164,166,169,178,185,191,196,199,209,214,224,249,257],"botmaster":[26],"frequently":[27],"changes":[28],"domain":[30,46,51,89,113,126,131,139,148,258],"name":[31],"his":[33],"Command":[34],"and":[35,73,96,98,104,135,168,198,205,208,234],"Control":[36],"(C&C)":[37],"server.":[38],"Notice":[39],"most":[41,121],"these":[43,130],"types":[44],"names":[47,90,132,140,259],"generated":[49,260],"generation":[52],"algorithms":[53],"(DGAs).":[54],"In":[55,115,243],"this":[56],"paper,":[57],"we":[58,100,117,245],"propose":[59],"Khaos,":[60,116,233],"novel":[62],"DGA":[63,159],"high":[65],"anti-detection":[66,238],"ability":[67,239],"based":[68],"on":[69,253],"neural":[70,107],"language":[71,108],"models":[72,109],"Wasserstein":[75],"Generative":[76],"Adversarial":[77],"Network":[78],"(WGAN).":[79],"The":[80],"key":[81],"insight":[82],"our":[84],"research":[85],"real":[88,112,125,147],"composed":[92],"readable":[94],"syllables":[95,103],"acronyms,":[97],"thus":[99],"can":[101,263],"arrange":[102],"acronyms":[105],"using":[106,154],"mimic":[111],"names.":[114,149],"first":[118],"find":[119,246],"common":[122],"n-grams":[123,145],"names,":[127],"then":[128],"tokenize":[129],"into":[133],"n-grams,":[134],"finally":[136],"synthesize":[137],"new":[138],"after":[141],"learning":[142],"arrangements":[143],"from":[146],"We":[150],"carry":[151],"out":[152],"experiments":[153],"variety":[156],"state-of-the-art":[158,241],"detection":[160,171,187,201,216,226,251,266],"approaches:":[161],"statistics-based,":[163],"distribution-based,":[165],"LSTM-based":[167,200],"graph-based":[170,215],"approach.":[172],"Our":[173,220],"experimental":[174],"results":[175],"show":[176],"average":[179],"distance":[180],"for":[181],"detecting":[182,232],"Khaos":[183,194,212,235,262],"under":[184,195,213],"distribution-based":[186],"approach":[188,202,217,252],"0.64,":[190],"AUCs":[192],"statistics-based":[197],"0.76":[204],"0.57,":[206],"respectively,":[207],"precision":[210],"0.68.":[219],"work":[221],"proves":[222],"existing":[225,250],"approaches":[227],"have":[228],"big":[229],"troubles":[230],"has":[236],"better":[237],"than":[240],"DGAs.":[242],"addition,":[244],"training":[248],"dataset":[255],"including":[256],"improve":[264],"its":[265],"ability.":[267]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":4}],"updated_date":"2026-03-22T08:09:32.410652","created_date":"2025-10-10T00:00:00"}
