{"id":"https://openalex.org/W4396859655","doi":"https://doi.org/10.3390/fi16050168","title":"Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection","display_name":"Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection","publication_year":2024,"publication_date":"2024-05-12","ids":{"openalex":"https://openalex.org/W4396859655","doi":"https://doi.org/10.3390/fi16050168"},"language":"en","primary_location":{"id":"doi:10.3390/fi16050168","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi16050168","pdf_url":"https://www.mdpi.com/1999-5903/16/5/168/pdf?version=1715509868","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/16/5/168/pdf?version=1715509868","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031927335","display_name":"Muhammad Imran","orcid":"https://orcid.org/0000-0002-6946-2591"},"institutions":[{"id":"https://openalex.org/I5561750","display_name":"University of Bari Aldo Moro","ror":"https://ror.org/027ynra39","country_code":"IT","type":"education","lineage":["https://openalex.org/I5561750"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Muhammad Imran","raw_affiliation_strings":["Department of Computer Science, University of Study of Bari Aldo Moro, Via Orabona, 4, 70125 Bari, Italy","Department of Computer Science, University of Study of Bari Aldo Moro, via Orabona, 4, 70125 Bari, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Study of Bari Aldo Moro, Via Orabona, 4, 70125 Bari, Italy","institution_ids":["https://openalex.org/I5561750"]},{"raw_affiliation_string":"Department of Computer Science, University of Study of Bari Aldo Moro, via Orabona, 4, 70125 Bari, Italy","institution_ids":["https://openalex.org/I5561750"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055560733","display_name":"Annalisa Appice","orcid":"https://orcid.org/0000-0001-9840-844X"},"institutions":[{"id":"https://openalex.org/I4210152452","display_name":"Consorzio Interuniversitario Nazionale per l'Informatica","ror":"https://ror.org/03v8v5y65","country_code":"IT","type":"facility","lineage":["https://openalex.org/I4210152452"]},{"id":"https://openalex.org/I5561750","display_name":"University of Bari Aldo Moro","ror":"https://ror.org/027ynra39","country_code":"IT","type":"education","lineage":["https://openalex.org/I5561750"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Annalisa Appice","raw_affiliation_strings":["Consorzio Interuniversitario Nazionale per l\u2019Informatica\u2014CINI, Via Orabona, 4, 70125 Bari, Italy","Department of Computer Science, University of Study of Bari Aldo Moro, Via Orabona, 4, 70125 Bari, Italy","Department of Computer Science, University of Study of Bari Aldo Moro, via Orabona, 4, 70125 Bari, Italy"],"affiliations":[{"raw_affiliation_string":"Consorzio Interuniversitario Nazionale per l\u2019Informatica\u2014CINI, Via Orabona, 4, 70125 Bari, Italy","institution_ids":["https://openalex.org/I4210152452"]},{"raw_affiliation_string":"Department of Computer Science, University of Study of Bari Aldo Moro, Via Orabona, 4, 70125 Bari, Italy","institution_ids":["https://openalex.org/I5561750"]},{"raw_affiliation_string":"Department of Computer Science, University of Study of Bari Aldo Moro, via Orabona, 4, 70125 Bari, Italy","institution_ids":["https://openalex.org/I5561750"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035789137","display_name":"Donato Malerba","orcid":"https://orcid.org/0000-0001-8432-4608"},"institutions":[{"id":"https://openalex.org/I4210152452","display_name":"Consorzio Interuniversitario Nazionale per l'Informatica","ror":"https://ror.org/03v8v5y65","country_code":"IT","type":"facility","lineage":["https://openalex.org/I4210152452"]},{"id":"https://openalex.org/I5561750","display_name":"University of Bari Aldo Moro","ror":"https://ror.org/027ynra39","country_code":"IT","type":"education","lineage":["https://openalex.org/I5561750"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Donato Malerba","raw_affiliation_strings":["Consorzio Interuniversitario Nazionale per l\u2019Informatica\u2014CINI, Via Orabona, 4, 70125 Bari, Italy","Department of Computer Science, University of Study of Bari Aldo Moro, Via Orabona, 4, 70125 Bari, Italy","Department of Computer Science, University of Study of Bari Aldo Moro, via Orabona, 4, 70125 Bari, Italy"],"affiliations":[{"raw_affiliation_string":"Consorzio Interuniversitario Nazionale per l\u2019Informatica\u2014CINI, Via Orabona, 4, 70125 Bari, Italy","institution_ids":["https://openalex.org/I4210152452"]},{"raw_affiliation_string":"Department of Computer Science, University of Study of Bari Aldo Moro, Via Orabona, 4, 70125 Bari, Italy","institution_ids":["https://openalex.org/I5561750"]},{"raw_affiliation_string":"Department of Computer Science, University of Study of Bari Aldo Moro, via Orabona, 4, 70125 Bari, Italy","institution_ids":["https://openalex.org/I5561750"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5031927335","https://openalex.org/A5055560733"],"corresponding_institution_ids":["https://openalex.org/I4210152452","https://openalex.org/I5561750"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":6.1913,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.9682054,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"16","issue":"5","first_page":"168","last_page":"168"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8888441920280457},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8078945279121399},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.758510410785675},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.7143130898475647},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6543987989425659},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.621375560760498},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.524949312210083},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.5232487916946411},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.49413636326789856},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.4919695556163788},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.4876598119735718},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.45101410150527954},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.43621882796287537},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42291632294654846},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.22079628705978394}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8888441920280457},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8078945279121399},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.758510410785675},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7143130898475647},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6543987989425659},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.621375560760498},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.524949312210083},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.5232487916946411},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.49413636326789856},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.4919695556163788},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.4876598119735718},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.45101410150527954},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.43621882796287537},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42291632294654846},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.22079628705978394},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/fi16050168","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi16050168","pdf_url":"https://www.mdpi.com/1999-5903/16/5/168/pdf?version=1715509868","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:gam:jftint:v:16:y:2024:i:5:p:168-:d:1393196","is_oa":false,"landing_page_url":"https://www.mdpi.com/1999-5903/16/5/168/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:71db32118cf64a9fa95eb471a7646253","is_oa":true,"landing_page_url":"https://doaj.org/article/71db32118cf64a9fa95eb471a7646253","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 16, Iss 5, p 168 (2024)","raw_type":"article"},{"id":"pmh:oai:ricerca.uniba.it:11586/523700","is_oa":false,"landing_page_url":"https://hdl.handle.net/11586/523700","pdf_url":null,"source":{"id":"https://openalex.org/S4377196296","display_name":"CINECA IRIS Institutional Research Information System (University of Bari Aldo Moro)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I5561750","host_organization_name":"University of Bari Aldo Moro","host_organization_lineage":["https://openalex.org/I5561750"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.3390/fi16050168","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi16050168","pdf_url":"https://www.mdpi.com/1999-5903/16/5/168/pdf?version=1715509868","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.8100000023841858,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2251713417","display_name":null,"funder_award_id":"e-shelf","funder_id":"https://openalex.org/F4320323256","funder_display_name":"Universita degli Studi di Bari Aldo Moro"}],"funders":[{"id":"https://openalex.org/F4320323256","display_name":"Universita degli Studi di Bari Aldo Moro","ror":"https://ror.org/027ynra39"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4396859655.pdf"},"referenced_works_count":48,"referenced_works":["https://openalex.org/W1663973292","https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W2511008193","https://openalex.org/W2618851150","https://openalex.org/W2768348081","https://openalex.org/W2900633536","https://openalex.org/W2921494018","https://openalex.org/W2942795289","https://openalex.org/W2963461515","https://openalex.org/W2998074434","https://openalex.org/W3015481738","https://openalex.org/W3022269570","https://openalex.org/W3036847733","https://openalex.org/W3045322569","https://openalex.org/W3080622597","https://openalex.org/W3090219579","https://openalex.org/W3091453511","https://openalex.org/W3104141960","https://openalex.org/W3135970545","https://openalex.org/W3164220323","https://openalex.org/W3178593045","https://openalex.org/W3193870278","https://openalex.org/W3211751213","https://openalex.org/W4200518900","https://openalex.org/W4214915047","https://openalex.org/W4224275454","https://openalex.org/W4285173171","https://openalex.org/W4288072399","https://openalex.org/W4288758078","https://openalex.org/W4293525406","https://openalex.org/W4296473303","https://openalex.org/W4297477879","https://openalex.org/W4313216189","https://openalex.org/W4317242903","https://openalex.org/W4318815561","https://openalex.org/W4319442612","https://openalex.org/W4327768002","https://openalex.org/W4367322077","https://openalex.org/W4387617233","https://openalex.org/W4387817744","https://openalex.org/W4389719707","https://openalex.org/W4389892880","https://openalex.org/W4390787971","https://openalex.org/W4392502635","https://openalex.org/W4393931420","https://openalex.org/W4400887755","https://openalex.org/W6745899033"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W2183730421","https://openalex.org/W1982580243","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W2004781009","https://openalex.org/W3184389706","https://openalex.org/W4386160464"],"abstract_inverted_index":{"During":[0],"the":[1,4,58,61,66,78,126,147,155,172,186,199,204,227,238,241,246,253,264,282,285,305,310,319,325,330,333,337],"last":[2],"decade,":[3],"cybersecurity":[5],"literature":[6,175],"has":[7],"conferred":[8],"a":[9,16,29,118,135,290],"high-level":[10],"role":[11],"to":[12,20,37,64,107,225,255,261,273,292],"machine":[13,33,99,159,173,195,217],"learning":[14,34,100,160,174,196,218],"as":[15,211,289],"powerful":[17],"security":[18],"paradigm":[19],"recognise":[21,108],"malicious":[22],"software":[23],"in":[24,163,171,344],"modern":[25],"anti-malware":[26],"systems.":[27],"However,":[28],"non-negligible":[30],"limitation":[31],"of":[32,80,129,150,188,207,230,240,248,284],"methods":[35,157,168,235,268],"used":[36,170],"train":[38],"decision":[39,277,295],"models":[40,161,197,296],"is":[41,117,134,141],"that":[42,140,220,336],"adversarial":[43,84,191,200,266,286,298,338,346],"attacks":[44,50,192],"can":[45,315,341],"easily":[46],"fool":[47,274],"them.":[48],"Adversarial":[49],"are":[51,166,210,252],"attack":[52,156,234,267,307],"samples":[53,59],"produced":[54],"by":[55,69,236,352],"carefully":[56],"manipulating":[57],"at":[60],"test":[62],"time":[63],"violate":[65],"model":[67,123,139,358],"integrity":[68],"causing":[70],"detection":[71,180],"mistakes.":[72],"In":[73,182],"this":[74,164,208],"paper,":[75],"we":[76,184,251],"analyse":[77],"performance":[79,283],"five":[81],"realistic":[82],"target-based":[83],"attacks,":[85],"namely":[86,102],"Extend,":[87],"Full":[88],"DOS,":[89],"Shift,":[90],"FGSM":[91],"padding":[92],"+":[93],"slack":[94],"and":[95,104,158],"GAMMA,":[96],"against":[97,297],"two":[98],"models,":[101],"MalConv":[103,116],"LGBM,":[105],"learned":[106,124,142],"Windows":[109,130,151,177,232,270,299],"Portable":[110],"Executable":[111],"(PE)":[112],"malware":[113,179,272,301,348],"files.":[114,132,153],"Specifically,":[115],"Convolutional":[119],"Neural":[120],"Network":[121],"(CNN)":[122],"from":[125,143],"raw":[127],"bytes":[128],"PE":[131,152,178,233,271,300,347],"LGBM":[133],"Gradient-Boosted":[136],"Decision":[137],"Tree":[138],"features":[144],"extracted":[145],"through":[146,198],"static":[148],"analysis":[149],"Notably,":[154],"considered":[162,265,306,318],"study":[165,260,311,334],"state-of-the-art":[167,231],"broadly":[169],"for":[176,190,324],"tasks.":[181],"addition,":[183],"explore":[185,226,281],"effect":[187],"accounting":[189],"on":[193],"securing":[194],"training":[201,287,339],"strategy.":[202],"Therefore,":[203],"main":[205],"contributions":[206],"article":[209],"follows:":[212],"(1)":[213],"We":[214,280],"extend":[215],"existing":[216],"studies":[219],"commonly":[221],"consider":[222],"small":[223],"datasets":[224],"evasion":[228,322],"ability":[229],"increasing":[237],"size":[239],"evaluation":[242],"dataset.":[243],"(2)":[244],"To":[245],"best":[247],"our":[249],"knowledge,":[250],"first":[254],"carry":[256],"out":[257],"an":[258,275],"exploratory":[259],"explain":[262],"how":[263,313,355],"change":[269],"effective":[276,294,321],"model.":[278],"(3)":[279],"strategy":[288,340],"means":[291],"secure":[293],"files":[302],"generated":[303,349],"with":[304,350],"methods.":[308],"Hence,":[309],"explains":[312],"GAMMA":[314,351],"actually":[316,342],"be":[317],"most":[320],"method":[323],"performed":[326],"comparative":[327],"analysis.":[328],"On":[329],"other":[331],"hand,":[332],"shows":[335],"help":[343],"recognising":[345],"also":[353],"explaining":[354],"it":[356],"changes":[357],"decisions.":[359]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
