{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T20:09:04Z","timestamp":1676923744641},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,2,26]],"date-time":"2014-02-26T00:00:00Z","timestamp":1393372800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Neural Comput & Applic"],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1007\/s00521-014-1558-4","type":"journal-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T18:47:51Z","timestamp":1393354071000},"page":"93-100","source":"Crossref","is-referenced-by-count":10,"title":["Absent extreme learning machine algorithm with application to packed executable identification"],"prefix":"10.1007","volume":"27","author":[{"given":"Peidai","family":"Xie","sequence":"first","affiliation":[]},{"given":"Xinwang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Yongjun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,2,26]]},"reference":[{"key":"1558_CR1","unstructured":"Huang G-B, Siew CK (2004) Extreme learning machine: RBF network case. In: International conference of the control, automation, robotics and vision, pp 1029\u20131036"},{"issue":"4","key":"1558_CR2","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1109\/TNN.2006.875977","volume":"17","author":"G-B Huang","year":"2006","unstructured":"Huang G-B, Lei C, Siew CK (2006) Universal approximation using incremental constructive feedforward networks with random hidden nodes. IEEE Trans Neural Netw 17(4):879\u2013892","journal-title":"IEEE Trans Neural Netw"},{"issue":"1C3","key":"1558_CR3","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","volume":"70","author":"G-B Huang","year":"2006","unstructured":"Huang G-B, Zhu Q-Y, Siew C-K (2006) Extreme learning machine: theory and applications. Neurocomputing 70(1C3):489\u2013501","journal-title":"Neurocomputing"},{"issue":"16\u201318","key":"1558_CR4","doi-asserted-by":"crossref","first-page":"3056","DOI":"10.1016\/j.neucom.2007.02.009","volume":"70","author":"G-B Huang","year":"2007","unstructured":"Huang G-B, Lei C (2007) Convex incremental extreme learning machine. Neurocomputing 70(16\u201318):3056\u20133062","journal-title":"Neurocomputing"},{"issue":"16\u201318","key":"1558_CR5","doi-asserted-by":"crossref","first-page":"3460","DOI":"10.1016\/j.neucom.2007.10.008","volume":"71","author":"G-B Huang","year":"2008","unstructured":"Huang G-B, Lei C (2008) Enhanced random search based incremental extreme learning machine. Neurocomputing 71(16\u201318):3460\u20133468","journal-title":"Neurocomputing"},{"issue":"2","key":"1558_CR6","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1109\/TSMCB.2011.2168604","volume":"42","author":"G-B Huang","year":"2012","unstructured":"Huang G-B, Zhou H, Ding X, Zhang R (2012) Extreme learning machine for regression and multiclass classification. IEEE Trans Syst Man Cybern Part B 42(2):513\u2013529","journal-title":"IEEE Trans Syst Man Cybern Part B"},{"key":"1558_CR7","doi-asserted-by":"crossref","unstructured":"Liu Q, He Q, Shi Z (2008) Extreme support vector machine classifier. In: Proceedings of the advances in knowledge discovery and data mining, pp 222\u2013233","DOI":"10.1007\/978-3-540-68125-0_21"},{"key":"1558_CR8","doi-asserted-by":"crossref","unstructured":"Feng G, Huang G-B, Lin Q, Gay R (2009) Error minimized extreme learning machine with growth of hidden nodes and incremental learning. IEEE Trans Neural Netw 20(8):1352\u20131357","DOI":"10.1109\/TNN.2009.2024147"},{"issue":"2","key":"1558_CR9","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1109\/TNNLS.2011.2178124","volume":"23","author":"R Zhang","year":"2012","unstructured":"Zhang R, Lan Y, Huang G-B, Xu Z-B (2012) Universal approximation of extreme learning machine with adaptive growth of hidden nodes. IEEE Trans Neural Netw Learn Syst 23(2):365\u2013371","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"16","key":"1558_CR10","doi-asserted-by":"crossref","first-page":"2411","DOI":"10.1016\/j.neucom.2011.03.030","volume":"74","author":"G-B Huang","year":"2011","unstructured":"Huang G-B, Wang D (2011) Advances in extreme learning machines (ELM2010). Neurocomputing 74(16):2411\u20132412","journal-title":"Neurocomputing"},{"key":"1558_CR11","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s13042-011-0019-y","volume":"2","author":"G-B Huang","year":"2011","unstructured":"Huang G-B, Wang D, Lan Y (2011) Extreme learning machines: a survey. Int J Machine Learn Cybern 2:107\u2013122","journal-title":"Int J Mach Learn Cybern"},{"key":"1558_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.neucom.2012.04.029","volume":"102","author":"G-B Huang","year":"2013","unstructured":"Huang G-B, Wang D (2013) Advances in extreme learning machines (ELM2011). Neurocomputing 102:1\u20132","journal-title":"Neurocomputing"},{"key":"1558_CR13","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.neucom.2012.08.010","volume":"101","author":"W Zong","year":"2013","unstructured":"Zong W, Huang G-B, Chen Y (2013) Weighted extreme learning machine for imbalance learning. Neurocomputing 101:229\u2013242","journal-title":"Neurocomputing"},{"key":"1558_CR14","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.neucom.2012.02.040","volume":"102","author":"Q Yu","year":"2013","unstructured":"Yu Q, Miche Y, Eirola E, van Heeswijk M, S\u00e9verin E, Lendasse A (2013) Regularized extreme learning machine for regression with missing data. Neurocomputing 102:45\u201351","journal-title":"Neurocomputing"},{"issue":"9","key":"1558_CR15","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1007\/s00500-012-0822-8","volume":"16","author":"Y Chen","year":"2012","unstructured":"Chen Y, Zhao Z, Wang S, Chen Z (2012) Extreme learning machine-based device displacement free activity recognition model. Soft Comput 16(9):1617\u20131625","journal-title":"Soft Comput"},{"key":"1558_CR16","unstructured":"Ghahramani Z, Jordan MI (1993) Supervised learning from incomplete data via an em approach. In: Advances in neural information processing systems 6, pp 120\u2013127"},{"key":"1558_CR17","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1023\/A:1018628609742","volume":"9","author":"JAK Suykens","year":"1999","unstructured":"Suykens JAK, Vandewalle J (1999) Least squares support vector machine classifiers. Neural Process Lett 9:293\u2013300","journal-title":"Neural Process Lett"},{"key":"1558_CR18","unstructured":"Inc. CVX Research. CVX: Matlab software for disciplined convex programming, version 2.0 beta. http:\/\/cvxr.com\/cvx , September 2012"},{"key":"1558_CR19","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-8853-9","volume-title":"Introductory lectures on convex optimization: a basic course (applied optimization)","author":"Y Nesterov","year":"2004","unstructured":"Nesterov Y (2004) Introductory lectures on convex optimization: a basic course (applied optimization), 1st edn. Springer, Netherlands","edition":"1"},{"key":"1558_CR20","first-page":"1","volume":"9","author":"G Chechik","year":"2008","unstructured":"Chechik G, Heitz G, Elidan G, Abbeel P, Koller D (2008) Max-margin classification of data with absent features. J Mach Learn Res 9:1\u201321","journal-title":"J Mach Learn Res"},{"issue":"2","key":"1558_CR21","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/2089125.2089126","volume":"44","author":"M Egele","year":"2012","unstructured":"Egele M, Scholte T, Kirda E, Kruegel C (2012) A survey on automated dynamic malware-analysis techniques and tools. ACM Comput Surv (CSUR) 44(2):6","journal-title":"ACM Comput Surv (CSUR)"},{"key":"1558_CR22","doi-asserted-by":"crossref","unstructured":"Debray S, Patel J (2010) Reverse engineering self-modifying code: unpacker extraction. In: IEEE 17th working conference on reverse engineering (WCRE), 2010, pp 131\u2013140","DOI":"10.1109\/WCRE.2010.22"},{"key":"1558_CR23","doi-asserted-by":"crossref","unstructured":"Guo F, Ferrie P, Chiueh T-C (2008) A study of the packer problem and its solutions. In: Recent advances in intrusion detection. Springer, Berlin, pp 98\u2013115","DOI":"10.1007\/978-3-540-87403-4_6"},{"key":"1558_CR24","doi-asserted-by":"crossref","unstructured":"Santos I, Xabier U-P, Sanz B, Laorden C, Bringas PG (2011) Collective classification for packed executable identification. In: Proceedings of the 8th annual collaboration, electronic messaging, anti-abuse and spam conference. ACM, pp 23\u201330","DOI":"10.1145\/2030376.2030379"},{"key":"1558_CR25","doi-asserted-by":"crossref","first-page":"1941","DOI":"10.1016\/j.patrec.2008.06.016","volume":"29","author":"R Perdisci","year":"2008","unstructured":"Perdisci R, Lanzi A, Lee W (2008) Classification of packed executables for accurate computer virus detection. Pattern Recogn Lett 29:1941\u20131946","journal-title":"Pattern Recogn Lett"},{"key":"1558_CR26","unstructured":"Smola A, Vishwanathan SVN, Hofmann T (2005) Kernel methods for missing variables. In: Cowell RG, Ghahramani Z (eds) AISTATS05, pp 325\u2013332"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-014-1558-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-014-1558-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-014-1558-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T02:21:08Z","timestamp":1559096468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-014-1558-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,26]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,1]]}},"alternative-id":["1558"],"URL":"https:\/\/doi.org\/10.1007\/s00521-014-1558-4","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2,26]]}}}