{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:23:36Z","timestamp":1740169416600,"version":"3.37.3"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100013096","name":"Science and Technology Project of Yunnan Power Grid Company Ltd.","doi-asserted-by":"publisher","award":["YNKJXM20222248"],"id":[{"id":"10.13039\/501100013096","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3485917","type":"journal-article","created":{"date-parts":[[2024,10,24]],"date-time":"2024-10-24T17:28:48Z","timestamp":1729790928000},"page":"160052-160063","source":"Crossref","is-referenced-by-count":0,"title":["A Malware Detection Method Based on Genetic Algorithm Optimized CNN-SENet Network"],"prefix":"10.1109","volume":"12","author":[{"given":"Zheng","family":"Yang","sequence":"first","affiliation":[{"name":"Electric Power Research Institute of Yunnan Power Grid Company Ltd., Kunming, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0162-3362","authenticated-orcid":false,"given":"Hua","family":"Zhu","sequence":"additional","affiliation":[{"name":"Electric Power Research Institute of Yunnan Power Grid Company Ltd., Kunming, China"}]},{"given":"Zhao","family":"Li","sequence":"additional","affiliation":[{"name":"Faculty of Electric Power Engineering, Kunming University of Science and Technology, Kunming, China"}]},{"given":"Gang","family":"Wang","sequence":"additional","affiliation":[{"name":"Faculty of Electric Power Engineering, Kunming University of Science and Technology, Kunming, China"}]},{"given":"Meng","family":"Su","sequence":"additional","affiliation":[{"name":"Electric Power Research Institute of Yunnan Power Grid Company Ltd., Kunming, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPCON.2019.00018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iswa.2024.200381"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2024.05.021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2023.09.030"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108449"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2024.103682"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.rinp.2023.107041"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111286"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2024.103733"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/454"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534324"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110238"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117995"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9071120"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3237661"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.111218"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.01.050"},{"key":"ref19","first-page":"394","article-title":"Historical evidence based trust management strategy against black hole attacks in MANET","volume-title":"Proc. 14th Int. Conf. Adv. Commun. Technol. (ICACT)","author":"Yang"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05763-6"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106030"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105461"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102386"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3105617"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.03.021"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.08.002"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417291"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.002"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.11.034"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102514"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3063748"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02196-4"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124095"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2950134"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3078628"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.2174\/1872212114999200710143847"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1601491"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.iswa.2023.200318"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2739145"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7200-0_13"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489667"},{"key":"ref42","first-page":"171","article-title":"Zero-day malware detection based on supervised learning algorithms of API call signatures","volume-title":"Proc. AusDM","volume":"11","author":"Alazab"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8195395"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5268"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.03.072"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.12.016"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3089698"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3091729"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2019.8806571"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10734072.pdf?arnumber=10734072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T15:16:37Z","timestamp":1732720597000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10734072\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3485917","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2024]]}}}