{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:33:04Z","timestamp":1773246784780,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62441238"],"award-info":[{"award-number":["62441238"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3744792","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:37:25Z","timestamp":1763854645000},"page":"978-992","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Combating Concept Drift with Explanatory Detection and Adaptation for Android Malware Classification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-5977-1489","authenticated-orcid":false,"given":"Yiling","family":"He","sequence":"first","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0009-0007-1563-6465","authenticated-orcid":false,"given":"Junchi","family":"Lei","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-7872-6969","authenticated-orcid":false,"given":"Zhan","family":"Qin","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-3441-6277","authenticated-orcid":false,"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-6198-7481","authenticated-orcid":false,"given":"Chun","family":"Chen","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Ember: an open dataset for training static pe malware machine learning models. arXiv preprint arXiv:1804.04637","author":"Anderson Hyrum S","year":"2018","unstructured":"Hyrum S Anderson and Phil Roth. 2018. Ember: an open dataset for training static pe malware machine learning models. arXiv preprint arXiv:1804.04637 (2018)."},{"key":"e_1_3_2_1_2_1","unstructured":"Simone Aonzo Yufei Han Alessandro Mantovani and Davide Balzarotti. 2023. Humans vs. machines in malware classification. In revOne32nd USENIX Security Symposium (USENIX Security 23). revOne1145-1162."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"e_1_3_2_1_4_1","unstructured":"AV-ATLAS. 2023. New malware. https:\/\/linproxy.fan.workers.dev:443\/https\/portal.av-atlas.org\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Erin Avllazagaj Ziyun Zhu Leyla Bilge Davide Balzarotti and Tudor Dumitra?. 2021. When malware changed its mind: An empirical study of variable program behaviors in the real world. In revOne30th USENIX security symposium (USENIX Security 21). 3487-3504."},{"key":"e_1_3_2_1_6_1","volume-title":"Large language models as annotators: Enhancing generalization of nlp models at minimal cost. arXiv preprint arXiv:2306.15766","author":"Bansal Parikshit","year":"2023","unstructured":"Parikshit Bansal and Amit Sharma. 2023. Large language models as annotators: Enhancing generalization of nlp models at minimal cost. arXiv preprint arXiv:2306.15766 (2023)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833659"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.07.005"},{"key":"e_1_3_2_1_9_1","first-page":"2765","volume-title":"Decomperson: How Humans Decompile and What We Can Learn From It. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Burk Kevin","year":"2022","unstructured":"Kevin Burk, Fabio Pagani, Christopher Kruegel, and Giovanni Vigna. 2022. Decomperson: How Humans Decompile and What We Can Learn From It. In 31st USENIX Security Symposium (USENIX Security 22). 2765-2782."},{"key":"e_1_3_2_1_10_1","volume-title":"Large language models as tool makers. arXiv preprint arXiv:2305.17126","author":"Cai Tianle","year":"2023","unstructured":"Tianle Cai, Xuezhi Wang, Tengyu Ma, Xinyun Chen, and Denny Zhou. 2023. Large language models as tool makers. arXiv preprint arXiv:2305.17126 (2023)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118590"},{"key":"e_1_3_2_1_12_1","volume-title":"Robust out-of-distribution detection for neural networks. arXiv preprint arXiv:2003.09711","author":"Chen Jiefeng","year":"2020","unstructured":"Jiefeng Chen, Yixuan Li, Xi Wu, Yingyu Liang, and Somesh Jha. 2020b. Robust out-of-distribution detection for neural networks. arXiv preprint arXiv:2003.09711 (2020)."},{"key":"e_1_3_2_1_13_1","first-page":"659","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Chen Kai","year":"2015","unstructured":"Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, and Peng Liu. 2015. Finding unknown malice in 10 seconds: Mass vetting for new threats at the &#123;Google-Play&#125; scale. In 24th USENIX Security Symposium (USENIX Security 15). 659-674."},{"key":"e_1_3_2_1_14_1","volume-title":"International conference on machine learning. PMLR, 1597-1607","author":"Chen Ting","year":"2020","unstructured":"Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. 2020a. A simple framework for contrastive learning of visual representations. In International conference on machine learning. PMLR, 1597-1607."},{"key":"e_1_3_2_1_15_1","first-page":"1127","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Chen Yizheng","year":"2023","unstructured":"Yizheng Chen, Zhoujie Ding, and David Wagner. 2023a. Continuous learning for android malware detection. In 32nd USENIX Security Symposium (USENIX Security 23). 1127-1144."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598051"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/10494820.2015.1006237"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3605764.3623918"},{"key":"e_1_3_2_1_19_1","volume-title":"A survey on automated dynamic malware-analysis techniques and tools. ACM computing surveys (CSUR)","author":"Egele Manuel","year":"2008","unstructured":"Manuel Egele, Theodoor Scholte, Engin Kirda, and Christopher Kruegel. 2008. A survey on automated dynamic malware-analysis techniques and tools. ACM computing surveys (CSUR), Vol. 44, 2 (2008), 1-42."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1481803500013336"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.14"},{"key":"e_1_3_2_1_22_1","unstructured":"Wu Zhuo (Fireeye). 2016. RuMMS: The Latest Family of Android Malware Attacking Users in Russia Via SMS Phishing. https:\/\/linproxy.fan.workers.dev:443\/https\/vulners.com\/fireeye\/FIREEYE:9AE5925A39D370A4CBCA111D177A7AB9."},{"key":"e_1_3_2_1_23_1","article-title":"Malware analysis and classification: A survey","volume":"2014","author":"Gandotra Ekta","year":"2014","unstructured":"Ekta Gandotra, Divya Bansal, and Sanjeev Sofat. 2014. Malware analysis and classification: A survey. Journal of Information Security, Vol. 2014 (2014).","journal-title":"Journal of Information Security"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387530"},{"key":"e_1_3_2_1_25_1","first-page":"62","volume-title":"Proceedings, Part II 22","author":"Grosse Kathrin","year":"2017","unstructured":"Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, and Patrick McDaniel. 2017. Adversarial examples for detection. In Computer Security-ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11--15, 2017, Proceedings, Part II 22. Springer, 62-79."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102757"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243792"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24830"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3168285"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616599"},{"key":"e_1_3_2_1_31_1","volume-title":"International Conference on Learning Representations.","author":"Hendrycks Dan","year":"2016","unstructured":"Dan Hendrycks and Kevin Gimpel. 2016. A Baseline for Detecting Misclassified and Out-of-Distribution Examples in Neural Networks. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v29i1.9597"},{"key":"e_1_3_2_1_33_1","first-page":"1","article-title":"Android Based Malware Detection Technique Using Machine Learning Algorithms. In 2024 First International Conference on Pioneering Developments in Computer Science & Digital Technologies (IC2SDT)","author":"Iqubal Asif","year":"2024","unstructured":"Asif Iqubal, Subodh Kant Tiwari, Sikander Azad, Mithun Kumar Paswan, et al., 2024. Android Based Malware Detection Technique Using Machine Learning Algorithms. In 2024 First International Conference on Pioneering Developments in Computer Science & Digital Technologies (IC2SDT). IEEE, 1-6.","journal-title":"IEEE"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00079"},{"key":"e_1_3_2_1_35_1","volume-title":"Advances in Neural Information Processing Systems","volume":"26","author":"Jia Yangqing","year":"2013","unstructured":"Yangqing Jia, Joshua T Abbott, Joseph L Austerweil, Tom Griffiths, and Trevor Darrell. 2013. Visual concept learning: Combining machine vision and bayesian generalization on concept hierarchies. Advances in Neural Information Processing Systems, Vol. 26 (2013)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63095-9_14"},{"key":"e_1_3_2_1_37_1","volume-title":"Transcend: Detecting concept drift in malware classification models. In 26th USENIX security symposium (USENIX security 17). 625-642.","author":"Jordaney Roberto","year":"2017","unstructured":"Roberto Jordaney, Kumar Sharad, Santanu K Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, and Lorenzo Cavallaro. 2017. Transcend: Detecting concept drift in malware classification models. In 26th USENIX security symposium (USENIX security 17). 625-642."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474369.3486873"},{"key":"e_1_3_2_1_39_1","volume-title":"Cryptography and Security Group","author":"KASTEL","year":"2021","unstructured":"KASTEL: Cryptography and Security Group. 2021. Detecting Adversarial Malware Examples as Concept Drift. https:\/\/linproxy.fan.workers.dev:443\/https\/crypto.iti.kit.edu\/english\/seminar_ba_detecting_adversarial_malware_examples_as_concept_drift.php Accessed on November, 2023."},{"key":"e_1_3_2_1_40_1","volume-title":"Simple and scalable predictive uncertainty estimation using deep ensembles. Advances in neural information processing systems","author":"Lakshminarayanan Balaji","year":"2017","unstructured":"Balaji Lakshminarayanan, Alexander Pritzel, and Charles Blundell. 2017. Simple and scalable predictive uncertainty estimation using deep ensembles. Advances in neural information processing systems, Vol. 30 (2017)."},{"key":"e_1_3_2_1_41_1","unstructured":"Cedric Pernet (TrendMicro) Lenart Bermejo Jordan Pan. 2017. Android Backdoor GhostCtrl Records Your Audio Video. https:\/\/linproxy.fan.workers.dev:443\/https\/www.trendmicro.com\/en_us\/research\/17\/g\/android-backdoor-ghostctrl-can-silently-record-your-audio-video-and-more.html."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450044"},{"key":"e_1_3_2_1_43_1","volume-title":"Enhancing the reliability of out-of-distribution image detection in neural networks. arXiv preprint arXiv:1706.02690","author":"Liang Shiyu","year":"2017","unstructured":"Shiyu Liang, Yixuan Li, and Rayadurgam Srikant. 2017. Enhancing the reliability of out-of-distribution image detection in neural networks. arXiv preprint arXiv:1706.02690 (2017)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685101"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368157"},{"key":"e_1_3_2_1_46_1","first-page":"2727","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Mantovani Alessandro","year":"2022","unstructured":"Alessandro Mantovani, Simone Aonzo, Yanick Fratantonio, and Davide Balzarotti. 2022. RE-Mind: a First Look Inside the Mind of a Reverse Engineer. In 31st USENIX Security Symposium (USENIX Security 22). 2727-2745."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23353"},{"key":"e_1_3_2_1_48_1","volume-title":"Metric learning for novelty and anomaly detection. arXiv preprint arXiv:1808.05492","author":"Masana Marc","year":"2018","unstructured":"Marc Masana, Idoia Ruiz, Joan Serrat, Joost van de Weijer, and Antonio M Lopez. 2018. Metric learning for novelty and anomaly detection. arXiv preprint arXiv:1808.05492 (2018)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3624391"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029823"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"e_1_3_2_1_52_1","volume-title":"Detecting Android Malware by Visualizing App Behaviors from Multiple Complementary Views. arXiv preprint arXiv:2410.06157","author":"Meng Zhaoyi","year":"2024","unstructured":"Zhaoyi Meng, Jiale Zhang, Jiaqi Guo, Wansen Wang, Wenchao Huang, Jie Cui, Hong Zhong, and Yan Xiong. 2024. Detecting Android Malware by Visualizing App Behaviors from Multiple Complementary Views. arXiv preprint arXiv:2410.06157 (2024)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3607505.3607513"},{"key":"e_1_3_2_1_54_1","volume-title":"Understanding softmax confidence and uncertainty. arXiv preprint arXiv:2106.04972","author":"Pearce Tim","year":"2021","unstructured":"Tim Pearce, Alexandra Brintrup, and Jun Zhu. 2021. Understanding softmax confidence and uncertainty. arXiv preprint arXiv:2106.04972 (2021)."},{"key":"e_1_3_2_1_55_1","first-page":"729","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Pendlebury Feargus","year":"2019","unstructured":"Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, and Lorenzo Cavallaro. 2019. TESSERACT: Eliminating experimental bias in malware classification across space and time. In 28th USENIX Security Symposium (USENIX Security 19). 729-746."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447852.3458719"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427242"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-37586-6_16"},{"key":"e_1_3_2_1_59_1","first-page":"468","article-title":"DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps. In 2024 IEEE\/ACM 46th International Conference on Software Engineering (ICSE)","author":"Ren Pengcheng","year":"2023","unstructured":"Pengcheng Ren, Chaoshun Zuo, Xiaofeng Liu, Wenrui Diao, Qingchuan Zhao, and Shanqing Guo. 2023. DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps. In 2024 IEEE\/ACM 46th International Conference on Software Engineering (ICSE). IEEE Computer Society, 468-480.","journal-title":"IEEE Computer Society"},{"key":"e_1_3_2_1_60_1","volume-title":"Right for the right reasons: Training differentiable models by constraining their explanations. arXiv preprint arXiv:1703.03717","author":"Ross Andrew Slavin","year":"2017","unstructured":"Andrew Slavin Ross, Michael C Hughes, and Finale Doshi-Velez. 2017. Right for the right reasons: Training differentiable models by constraining their explanations. arXiv preprint arXiv:1703.03717 (2017)."},{"key":"e_1_3_2_1_61_1","volume-title":"Evaluating the visualization of what a deep neural network has learned","author":"Samek Wojciech","year":"2016","unstructured":"Wojciech Samek, Alexander Binder, Gr\u00e9goire Montavon, Sebastian Lapuschkin, and Klaus-Robert M\u00fcller. 2016. Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems, Vol. 28, 11 (2016), 2660-2673."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00268"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411508.3421373"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00362"},{"key":"e_1_3_2_1_65_1","volume-title":"Technical report","author":"Strom Blake E","unstructured":"Blake E Strom, Andy Applebaum, Doug P Miller, Kathryn C Nickels, Adam G Pennington, and Cody B Thomas. 2018. Mitre att&ck: Design and philosophy. In Technical report. The MITRE Corporation."},{"key":"e_1_3_2_1_66_1","volume-title":"International conference on machine learning. PMLR, 3319-3328","author":"Sundararajan Mukund","year":"2017","unstructured":"Mukund Sundararajan, Ankur Taly, and Qiqi Yan. 2017. Axiomatic attribution for deep networks. In International conference on machine learning. PMLR, 3319-3328."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314293"},{"key":"e_1_3_2_1_68_1","volume-title":"Ten new Android banking trojans targeted 985 bank apps","author":"Toulas Bill","year":"2023","unstructured":"Bill Toulas. 2023. Ten new Android banking trojans targeted 985 bank apps in 2023. https:\/\/linproxy.fan.workers.dev:443\/https\/www.bleepingcomputer.com\/news\/security\/ten-new-android-banking-trojans-targeted-985-bank-apps-in-2023\/"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.11.001"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-09974-4"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555652"},{"key":"e_1_3_2_1_72_1","first-page":"158","article-title":"Evaluating explanation methods for deep learning in security. In 2020 IEEE european symposium on security and privacy (EuroS&P)","author":"Warnecke Alexander","year":"2020","unstructured":"Alexander Warnecke, Daniel Arp, Christian Wressnegger, and Konrad Rieck. 2020. Evaluating explanation methods for deep learning in security. In 2020 IEEE european symposium on security and privacy (EuroS&P). IEEE, 158-174.","journal-title":"IEEE"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179453"},{"key":"e_1_3_2_1_74_1","volume-title":"Xavier: An Information-Stealing Ad Library on Android. https:\/\/linproxy.fan.workers.dev:443\/https\/www.trendmicro.com\/en_sg\/research\/17\/f\/analyzing-xavier-information-stealing-ad-library-android.html.","author":"Xu Ecular","year":"2017","unstructured":"Ecular Xu. 2017. Xavier: An Information-Stealing Ad Library on Android. https:\/\/linproxy.fan.workers.dev:443\/https\/www.trendmicro.com\/en_sg\/research\/17\/f\/analyzing-xavier-information-stealing-ad-library-android.html."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00014"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103651"},{"key":"e_1_3_2_1_77_1","volume-title":"Generalized out-of-distribution detection: A survey. arXiv preprint arXiv:2110.11334","author":"Yang Jingkang","year":"2021","unstructured":"Jingkang Yang, Kaiyang Zhou, Yixuan Li, and Ziwei Liu. 2021b. Generalized out-of-distribution detection: A survey. arXiv preprint arXiv:2110.11334 (2021)."},{"key":"e_1_3_2_1_78_1","first-page":"2327","volume-title":"CADE: Detecting and Explaining Concept Drift Samples for Security Applications. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Yang Limin","year":"2021","unstructured":"Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, and Gang Wang. 2021a. CADE: Detecting and Explaining Concept Drift Samples for Security Applications. In 30th USENIX Security Symposium (USENIX Security 21). 2327-2344."},{"key":"e_1_3_2_1_79_1","first-page":"7375","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Yu Jiahao","year":"2023","unstructured":"Jiahao Yu, Wenbo Guo, Qi Qin, Gang Wang, Ting Wang, and Xinyu Xing. 2023. &#123;AIRS&#125;: Explanation for Deep Reinforcement Learning based Security Applications. In 32nd USENIX Security Symposium (USENIX Security 23). 7375-7392."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417291"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3744792","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:21:19Z","timestamp":1766442079000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3719027.3744792"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":80,"alternative-id":["10.1145\/3719027.3744792","10.1145\/3719027"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/3719027.3744792","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}