Killing Two Birds with One Stone: Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior Sequence Article Swipe
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.1145/3705304
Open source software (OSS) supply chain enlarges the attack surface of a software system, which makes package registries attractive targets for attacks. Recently, multiple package registries have received intensified attacks with malicious packages. Of those package registries, NPM and PyPI are two of the most severe victims. Existing malicious package detectors are developed with features from a list of packages of the same ecosystem and deployed within the same ecosystem exclusively, which is infeasible to utilize the knowledge of a new malicious NPM package detected recently to detect the new malicious package in PyPI. Moreover, existing detectors lack support to model malicious behavior of OSS packages in a sequential way. To address the two limitations, we propose a single detection model using malicious behavior sequence, named Cerebro , to detect malicious packages in NPM and PyPI. We curate a feature set based on a high-level abstraction of malicious behavior to enable multi-lingual knowledge fusing. We organize extracted features into a behavior sequence to model sequential malicious behavior. We fine-tune the pre-trained language model to understand the semantics of malicious behavior. Extensive evaluation has demonstrated the effectiveness of Cerebro over the state-of-the-art as well as the practically acceptable efficiency. Cerebro has detected 683 and 799 new malicious packages in PyPI and NPM, and received 707 thank letters from the official PyPI and NPM teams.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1145/3705304
- https://dl.acm.org/doi/pdf/10.1145/3705304
- OA Status
- bronze
- Cited By
- 7
- References
- 60
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4404711543
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4404711543Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1145/3705304Digital Object Identifier
- Title
-
Killing Two Birds with One Stone: Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior SequenceWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2024Year of publication
- Publication date
-
2024-11-26Full publication date if available
- Authors
-
J. S. Zhang, Kaifeng Huang, Yiheng Huang, Bihuan Chen, Ruisi Wang, Chong Wang, Xin PengList of authors in order
- Landing page
-
https://doi.org/10.1145/3705304Publisher landing page
- PDF URL
-
https://dl.acm.org/doi/pdf/10.1145/3705304Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
bronzeOpen access status per OpenAlex
- OA URL
-
https://dl.acm.org/doi/pdf/10.1145/3705304Direct OA link when available
- Concepts
-
Computer science, Sequence (biology), Computer security, Chemistry, BiochemistryTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
7Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 6, 2024: 1Per-year citation counts (last 5 years)
- References (count)
-
60Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4404711543 |
|---|---|
| doi | https://doi.org/10.1145/3705304 |
| ids.doi | https://doi.org/10.1145/3705304 |
| ids.openalex | https://openalex.org/W4404711543 |
| fwci | 4.98752986 |
| type | article |
| title | Killing Two Birds with One Stone: Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior Sequence |
| biblio.issue | 4 |
| biblio.volume | 34 |
| biblio.last_page | 28 |
| biblio.first_page | 1 |
| topics[0].id | https://openalex.org/T11241 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9998000264167786 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1711 |
| topics[0].subfield.display_name | Signal Processing |
| topics[0].display_name | Advanced Malware Detection Techniques |
| topics[1].id | https://openalex.org/T12034 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9976999759674072 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | Digital and Cyber Forensics |
| topics[2].id | https://openalex.org/T10400 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9975000023841858 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Network Security and Intrusion Detection |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.804571807384491 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C2778112365 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6967526078224182 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3511065 |
| concepts[1].display_name | Sequence (biology) |
| concepts[2].id | https://openalex.org/C38652104 |
| concepts[2].level | 1 |
| concepts[2].score | 0.3424417972564697 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[2].display_name | Computer security |
| concepts[3].id | https://openalex.org/C185592680 |
| concepts[3].level | 0 |
| concepts[3].score | 0.05728021264076233 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q2329 |
| concepts[3].display_name | Chemistry |
| concepts[4].id | https://openalex.org/C55493867 |
| concepts[4].level | 1 |
| concepts[4].score | 0.0 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q7094 |
| concepts[4].display_name | Biochemistry |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.804571807384491 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/sequence |
| keywords[1].score | 0.6967526078224182 |
| keywords[1].display_name | Sequence (biology) |
| keywords[2].id | https://openalex.org/keywords/computer-security |
| keywords[2].score | 0.3424417972564697 |
| keywords[2].display_name | Computer security |
| keywords[3].id | https://openalex.org/keywords/chemistry |
| keywords[3].score | 0.05728021264076233 |
| keywords[3].display_name | Chemistry |
| language | en |
| locations[0].id | doi:10.1145/3705304 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S142627899 |
| locations[0].source.issn | 1049-331X, 1557-7392 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1049-331X |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | ACM Transactions on Software Engineering and Methodology |
| locations[0].source.host_organization | https://openalex.org/P4310319798 |
| locations[0].source.host_organization_name | Association for Computing Machinery |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319798 |
| locations[0].source.host_organization_lineage_names | Association for Computing Machinery |
| locations[0].license | |
| locations[0].pdf_url | https://dl.acm.org/doi/pdf/10.1145/3705304 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | ACM Transactions on Software Engineering and Methodology |
| locations[0].landing_page_url | https://doi.org/10.1145/3705304 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5013313233 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | J. S. Zhang |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[0].affiliations[0].raw_affiliation_string | Fudan University, China |
| authorships[0].institutions[0].id | https://openalex.org/I24943067 |
| authorships[0].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Fudan University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Junan Zhang |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Fudan University, China |
| authorships[1].author.id | https://openalex.org/A5011365470 |
| authorships[1].author.orcid | https://orcid.org/0009-0000-1513-8254 |
| authorships[1].author.display_name | Kaifeng Huang |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I116953780 |
| authorships[1].affiliations[0].raw_affiliation_string | Tongji University, China |
| authorships[1].institutions[0].id | https://openalex.org/I116953780 |
| authorships[1].institutions[0].ror | https://ror.org/03rc6as71 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I116953780 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Tongji University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Kaifeng Huang |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Tongji University, China |
| authorships[2].author.id | https://openalex.org/A5073898228 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Yiheng Huang |
| authorships[2].countries | CN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[2].affiliations[0].raw_affiliation_string | Fudan University, China |
| authorships[2].institutions[0].id | https://openalex.org/I24943067 |
| authorships[2].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | Fudan University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Yiheng Huang |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Fudan University, China |
| authorships[3].author.id | https://openalex.org/A5059253116 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-7238-7492 |
| authorships[3].author.display_name | Bihuan Chen |
| authorships[3].countries | CN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[3].affiliations[0].raw_affiliation_string | Fudan University, China |
| authorships[3].institutions[0].id | https://openalex.org/I24943067 |
| authorships[3].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[3].institutions[0].country_code | CN |
| authorships[3].institutions[0].display_name | Fudan University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Bihuan Chen |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Fudan University, China |
| authorships[4].author.id | https://openalex.org/A5034212098 |
| authorships[4].author.orcid | https://orcid.org/0009-0001-6794-0721 |
| authorships[4].author.display_name | Ruisi Wang |
| authorships[4].countries | CN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[4].affiliations[0].raw_affiliation_string | Fudan University, China |
| authorships[4].institutions[0].id | https://openalex.org/I24943067 |
| authorships[4].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[4].institutions[0].country_code | CN |
| authorships[4].institutions[0].display_name | Fudan University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Ruisi Wang |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Fudan University, China |
| authorships[5].author.id | https://openalex.org/A5100329466 |
| authorships[5].author.orcid | https://orcid.org/0000-0003-1424-6290 |
| authorships[5].author.display_name | Chong Wang |
| authorships[5].countries | CN |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[5].affiliations[0].raw_affiliation_string | Fudan University, China |
| authorships[5].institutions[0].id | https://openalex.org/I24943067 |
| authorships[5].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[5].institutions[0].country_code | CN |
| authorships[5].institutions[0].display_name | Fudan University |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Chong Wang |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Fudan University, China |
| authorships[6].author.id | https://openalex.org/A5101854992 |
| authorships[6].author.orcid | https://orcid.org/0000-0003-3376-2581 |
| authorships[6].author.display_name | Xin Peng |
| authorships[6].countries | CN |
| authorships[6].affiliations[0].institution_ids | https://openalex.org/I24943067 |
| authorships[6].affiliations[0].raw_affiliation_string | Fudan University, China |
| authorships[6].institutions[0].id | https://openalex.org/I24943067 |
| authorships[6].institutions[0].ror | https://ror.org/013q1eq08 |
| authorships[6].institutions[0].type | education |
| authorships[6].institutions[0].lineage | https://openalex.org/I24943067 |
| authorships[6].institutions[0].country_code | CN |
| authorships[6].institutions[0].display_name | Fudan University |
| authorships[6].author_position | last |
| authorships[6].raw_author_name | Xin Peng |
| authorships[6].is_corresponding | False |
| authorships[6].raw_affiliation_strings | Fudan University, China |
| has_content.pdf | True |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://dl.acm.org/doi/pdf/10.1145/3705304 |
| open_access.oa_status | bronze |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Killing Two Birds with One Stone: Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior Sequence |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11241 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9998000264167786 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1711 |
| primary_topic.subfield.display_name | Signal Processing |
| primary_topic.display_name | Advanced Malware Detection Techniques |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W2390279801, https://openalex.org/W4391913857, https://openalex.org/W2358668433, https://openalex.org/W4396701345, https://openalex.org/W2376932109, https://openalex.org/W2001405890, https://openalex.org/W4396696052 |
| cited_by_count | 7 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 6 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1145/3705304 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S142627899 |
| best_oa_location.source.issn | 1049-331X, 1557-7392 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1049-331X |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | ACM Transactions on Software Engineering and Methodology |
| best_oa_location.source.host_organization | https://openalex.org/P4310319798 |
| best_oa_location.source.host_organization_name | Association for Computing Machinery |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319798 |
| best_oa_location.source.host_organization_lineage_names | Association for Computing Machinery |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://dl.acm.org/doi/pdf/10.1145/3705304 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | ACM Transactions on Software Engineering and Methodology |
| best_oa_location.landing_page_url | https://doi.org/10.1145/3705304 |
| primary_location.id | doi:10.1145/3705304 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S142627899 |
| primary_location.source.issn | 1049-331X, 1557-7392 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1049-331X |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | ACM Transactions on Software Engineering and Methodology |
| primary_location.source.host_organization | https://openalex.org/P4310319798 |
| primary_location.source.host_organization_name | Association for Computing Machinery |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319798 |
| primary_location.source.host_organization_lineage_names | Association for Computing Machinery |
| primary_location.license | |
| primary_location.pdf_url | https://dl.acm.org/doi/pdf/10.1145/3705304 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | ACM Transactions on Software Engineering and Methodology |
| primary_location.landing_page_url | https://doi.org/10.1145/3705304 |
| publication_date | 2024-11-26 |
| publication_year | 2024 |
| referenced_works | https://openalex.org/W4360948905, https://openalex.org/W2160289821, https://openalex.org/W4321383456, https://openalex.org/W2148542607, https://openalex.org/W4220682629, https://openalex.org/W3200811579, https://openalex.org/W2970323597, https://openalex.org/W2800651024, https://openalex.org/W4247387602, https://openalex.org/W3161491624, https://openalex.org/W2953558274, https://openalex.org/W3027636930, https://openalex.org/W3162344723, https://openalex.org/W2755552262, https://openalex.org/W4385080362, https://openalex.org/W3012793501, https://openalex.org/W4223937600, https://openalex.org/W4403536721, https://openalex.org/W3207355325, https://openalex.org/W1600184236, https://openalex.org/W4298869031, https://openalex.org/W4385208592, https://openalex.org/W4387723777, https://openalex.org/W3155859537, https://openalex.org/W4241830954, https://openalex.org/W4221145571, https://openalex.org/W3109947658, https://openalex.org/W3180903877, https://openalex.org/W4301163492, https://openalex.org/W3081194266, https://openalex.org/W2963321189, https://openalex.org/W3159300567, https://openalex.org/W2981852735, https://openalex.org/W3187000578, https://openalex.org/W3161685529, https://openalex.org/W4226416841, https://openalex.org/W4403536782, https://openalex.org/W3114916308, https://openalex.org/W3196277935, https://openalex.org/W4384345699, https://openalex.org/W3109094705, https://openalex.org/W3094525800, https://openalex.org/W2111978054, https://openalex.org/W4313549796, https://openalex.org/W2732916693, https://openalex.org/W4226410005, https://openalex.org/W3172189288, https://openalex.org/W4288089799, https://openalex.org/W2913588338, https://openalex.org/W1481952923, https://openalex.org/W2911282308, https://openalex.org/W2892181857, https://openalex.org/W4300382868, https://openalex.org/W40327287, https://openalex.org/W2914982603, https://openalex.org/W2913273467, https://openalex.org/W4321386510, https://openalex.org/W4214931895, https://openalex.org/W4214512383, https://openalex.org/W3156903202 |
| referenced_works_count | 60 |
| abstract_inverted_index., | 127 |
| abstract_inverted_index.a | 11, 56, 79, 107, 117, 138, 143, 159 |
| abstract_inverted_index.Of | 33 |
| abstract_inverted_index.To | 110 |
| abstract_inverted_index.We | 136, 154, 167 |
| abstract_inverted_index.as | 191, 193 |
| abstract_inverted_index.in | 92, 106, 132, 207 |
| abstract_inverted_index.is | 72 |
| abstract_inverted_index.of | 10, 42, 58, 60, 78, 103, 146, 177, 186 |
| abstract_inverted_index.on | 142 |
| abstract_inverted_index.to | 74, 86, 99, 128, 149, 162, 173 |
| abstract_inverted_index.we | 115 |
| abstract_inverted_index.683 | 201 |
| abstract_inverted_index.707 | 213 |
| abstract_inverted_index.799 | 203 |
| abstract_inverted_index.NPM | 37, 82, 133, 221 |
| abstract_inverted_index.OSS | 104 |
| abstract_inverted_index.and | 38, 64, 134, 202, 209, 211, 220 |
| abstract_inverted_index.are | 40, 51 |
| abstract_inverted_index.for | 20 |
| abstract_inverted_index.has | 182, 199 |
| abstract_inverted_index.new | 80, 89, 204 |
| abstract_inverted_index.set | 140 |
| abstract_inverted_index.the | 7, 43, 61, 67, 76, 88, 112, 169, 175, 184, 189, 194, 217 |
| abstract_inverted_index.two | 41, 113 |
| abstract_inverted_index.NPM, | 210 |
| abstract_inverted_index.Open | 0 |
| abstract_inverted_index.PyPI | 39, 208, 219 |
| abstract_inverted_index.from | 55, 216 |
| abstract_inverted_index.have | 26 |
| abstract_inverted_index.into | 158 |
| abstract_inverted_index.lack | 97 |
| abstract_inverted_index.list | 57 |
| abstract_inverted_index.most | 44 |
| abstract_inverted_index.over | 188 |
| abstract_inverted_index.same | 62, 68 |
| abstract_inverted_index.way. | 109 |
| abstract_inverted_index.well | 192 |
| abstract_inverted_index.with | 30, 53 |
| abstract_inverted_index.(OSS) | 3 |
| abstract_inverted_index.PyPI. | 93, 135 |
| abstract_inverted_index.based | 141 |
| abstract_inverted_index.chain | 5 |
| abstract_inverted_index.makes | 15 |
| abstract_inverted_index.model | 100, 120, 163, 172 |
| abstract_inverted_index.named | 125 |
| abstract_inverted_index.thank | 214 |
| abstract_inverted_index.those | 34 |
| abstract_inverted_index.using | 121 |
| abstract_inverted_index.which | 14, 71 |
| abstract_inverted_index.attack | 8 |
| abstract_inverted_index.curate | 137 |
| abstract_inverted_index.detect | 87, 129 |
| abstract_inverted_index.enable | 150 |
| abstract_inverted_index.severe | 45 |
| abstract_inverted_index.single | 118 |
| abstract_inverted_index.source | 1 |
| abstract_inverted_index.supply | 4 |
| abstract_inverted_index.teams. | 222 |
| abstract_inverted_index.within | 66 |
| abstract_inverted_index.Cerebro | 126, 187, 198 |
| abstract_inverted_index.address | 111 |
| abstract_inverted_index.attacks | 29 |
| abstract_inverted_index.feature | 139 |
| abstract_inverted_index.fusing. | 153 |
| abstract_inverted_index.letters | 215 |
| abstract_inverted_index.package | 16, 24, 35, 49, 83, 91 |
| abstract_inverted_index.propose | 116 |
| abstract_inverted_index.support | 98 |
| abstract_inverted_index.surface | 9 |
| abstract_inverted_index.system, | 13 |
| abstract_inverted_index.targets | 19 |
| abstract_inverted_index.utilize | 75 |
| abstract_inverted_index.Existing | 47 |
| abstract_inverted_index.attacks. | 21 |
| abstract_inverted_index.behavior | 102, 123, 148, 160 |
| abstract_inverted_index.deployed | 65 |
| abstract_inverted_index.detected | 84, 200 |
| abstract_inverted_index.enlarges | 6 |
| abstract_inverted_index.existing | 95 |
| abstract_inverted_index.features | 54, 157 |
| abstract_inverted_index.language | 171 |
| abstract_inverted_index.multiple | 23 |
| abstract_inverted_index.official | 218 |
| abstract_inverted_index.organize | 155 |
| abstract_inverted_index.packages | 59, 105, 131, 206 |
| abstract_inverted_index.received | 27, 212 |
| abstract_inverted_index.recently | 85 |
| abstract_inverted_index.sequence | 161 |
| abstract_inverted_index.software | 2, 12 |
| abstract_inverted_index.victims. | 46 |
| abstract_inverted_index.Extensive | 180 |
| abstract_inverted_index.Moreover, | 94 |
| abstract_inverted_index.Recently, | 22 |
| abstract_inverted_index.behavior. | 166, 179 |
| abstract_inverted_index.detection | 119 |
| abstract_inverted_index.detectors | 50, 96 |
| abstract_inverted_index.developed | 52 |
| abstract_inverted_index.ecosystem | 63, 69 |
| abstract_inverted_index.extracted | 156 |
| abstract_inverted_index.fine-tune | 168 |
| abstract_inverted_index.knowledge | 77, 152 |
| abstract_inverted_index.malicious | 31, 48, 81, 90, 101, 122, 130, 147, 165, 178, 205 |
| abstract_inverted_index.packages. | 32 |
| abstract_inverted_index.semantics | 176 |
| abstract_inverted_index.sequence, | 124 |
| abstract_inverted_index.acceptable | 196 |
| abstract_inverted_index.attractive | 18 |
| abstract_inverted_index.evaluation | 181 |
| abstract_inverted_index.high-level | 144 |
| abstract_inverted_index.infeasible | 73 |
| abstract_inverted_index.registries | 17, 25 |
| abstract_inverted_index.sequential | 108, 164 |
| abstract_inverted_index.understand | 174 |
| abstract_inverted_index.abstraction | 145 |
| abstract_inverted_index.efficiency. | 197 |
| abstract_inverted_index.intensified | 28 |
| abstract_inverted_index.practically | 195 |
| abstract_inverted_index.pre-trained | 170 |
| abstract_inverted_index.registries, | 36 |
| abstract_inverted_index.demonstrated | 183 |
| abstract_inverted_index.exclusively, | 70 |
| abstract_inverted_index.limitations, | 114 |
| abstract_inverted_index.effectiveness | 185 |
| abstract_inverted_index.multi-lingual | 151 |
| abstract_inverted_index.state-of-the-art | 190 |
| cited_by_percentile_year.max | 99 |
| cited_by_percentile_year.min | 90 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 7 |
| citation_normalized_percentile.value | 0.93893934 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |