{"id":"https://openalex.org/W7140196189","doi":"https://doi.org/10.1016/j.engappai.2026.114580","title":"Multi-view based network for malware classification","display_name":"Multi-view based network for malware classification","publication_year":2026,"publication_date":"2026-03-24","ids":{"openalex":"https://openalex.org/W7140196189","doi":"https://doi.org/10.1016/j.engappai.2026.114580"},"language":"en","primary_location":{"id":"doi:10.1016/j.engappai.2026.114580","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.engappai.2026.114580","pdf_url":null,"source":{"id":"https://openalex.org/S900972176","display_name":"Engineering Applications of Artificial Intelligence","issn_l":"0952-1976","issn":["0952-1976","1873-6769"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Engineering Applications of Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.engappai.2026.114580","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Lijie Chu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lijie Chu","raw_affiliation_strings":["Department of Data and Computing, Northeast Agricultural University, Harbin, 150030, PR China","School of Electrical and Information, Northeast Agricultural University, Harbin, 150030, PR China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Data and Computing, Northeast Agricultural University, Harbin, 150030, PR China","institution_ids":[]},{"raw_affiliation_string":"School of Electrical and Information, Northeast Agricultural University, Harbin, 150030, PR China","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yiqian Zhang","orcid":"https://orcid.org/0009-0004-4382-8323"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yiqian Zhang","raw_affiliation_strings":["Department of Data and Computing, Northeast Agricultural University, Harbin, 150030, PR China","School of Electrical and Information, Northeast Agricultural University, Harbin, 150030, PR China"],"raw_orcid":"https://orcid.org/0009-0004-4382-8323","affiliations":[{"raw_affiliation_string":"Department of Data and Computing, Northeast Agricultural University, Harbin, 150030, PR China","institution_ids":[]},{"raw_affiliation_string":"School of Electrical and Information, Northeast Agricultural University, Harbin, 150030, PR China","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yuexi Qiu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yuexi Qiu","raw_affiliation_strings":["Department of Data and Computing, Northeast Agricultural University, Harbin, 150030, PR China","School of Electrical and Information, Northeast Agricultural University, Harbin, 150030, PR China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Data and Computing, Northeast Agricultural University, Harbin, 150030, PR China","institution_ids":[]},{"raw_affiliation_string":"School of Electrical and Information, Northeast Agricultural University, Harbin, 150030, PR China","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jinge Xing","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jinge Xing","raw_affiliation_strings":["Department of Data and Computing, Northeast Agricultural University, Harbin, 150030, PR China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Data and Computing, Northeast Agricultural University, Harbin, 150030, PR China","institution_ids":[]}]},{"author_position":"last","author":{"id":null,"display_name":"Changjian Zhou","orcid":"https://orcid.org/0000-0002-2094-6405"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Changjian Zhou","raw_affiliation_strings":["Department of Data and Computing, Northeast Agricultural University, Harbin, 150030, PR China"],"raw_orcid":"https://orcid.org/0000-0002-2094-6405","affiliations":[{"raw_affiliation_string":"Department of Data and Computing, Northeast Agricultural University, Harbin, 150030, PR China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":3170,"currency":"USD","value_usd":3170},"apc_paid":{"value":3170,"currency":"USD","value_usd":3170},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.59824346,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"174","issue":null,"first_page":"114580","last_page":"114580"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.002400000113993883,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.001500000013038516,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5974000096321106},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.521399974822998},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5210000276565552},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5094000101089478},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.476500004529953},{"id":"https://openalex.org/keywords/binary-code","display_name":"Binary code","score":0.4611000120639801},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.4575999975204468},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4537000060081482}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9003999829292297},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5974000096321106},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5256999731063843},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.521399974822998},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5210000276565552},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5094000101089478},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.476500004529953},{"id":"https://openalex.org/C63435697","wikidata":"https://www.wikidata.org/wiki/Q864135","display_name":"Binary code","level":3,"score":0.4611000120639801},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.4575999975204468},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4537000060081482},{"id":"https://openalex.org/C87335442","wikidata":"https://www.wikidata.org/wiki/Q2494345","display_name":"Local binary patterns","level":4,"score":0.3846000134944916},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.367000013589859},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.35760000348091125},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.35679998993873596},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.3513999879360199},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.32179999351501465},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.3140000104904175},{"id":"https://openalex.org/C2781122975","wikidata":"https://www.wikidata.org/wiki/Q16928266","display_name":"Semantic feature","level":2,"score":0.3052000105381012},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.2996000051498413},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2840999960899353},{"id":"https://openalex.org/C196956537","wikidata":"https://www.wikidata.org/wiki/Q202021","display_name":"Chromatic scale","level":2,"score":0.27900001406669617},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2732999920845032},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2700999975204468},{"id":"https://openalex.org/C82990744","wikidata":"https://www.wikidata.org/wiki/Q166194","display_name":"RGB color model","level":2,"score":0.26919999718666077}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.engappai.2026.114580","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.engappai.2026.114580","pdf_url":null,"source":{"id":"https://openalex.org/S900972176","display_name":"Engineering Applications of Artificial Intelligence","issn_l":"0952-1976","issn":["0952-1976","1873-6769"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Engineering Applications of Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1016/j.engappai.2026.114580","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.engappai.2026.114580","pdf_url":null,"source":{"id":"https://openalex.org/S900972176","display_name":"Engineering Applications of Artificial Intelligence","issn_l":"0952-1976","issn":["0952-1976","1873-6769"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Engineering Applications of Artificial Intelligence","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4571588933467865,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2034129977","https://openalex.org/W2111730140","https://openalex.org/W2171035369","https://openalex.org/W2801888526","https://openalex.org/W2885747980","https://openalex.org/W2894211014","https://openalex.org/W2965405555","https://openalex.org/W2996806689","https://openalex.org/W3006334803","https://openalex.org/W3020985685","https://openalex.org/W3026718724","https://openalex.org/W3041133507","https://openalex.org/W3044668093","https://openalex.org/W4385454058","https://openalex.org/W4388914142","https://openalex.org/W4390460610","https://openalex.org/W4403490957","https://openalex.org/W4412629316","https://openalex.org/W4413137219"],"related_works":[],"abstract_inverted_index":{"Malware":[0],"poses":[1],"grave":[2],"threats":[3],"to":[4,29,36,40,89,108,156],"cyberspace":[5],"security,":[6],"necessitating":[7],"prompt":[8],"and":[9,51,104,141,149,181],"precise":[10],"classification.":[11],"However,":[12],"existing":[13],"static":[14],"analysis":[15],"methods":[16],"often":[17],"overlook":[18],"the":[19,44,122,166,169,184,187],"alignment":[20],"sensitivity":[21],"inherent":[22],"in":[23],"mapping":[24],"one-dimensional":[25],"(1D)":[26],"binary":[27,96,128,195],"sequences":[28],"three-dimensional":[30],"(3D)":[31],"chromatic":[32],"image":[33],"data,":[34],"leading":[35],"feature":[37,77,110],"loss":[38],"due":[39],"phase":[41],"shifts.":[42],"Furthermore,":[43],"effective":[45],"fusion":[46],"of":[47,168,186],"local":[48,101],"byte-level":[49,119],"textures":[50,129],"global":[52,123],"assembly":[53],"automatic":[54],"storage":[55],"management":[56],"(ASM)":[57],"semantics":[58],"remains":[59],"a":[60,86,137,151,174],"challenge.":[61],"To":[62],"address":[63],"these":[64,117,161],"limitations,":[65],"this":[66],"study":[67],"proposes":[68],"an":[69],"innovative":[70],"Multi-view":[71],"based":[72],"Network":[73,154],"that":[74],"redefines":[75],"\u201cmulti-view\u201d":[76],"extraction":[78],"at":[79],"two":[80],"complementary":[81],"levels.":[82],"Microscopically,":[83],"we":[84,115],"introduce":[85],"bit-shifting":[87],"strategy":[88,190],"generate":[90],"eight":[91],"shifted":[92],"views":[93,120],"from":[94],"each":[95],"sequence,":[97],"exhaustively":[98],"capturing":[99],"all":[100],"red,":[102],"green,":[103],"blue":[105],"(RGB)":[106],"alignments":[107],"ensure":[109],"invariance":[111],"against":[112],"obfuscation.":[113],"Macroscopically,":[114],"integrate":[116],"raw":[118],"with":[121,130],"ASM":[124],"view,":[125],"fusing":[126],"fine-grained":[127],"high-level":[131],"instruction":[132],"semantics.":[133],"The":[134],"framework":[135],"leverages":[136],"Vision":[138],"Transformer":[139],"(ViT)":[140],"Visual":[142],"Geometry":[143],"Group":[144],"(VGG)":[145],"via":[146],"Transfer":[147],"Learning,":[148],"employing":[150],"Bilinear":[152],"Attention":[153],"(BAN)":[155],"model":[157],"high-order":[158],"interactions":[159],"between":[160],"modalities.":[162],"Experimental":[163],"results":[164],"demonstrate":[165],"superiority":[167],"proposed":[170],"approach,":[171],"which":[172],"achieves":[173],"significant":[175],"performance":[176],"improvement":[177],"over":[178],"state-of-the-art":[179],"baselines":[180],"thus":[182],"validates":[183],"effectiveness":[185],"dual-level":[188],"multi-view":[189],"for":[191],"decoding":[192],"complex":[193],"malware":[194],"files.":[196]},"counts_by_year":[],"updated_date":"2026-03-25T13:09:30.665167","created_date":"2026-03-25T00:00:00"}
