{"id":"https://openalex.org/W2967107104","doi":"https://doi.org/10.1109/access.2019.2934012","title":"SMASH: A Malware Detection Method Based on Multi-Feature Ensemble Learning","display_name":"SMASH: A Malware Detection Method Based on Multi-Feature Ensemble Learning","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2967107104","doi":"https://doi.org/10.1109/access.2019.2934012","mag":"2967107104"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2934012","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2934012","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2019.2934012","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041979971","display_name":"Yusheng Dai","orcid":"https://orcid.org/0000-0003-3211-3862"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yusheng Dai","raw_affiliation_strings":["School of Electronics and Information, Northwestern Polytechnical University, Xi\u2019an, China","School of Electronics and Information, Northwestern Polytechnical University, Xi&#x2019;an, China","ORCiD"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information, Northwestern Polytechnical University, Xi\u2019an, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"School of Electronics and Information, Northwestern Polytechnical University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"ORCiD","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100427618","display_name":"Hui Li","orcid":"https://orcid.org/0000-0003-3509-3975"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["School of Electronics and Information, Northwestern Polytechnical University, Xi\u2019an, China","School of Electronics and Information, Northwestern Polytechnical University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information, Northwestern Polytechnical University, Xi\u2019an, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"School of Electronics and Information, Northwestern Polytechnical University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000733266","display_name":"Yekui Qian","orcid":"https://orcid.org/0009-0006-4529-1042"},"institutions":[{"id":"https://openalex.org/I4210159156","display_name":"System Equipment (China)","ror":"https://ror.org/04m2bcn74","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210159156"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yekui Qian","raw_affiliation_strings":["National Digital Switching System Engineering and Technological R&D Center (NDSC), Zhengzhou, China","National Digital Switching System Engineering and Technological R&#x0026;D Center (NDSC), Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering and Technological R&D Center (NDSC), Zhengzhou, China","institution_ids":["https://openalex.org/I4210159156"]},{"raw_affiliation_string":"National Digital Switching System Engineering and Technological R&#x0026;D Center (NDSC), Zhengzhou, China","institution_ids":["https://openalex.org/I4210159156"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025191093","display_name":"Ruipeng Yang","orcid":"https://orcid.org/0000-0002-7373-393X"},"institutions":[{"id":"https://openalex.org/I4210159156","display_name":"System Equipment (China)","ror":"https://ror.org/04m2bcn74","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210159156"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruipeng Yang","raw_affiliation_strings":["National Digital Switching System Engineering and Technological R&D Center (NDSC), Zhengzhou, China","National Digital Switching System Engineering and Technological R&#x0026;D Center (NDSC), Zhengzhou, China","ORCiD"],"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering and Technological R&D Center (NDSC), Zhengzhou, China","institution_ids":["https://openalex.org/I4210159156"]},{"raw_affiliation_string":"National Digital Switching System Engineering and Technological R&#x0026;D Center (NDSC), Zhengzhou, China","institution_ids":["https://openalex.org/I4210159156"]},{"raw_affiliation_string":"ORCiD","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089440152","display_name":"Min Zheng","orcid":"https://orcid.org/0000-0001-6159-9879"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Min Zheng","raw_affiliation_strings":["Henan Institute of Information Security Company Ltd., Xuchang, China"],"affiliations":[{"raw_affiliation_string":"Henan Institute of Information Security Company Ltd., Xuchang, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5041979971"],"corresponding_institution_ids":["https://openalex.org/I17145004"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":3.8407,"has_fulltext":false,"cited_by_count":44,"citation_normalized_percentile":{"value":0.94492454,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"7","issue":null,"first_page":"112588","last_page":"112597"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9678999781608582,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8908219337463379},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8763158321380615},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.6173337697982788},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6161967515945435},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.57184898853302},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5575825572013855},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5293653011322021},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4973955452442169},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.48004424571990967},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4721619784832001},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.46617913246154785},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4511505663394928},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.42510080337524414},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10850375890731812},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06542664766311646}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8908219337463379},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8763158321380615},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.6173337697982788},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6161967515945435},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.57184898853302},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5575825572013855},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5293653011322021},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4973955452442169},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.48004424571990967},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4721619784832001},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.46617913246154785},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4511505663394928},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.42510080337524414},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10850375890731812},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06542664766311646},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2934012","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2934012","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5f73354d791a4f60ab045b97d943f5cd","is_oa":true,"landing_page_url":"https://doaj.org/article/5f73354d791a4f60ab045b97d943f5cd","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 112588-112597 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2934012","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2934012","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G5337996698","display_name":null,"funder_award_id":"CX201952","funder_id":"https://openalex.org/F4320321392","funder_display_name":"Northwestern Polytechnical University"},{"id":"https://openalex.org/G7493149093","display_name":null,"funder_award_id":"61571364","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321392","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W200681053","https://openalex.org/W1538332098","https://openalex.org/W1594536929","https://openalex.org/W1996931407","https://openalex.org/W2010065958","https://openalex.org/W2014466911","https://openalex.org/W2022018347","https://openalex.org/W2034053858","https://openalex.org/W2038296020","https://openalex.org/W2066220442","https://openalex.org/W2122672392","https://openalex.org/W2133141510","https://openalex.org/W2166844173","https://openalex.org/W2292977173","https://openalex.org/W2296240038","https://openalex.org/W2304489333","https://openalex.org/W2307930854","https://openalex.org/W2324464293","https://openalex.org/W2344380211","https://openalex.org/W2396643843","https://openalex.org/W2487124337","https://openalex.org/W2508015754","https://openalex.org/W2564471085","https://openalex.org/W2573650634","https://openalex.org/W2632775315","https://openalex.org/W2753594008","https://openalex.org/W2765174411","https://openalex.org/W2766493169","https://openalex.org/W2766613627","https://openalex.org/W2783112941","https://openalex.org/W2789766369","https://openalex.org/W2790484531","https://openalex.org/W2792672492","https://openalex.org/W2793420030","https://openalex.org/W2807415350","https://openalex.org/W2894211014","https://openalex.org/W2914516771","https://openalex.org/W2950774332","https://openalex.org/W3007346474","https://openalex.org/W6608206699","https://openalex.org/W6712851249","https://openalex.org/W6730639065","https://openalex.org/W6732064692","https://openalex.org/W6743618022","https://openalex.org/W6759243529"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W2783112941","https://openalex.org/W2526398307","https://openalex.org/W2470029541","https://openalex.org/W4387065217","https://openalex.org/W2808001300","https://openalex.org/W4368275542","https://openalex.org/W2470502009","https://openalex.org/W1548771250"],"abstract_inverted_index":{"With":[0],"the":[1,46,49,72,87,99,118,142],"increasing":[2],"variants":[3],"of":[4,8,51,102,112,135],"malware,":[5,117],"it":[6],"is":[7,156],"great":[9],"significance":[10],"to":[11,27,70,97,126,139],"detect":[12],"malware":[13,21,36,122,136],"and":[14,63,76,141,155],"ensure":[15],"system":[16],"security":[17],"effectively.":[18],"The":[19],"existing":[20],"dynamic":[22,37,162],"detection":[23,38,61,100,128,147,152,163],"methods":[24,164],"are":[25],"vulnerable":[26],"evasion":[28,71],"attacks.":[29],"For":[30],"this":[31],"situation,":[32],"we":[33,81],"propose":[34],"a":[35,92,103,132],"method":[39,47,148],"based":[40,85],"on":[41,86],"mufti-feature":[42],"ensemble":[43,108],"learning.":[44],"Firstly,":[45],"adopts":[48],"combination":[50],"software":[52],"features":[53,66],"such":[54,67],"as":[55,68],"API":[56],"call":[57],"sequence":[58],"with":[59],"high":[60],"precision":[62,101,153],"low-level":[64],"hardware":[65,77],"resistance":[69],"memory":[73],"dump":[74],"grayscale":[75],"performance":[78],"counters.":[79],"Secondly,":[80],"improve":[82,98,127],"each":[83],"feature":[84],"original":[88],"research.":[89],"We":[90,130],"select":[91],"more":[93],"advanced":[94],"classifier":[95],"model":[96],"single":[104],"feature.":[105],"Finally,":[106],"an":[107],"learning":[109],"algorithm":[110],"composed":[111],"multiple":[113],"classification":[114],"algorithms":[115],"detects":[116],"multi-features":[119],"can":[120,149],"describe":[121],"behavior":[123],"from":[124],"multi-dimensions":[125],"performance.":[129,167],"use":[131],"large":[133],"number":[134],"sample":[137],"dataset":[138],"experiment,":[140],"results":[143],"show":[144],"that":[145],"our":[146],"obtain":[150],"good":[151],"rate,":[154],"better":[157],"than":[158],"other":[159],"recently":[160],"proposed":[161],"in":[165],"anti-evasion":[166]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":7}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
