{"id":"https://openalex.org/W4320024308","doi":"https://doi.org/10.1109/bigdata55660.2022.10020534","title":"A Visualized Malware Detection Framework with CNN and Conditional GAN","display_name":"A Visualized Malware Detection Framework with CNN and Conditional GAN","publication_year":2022,"publication_date":"2022-12-17","ids":{"openalex":"https://openalex.org/W4320024308","doi":"https://doi.org/10.1109/bigdata55660.2022.10020534"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata55660.2022.10020534","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata55660.2022.10020534","pdf_url":null,"source":{"id":"https://openalex.org/S4363607709","display_name":"2022 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2409.14439","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100321429","display_name":"Fang Wang","orcid":"https://orcid.org/0000-0002-7349-8888"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Fang Wang","raw_affiliation_strings":["Khalifa University,C2PS, Department of Electrical Engineering and Computer Science,Abu Dhabi,United Arab Emirates","C2PS, Department of Electrical Engineering and Computer Science, Khalifa University, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Khalifa University,C2PS, Department of Electrical Engineering and Computer Science,Abu Dhabi,United Arab Emirates","institution_ids":["https://openalex.org/I176601375"]},{"raw_affiliation_string":"C2PS, Department of Electrical Engineering and Computer Science, Khalifa University, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016925365","display_name":"Hussam Al Hamadi","orcid":"https://orcid.org/0000-0002-1353-4138"},"institutions":[{"id":"https://openalex.org/I132806614","display_name":"University of Dubai","ror":"https://ror.org/05h0z7c09","country_code":"AE","type":"education","lineage":["https://openalex.org/I132806614"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Hussam Al Hamadi","raw_affiliation_strings":["University of Dubai,College of Engineering and IT,Dubai,UAE","College of Engineering and IT, University of Dubai, Dubai, UAE"],"affiliations":[{"raw_affiliation_string":"University of Dubai,College of Engineering and IT,Dubai,UAE","institution_ids":["https://openalex.org/I132806614"]},{"raw_affiliation_string":"College of Engineering and IT, University of Dubai, Dubai, UAE","institution_ids":["https://openalex.org/I132806614"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075830877","display_name":"Ernesto Damiani","orcid":"https://orcid.org/0000-0002-9557-6496"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ernesto Damiani","raw_affiliation_strings":["Khalifa University,C2PS, Department of Electrical Engineering and Computer Science,Abu Dhabi,United Arab Emirates","C2PS, Department of Electrical Engineering and Computer Science, Khalifa University, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Khalifa University,C2PS, Department of Electrical Engineering and Computer Science,Abu Dhabi,United Arab Emirates","institution_ids":["https://openalex.org/I176601375"]},{"raw_affiliation_string":"C2PS, Department of Electrical Engineering and Computer Science, Khalifa University, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I176601375"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100321429"],"corresponding_institution_ids":["https://openalex.org/I176601375"],"apc_list":null,"apc_paid":null,"fwci":0.9721,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.78249921,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"6540","last_page":"6546"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8427202701568604},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.799885630607605},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7062341570854187},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.6281396746635437},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5571388006210327},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5483638644218445},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5369522571563721},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.5050695538520813},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.4968118965625763},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.4174134135246277},{"id":"https://openalex.org/keywords/generative-adversarial-network","display_name":"Generative adversarial network","score":0.4129057824611664},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.40383270382881165},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.3952520489692688},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3529452085494995},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1622457206249237}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8427202701568604},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.799885630607605},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7062341570854187},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.6281396746635437},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5571388006210327},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5483638644218445},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5369522571563721},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.5050695538520813},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.4968118965625763},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.4174134135246277},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.4129057824611664},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.40383270382881165},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3952520489692688},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3529452085494995},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1622457206249237},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/bigdata55660.2022.10020534","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata55660.2022.10020534","pdf_url":null,"source":{"id":"https://openalex.org/S4363607709","display_name":"2022 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2409.14439","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2409.14439","pdf_url":"https://arxiv.org/pdf/2409.14439","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2409.14439","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2409.14439","pdf_url":"https://arxiv.org/pdf/2409.14439","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5299999713897705,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4320024308.pdf"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1686810756","https://openalex.org/W2010065958","https://openalex.org/W2125389028","https://openalex.org/W2148143831","https://openalex.org/W2407313496","https://openalex.org/W2508015754","https://openalex.org/W2586571469","https://openalex.org/W2751469117","https://openalex.org/W2754462941","https://openalex.org/W2792643794","https://openalex.org/W2804769055","https://openalex.org/W2889100747","https://openalex.org/W2962949934","https://openalex.org/W2963401022","https://openalex.org/W3008497156","https://openalex.org/W3011665539","https://openalex.org/W3014274353","https://openalex.org/W3138102940","https://openalex.org/W3184998487","https://openalex.org/W4320013936","https://openalex.org/W4320147968","https://openalex.org/W6637373629","https://openalex.org/W6678815747","https://openalex.org/W6744049000","https://openalex.org/W6749029207","https://openalex.org/W7038994942"],"related_works":["https://openalex.org/W323006901","https://openalex.org/W2039892622","https://openalex.org/W2888032422","https://openalex.org/W2996316059","https://openalex.org/W4377980832","https://openalex.org/W2897769091","https://openalex.org/W2845413374","https://openalex.org/W3005996785","https://openalex.org/W4297411772","https://openalex.org/W4235873501"],"abstract_inverted_index":{"Malware":[0],"visualization":[1],"analysis":[2],"incorporating":[3],"with":[4,49,109],"Machine":[5],"Learning":[6],"(ML)":[7],"has":[8],"been":[9],"proven":[10],"to":[11,53,84],"be":[12],"a":[13,45],"promising":[14],"solution":[15],"for":[16,31,102,122],"improving":[17],"security":[18],"defenses":[19],"on":[20,107],"different":[21],"platforms.":[22],"In":[23],"this":[24],"work,":[25],"we":[26],"propose":[27],"an":[28],"integrated":[29],"framework":[30],"addressing":[32],"common":[33],"problems":[34],"experienced":[35],"by":[36,60,97],"ML":[37],"utilizers":[38],"in":[39],"developing":[40],"malware":[41],"detection":[42],"systems.":[43],"Namely,":[44],"pictorial":[46],"presentation":[47],"system":[48],"extensions":[50],"is":[51,82],"designed":[52],"preserve":[54],"the":[55],"identities":[56],"of":[57,91,118],"benign/malign":[58],"samples":[59],"encoding":[61],"each":[62],"variable":[63],"into":[64,70],"binary":[65],"digits":[66],"and":[67,72,88,110,120],"mapping":[68],"them":[69],"black":[71],"white":[73],"pixels.":[74],"A":[75],"conditional":[76],"Generative":[77],"Adversarial":[78],"Network":[79],"based":[80],"model":[81],"adopted":[83],"produce":[85],"synthetic":[86],"images":[87],"mitigate":[89],"issues":[90],"imbalance":[92],"classes.":[93],"Detection":[94],"models":[95],"architected":[96],"Convolutional":[98],"Neural":[99],"Networks":[100],"are":[101],"validating":[103],"performances":[104],"while":[105],"training":[106,125],"datasets":[108],"without":[111],"artifactual":[112],"samples.":[113],"Result":[114],"demonstrates":[115],"accuracy":[116],"rates":[117],"98.51%":[119],"97.26%":[121],"these":[123],"two":[124],"scenarios.":[126]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
