{"id":"https://openalex.org/W4392910054","doi":"https://doi.org/10.1109/ccnc51664.2024.10454810","title":"Noisy Label Detection for Multi-labeled Malware","display_name":"Noisy Label Detection for Multi-labeled Malware","publication_year":2024,"publication_date":"2024-01-06","ids":{"openalex":"https://openalex.org/W4392910054","doi":"https://doi.org/10.1109/ccnc51664.2024.10454810"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc51664.2024.10454810","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ccnc51664.2024.10454810","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 21st Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023974227","display_name":"Naoki Fukushi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Naoki Fukushi","raw_affiliation_strings":["NTT Security (Japan) KK,Tokyo,Japan","NTT Security (Japan) KK, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Security (Japan) KK,Tokyo,Japan","institution_ids":[]},{"raw_affiliation_string":"NTT Security (Japan) KK, Tokyo, Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027436126","display_name":"Toshiki Shibahara","orcid":"https://orcid.org/0000-0002-2192-4355"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Toshiki Shibahara","raw_affiliation_strings":["NTT Security (Japan) KK,Tokyo,Japan","NTT Security (Japan) KK, Tokyo, Japan","NTT Social Informatics Laboratories, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Security (Japan) KK,Tokyo,Japan","institution_ids":[]},{"raw_affiliation_string":"NTT Security (Japan) KK, Tokyo, Japan","institution_ids":[]},{"raw_affiliation_string":"NTT Social Informatics Laboratories, Tokyo, Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100686845","display_name":"Hiroki Nakano","orcid":"https://orcid.org/0009-0009-4470-2139"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hiroki Nakano","raw_affiliation_strings":["NTT Security (Japan) KK,Tokyo,Japan","NTT Security (Japan) KK, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Security (Japan) KK,Tokyo,Japan","institution_ids":[]},{"raw_affiliation_string":"NTT Security (Japan) KK, Tokyo, Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112264031","display_name":"Takashi Koide","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Takashi Koide","raw_affiliation_strings":["NTT Security (Japan) KK,Tokyo,Japan","NTT Security (Japan) KK, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Security (Japan) KK,Tokyo,Japan","institution_ids":[]},{"raw_affiliation_string":"NTT Security (Japan) KK, Tokyo, Japan","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053184316","display_name":"Daiki Chiba","orcid":"https://orcid.org/0000-0002-7532-6633"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Daiki Chiba","raw_affiliation_strings":["NTT Security (Japan) KK,Tokyo,Japan","NTT Security (Japan) KK, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Security (Japan) KK,Tokyo,Japan","institution_ids":[]},{"raw_affiliation_string":"NTT Security (Japan) KK, Tokyo, Japan","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5023974227"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.03067945,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"abs/2012.07634","issue":null,"first_page":"165","last_page":"171"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8074827194213867},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7334749698638916},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46635356545448303},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3705574572086334},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2519413232803345}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8074827194213867},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7334749698638916},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46635356545448303},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3705574572086334},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2519413232803345}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccnc51664.2024.10454810","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ccnc51664.2024.10454810","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 21st Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2000159976","https://openalex.org/W2152929147","https://openalex.org/W2514847810","https://openalex.org/W2988966271","https://openalex.org/W3080622597","https://openalex.org/W3111237076","https://openalex.org/W3111533025","https://openalex.org/W3137832402","https://openalex.org/W3156669901","https://openalex.org/W4221018331","https://openalex.org/W4286776272","https://openalex.org/W4300687693","https://openalex.org/W4313563606","https://openalex.org/W6750318962","https://openalex.org/W6751420435","https://openalex.org/W6751647823","https://openalex.org/W6778140923"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W2033914206","https://openalex.org/W2042327336"],"abstract_inverted_index":{"Malware":[0],"attacks":[1],"have":[2],"become":[3],"increasingly":[4],"prevalent,":[5],"and":[6,8,35,116,141,155],"accurate":[7,154],"reliable":[9,156],"malware":[10,38,54,65,106,149,157],"detection":[11],"is":[12,21],"essential":[13,82],"for":[14,48,92],"combating":[15],"them.":[16],"However,":[17],"mislabeling,":[18,94],"where":[19],"data":[20,74],"given":[22],"a":[23,45,59,76,87,104],"different/noisy":[24],"label":[25,78],"than":[26],"its":[27],"true":[28],"label,":[29],"can":[30,123],"significantly":[31],"affect":[32],"the":[33,110,137,143],"accuracy":[34],"reliability":[36],"of":[37,112,139],"detection.":[39,158],"In":[40],"this":[41,97],"paper,":[42],"we":[43],"propose":[44],"new":[46,60,88],"method":[47,62,122],"detecting":[49,93],"noisy":[50],"labels":[51,69],"in":[52,148],"multi-labeled":[53],"datasets.":[55],"Our":[56,132],"approach":[57],"involves":[58],"transformation":[61,98],"that":[63,120],"allows":[64],"datasets":[66],"with":[67,75,126],"multiple":[68],"to":[70,108,130,135,146,152],"be":[71],"treated":[72],"as":[73],"single":[77],"without":[79],"losing":[80],"any":[81],"information.":[83],"We":[84,100],"also":[85],"introduce":[86],"machine":[89],"learning":[90],"model":[91],"based":[95],"on":[96,103],"method.":[99],"conducted":[101],"experiments":[102],"real-world":[105],"dataset":[107],"evaluate":[109],"effectiveness":[111],"our":[113,117,121],"proposed":[114],"method,":[115],"findings":[118],"indicate":[119],"detect":[124],"mislabels":[125],"high":[127],"accuracy,":[128],"up":[129],"94.7%.":[131],"research":[133],"aims":[134],"improve":[136],"quality":[138],"labeling":[140],"reduce":[142],"factors":[144],"contributing":[145],"mislabeling":[147],"datasets,":[150],"leading":[151],"more":[153]},"counts_by_year":[],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
