{"id":"https://openalex.org/W4400490091","doi":"https://doi.org/10.1109/cscwd61410.2024.10580719","title":"CAFE: Robust Detection of Malicious Macro based on Cross-modal Feature Extraction","display_name":"CAFE: Robust Detection of Malicious Macro based on Cross-modal Feature Extraction","publication_year":2024,"publication_date":"2024-05-08","ids":{"openalex":"https://openalex.org/W4400490091","doi":"https://doi.org/10.1109/cscwd61410.2024.10580719"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd61410.2024.10580719","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cscwd61410.2024.10580719","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035091617","display_name":"Huaifeng Bao","orcid":"https://orcid.org/0000-0002-9657-3633"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huaifeng Bao","raw_affiliation_strings":["University of Chinese Academy of Sciences,Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security,Beijing,China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115695380","display_name":"Xingyu Wang","orcid":"https://orcid.org/0000-0003-2247-3792"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingyu Wang","raw_affiliation_strings":["University of Chinese Academy of Sciences,Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security,Beijing,China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100362635","display_name":"Wenhao Li","orcid":"https://orcid.org/0000-0003-2268-7416"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenhao Li","raw_affiliation_strings":["University of Chinese Academy of Sciences,Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security,Beijing,China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102725741","display_name":"Jinpeng Xu","orcid":"https://orcid.org/0000-0002-6470-6112"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinpeng Xu","raw_affiliation_strings":["University of Chinese Academy of Sciences,Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security,Beijing,China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057351252","display_name":"Peng Yin","orcid":"https://orcid.org/0000-0003-4968-1436"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Yin","raw_affiliation_strings":["University of Chinese Academy of Sciences, Defence Industry Secrecy Examination and Certification Center,School of Cyber Security,Beijing,China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences, Defence Industry Secrecy Examination and Certification Center,School of Cyber Security,Beijing,China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100396372","display_name":"Wen Wang","orcid":"https://orcid.org/0000-0002-7801-2066"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wen Wang","raw_affiliation_strings":["University of Chinese Academy of Sciences,Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security,Beijing,China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101749780","display_name":"Feng Liu","orcid":"https://orcid.org/0000-0002-9869-3444"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Liu","raw_affiliation_strings":["University of Chinese Academy of Sciences,Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security,Beijing,China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5035091617"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.3637,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.64414662,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"2534","last_page":"2540"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9229000210762024,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9229000210762024,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/modal","display_name":"Modal","score":0.801292896270752},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.7254581451416016},{"id":"https://openalex.org/keywords/macro","display_name":"Macro","score":0.6862624883651733},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6810358762741089},{"id":"https://openalex.org/keywords/extraction","display_name":"Extraction (chemistry)","score":0.5141618251800537},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45867520570755005},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4573518633842468},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33468055725097656}],"concepts":[{"id":"https://openalex.org/C71139939","wikidata":"https://www.wikidata.org/wiki/Q910194","display_name":"Modal","level":2,"score":0.801292896270752},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.7254581451416016},{"id":"https://openalex.org/C166955791","wikidata":"https://www.wikidata.org/wiki/Q629579","display_name":"Macro","level":2,"score":0.6862624883651733},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6810358762741089},{"id":"https://openalex.org/C4725764","wikidata":"https://www.wikidata.org/wiki/Q844704","display_name":"Extraction (chemistry)","level":2,"score":0.5141618251800537},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45867520570755005},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4573518633842468},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33468055725097656},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.0},{"id":"https://openalex.org/C188027245","wikidata":"https://www.wikidata.org/wiki/Q750446","display_name":"Polymer chemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscwd61410.2024.10580719","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cscwd61410.2024.10580719","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320337495","display_name":"Technology Development","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1515539475","https://openalex.org/W1832693441","https://openalex.org/W1945616565","https://openalex.org/W2111216264","https://openalex.org/W2180612164","https://openalex.org/W2547875792","https://openalex.org/W2557716486","https://openalex.org/W2799194071","https://openalex.org/W2884157903","https://openalex.org/W2905526464","https://openalex.org/W2963389226","https://openalex.org/W2963857521","https://openalex.org/W2963859254","https://openalex.org/W2982083293","https://openalex.org/W2984064077","https://openalex.org/W3042975773","https://openalex.org/W3070794221","https://openalex.org/W3084472304","https://openalex.org/W3145691682","https://openalex.org/W3208768981","https://openalex.org/W4200395040","https://openalex.org/W4288057801","https://openalex.org/W4288257146","https://openalex.org/W4293846201","https://openalex.org/W4311165726","https://openalex.org/W4313635459","https://openalex.org/W4385245566","https://openalex.org/W4388464937","https://openalex.org/W6640425456","https://openalex.org/W6729756640","https://openalex.org/W6739879593","https://openalex.org/W6793018049","https://openalex.org/W6802691435"],"related_works":["https://openalex.org/W2030816003","https://openalex.org/W4239992647","https://openalex.org/W2150013480","https://openalex.org/W1554458299","https://openalex.org/W2076325756","https://openalex.org/W81423522","https://openalex.org/W1509860481","https://openalex.org/W2488264085","https://openalex.org/W4386206750","https://openalex.org/W4238700786"],"abstract_inverted_index":{"The":[0,81],"detection":[1,37,76,125,152],"of":[2,10,83,101,156],"malicious":[3,150],"macros":[4],"has":[5],"been":[6],"a":[7,54,86],"prominent":[8],"focus":[9],"research.":[11],"Previous":[12],"approaches":[13],"exhibit":[14],"two":[15,131,143],"notable":[16],"shortcomings.":[17],"Firstly,":[18],"methods":[19],"centered":[20],"on":[21,40,78,130],"document":[22],"and":[23,46,94,108,139,159],"macro":[24,151],"code":[25],"features":[26],"often":[27],"fall":[28],"short":[29],"in":[30,105,153],"effectively":[31],"countering":[32],"targeted":[33],"adversarial":[34,58,160],"strategies.":[35],"Secondly,":[36],"techniques":[38],"relying":[39],"deceptive":[41,79],"information,":[42],"such":[43],"as":[44],"visual":[45],"textual":[47],"cues,":[48],"although":[49],"alleviating":[50],"certain":[51],"challenges,":[52],"introduce":[53],"new":[55],"vulnerability":[56],"to":[57,119],"machine":[59],"learning":[60],"techniques.":[61],"In":[62],"this":[63],"paper,":[64],"we":[65],"present":[66],"Collaborative":[67],"Adaptive":[68],"Feature":[69],"Extraction":[70],"method":[71],"(CAFE),":[72],"designed":[73],"for":[74,148],"robust":[75,149],"based":[77],"information.":[80],"core":[82],"CAFE":[84,135],"is":[85,117,173],"feature":[87,100,110,114,122],"fusion":[88],"network":[89],"architecture,":[90],"where":[91],"modality-shared":[92],"associations":[93],"modalityprivate":[95],"information":[96,141],"are":[97],"modeled":[98],"from":[99,142],"different":[102],"modalities,":[103,144],"resulting":[104],"independently":[106],"valid":[107],"comprehensive":[109],"representations.":[111],"An":[112],"adaptive":[113],"sampling":[115],"module":[116],"introduced":[118],"address":[120],"partial":[121],"absence,":[123],"enhancing":[124],"robustness.":[126],"Experimental":[127],"results,":[128],"conducted":[129],"datasets,":[132],"demonstrate":[133],"that":[134],"adeptly":[136],"captures":[137],"shared":[138],"complementary":[140],"showcasing":[145],"its":[146],"capability":[147],"the":[154],"presence":[155],"input":[157],"noise":[158],"samples.":[161],"Index":[162],"Terms\u2014Malicious":[163],"Macro":[164],"Detection,":[165],"Multi-modal":[166],"Features,":[167],"Model":[168],"Robustness,":[169],"Security":[170],"Wen":[171],"Wang":[172],"corresponding":[174],"author.":[175]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
