{"id":"https://openalex.org/W4413679640","doi":"https://doi.org/10.1109/csr64739.2025.11130004","title":"Explainable Malware Detection by means of Federated Machine Learning","display_name":"Explainable Malware Detection by means of Federated Machine Learning","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413679640","doi":"https://doi.org/10.1109/csr64739.2025.11130004"},"language":"en","primary_location":{"id":"doi:10.1109/csr64739.2025.11130004","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130004","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007424361","display_name":"Giovanni Ciaramella","orcid":"https://orcid.org/0009-0002-9512-0621"},"institutions":[{"id":"https://openalex.org/I127077003","display_name":"IMT School for Advanced Studies Lucca","ror":"https://ror.org/035gh3a49","country_code":"IT","type":"education","lineage":["https://openalex.org/I127077003"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Giovanni Ciaramella","raw_affiliation_strings":["IMT School for Advanced Studies Lucca,Lucca,Italy"],"affiliations":[{"raw_affiliation_string":"IMT School for Advanced Studies Lucca,Lucca,Italy","institution_ids":["https://openalex.org/I127077003"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101546784","display_name":"Fabio Martinelli","orcid":"https://orcid.org/0000-0002-6721-9395"},"institutions":[{"id":"https://openalex.org/I3005160176","display_name":"Institute for High Performance Computing and Networking","ror":"https://ror.org/04r5fge26","country_code":"IT","type":"facility","lineage":["https://openalex.org/I3005160176","https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Fabio Martinelli","raw_affiliation_strings":["Institute for High Performance Computing and Networking, National Research Council of Italy (CNR),Rende,Italy"],"affiliations":[{"raw_affiliation_string":"Institute for High Performance Computing and Networking, National Research Council of Italy (CNR),Rende,Italy","institution_ids":["https://openalex.org/I3005160176"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004599844","display_name":"Antonella Santone","orcid":"https://orcid.org/0000-0002-2634-4456"},"institutions":[{"id":"https://openalex.org/I129627893","display_name":"University of Molise","ror":"https://ror.org/04z08z627","country_code":"IT","type":"education","lineage":["https://openalex.org/I129627893"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Antonella Santone","raw_affiliation_strings":["University of Molise,Campobasso,Italy"],"affiliations":[{"raw_affiliation_string":"University of Molise,Campobasso,Italy","institution_ids":["https://openalex.org/I129627893"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023695406","display_name":"Francesco Mercaldo","orcid":"https://orcid.org/0000-0002-9425-1657"},"institutions":[{"id":"https://openalex.org/I127077003","display_name":"IMT School for Advanced Studies Lucca","ror":"https://ror.org/035gh3a49","country_code":"IT","type":"education","lineage":["https://openalex.org/I127077003"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Francesco Mercaldo","raw_affiliation_strings":["IMT School for Advanced Studies Lucca,Lucca,Italy"],"affiliations":[{"raw_affiliation_string":"IMT School for Advanced Studies Lucca,Lucca,Italy","institution_ids":["https://openalex.org/I127077003"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5007424361"],"corresponding_institution_ids":["https://openalex.org/I127077003"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.33469388,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"975","last_page":"982"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8763958215713501},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8176721334457397},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4057009816169739},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35390669107437134},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3257976174354553}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8763958215713501},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8176721334457397},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4057009816169739},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35390669107437134},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3257976174354553}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr64739.2025.11130004","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130004","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320338440","display_name":"HORIZON EUROPE Health","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2516809705","https://openalex.org/W2958447056","https://openalex.org/W2962858109","https://openalex.org/W2998961572","https://openalex.org/W3015200820","https://openalex.org/W3039088822","https://openalex.org/W3083703328","https://openalex.org/W3179008990","https://openalex.org/W3184848855","https://openalex.org/W4213044365","https://openalex.org/W4287332481","https://openalex.org/W4387097414","https://openalex.org/W4387319562","https://openalex.org/W4389665308","https://openalex.org/W4396922294","https://openalex.org/W4405651346","https://openalex.org/W4408533507","https://openalex.org/W4409764844"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W4387369504","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W3107602296","https://openalex.org/W4364306694","https://openalex.org/W4312192474","https://openalex.org/W4283697347"],"abstract_inverted_index":{"Due":[0],"to":[1,41,73,94,107,129],"the":[2,8,45,74,81,117,123,131],"escalating":[3],"proliferation":[4],"of":[5,60],"malware":[6,43],"in":[7,31,44,139],"Microsoft":[9],"Windows":[10,46,75],"environment,":[11],"effective":[12],"detection":[13],"methods":[14],"have":[15],"become":[16],"crucial.":[17],"Moreover,":[18],"many":[19],"existing":[20],"approaches":[21],"lack":[22],"transparency":[23],"and":[24,53,62,66,69,90,102,113,137],"do":[25],"not":[26],"adequately":[27],"manage":[28],"personal":[29],"data":[30,93],"compliance":[32],"with":[33,101],"government":[34],"regulations.":[35],"This":[36],"paper":[37],"proposes":[38],"a":[39,58,97],"method":[40],"detect":[42],"domain":[47],"by":[48],"leveraging":[49],"Federated":[50],"Machine":[51],"Learning":[52],"explainability.":[54],"Specifically,":[55],"we":[56,84,121],"transformed":[57],"dataset":[59],"malicious":[61],"trustworthy":[63],"Portable":[64],"Executable":[65],"Object":[67],"Linking":[68],"Embedding":[70],"files":[71],"belonging":[72],"environment":[76],"into":[77],"grayscale":[78],"images.":[79],"As":[80],"next":[82],"step,":[83],"train":[85],"multiple":[86],"models":[87],"on":[88,111],"non-Independent":[89],"Identically":[91],"Distributed":[92],"better":[95],"represent":[96],"real-world":[98],"scenario,":[99],"both":[100],"without":[103],"Differential":[104],"Privacy":[105],"norm,":[106],"evaluate":[108],"its":[109],"impact":[110],"privacy":[112],"performance.":[114],"After":[115],"selecting":[116],"most":[118,132],"accurate":[119],"models,":[120],"employed":[122],"Gradient-weighted":[124],"Class":[125],"Activation":[126],"Mapping":[127],"algorithm":[128],"visualize":[130],"influential":[133],"features,":[134],"enhancing":[135],"interpretability":[136],"trust":[138],"predictions.":[140]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
