{"id":"https://openalex.org/W4297099506","doi":"https://doi.org/10.1109/dsc54232.2022.9888884","title":"A Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation Method","display_name":"A Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation Method","publication_year":2022,"publication_date":"2022-06-22","ids":{"openalex":"https://openalex.org/W4297099506","doi":"https://doi.org/10.1109/dsc54232.2022.9888884"},"language":"en","primary_location":{"id":"doi:10.1109/dsc54232.2022.9888884","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc54232.2022.9888884","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073481973","display_name":"Fangwei Wang","orcid":"https://orcid.org/0000-0003-3888-8167"},"institutions":[{"id":"https://openalex.org/I94611258","display_name":"Hebei Normal University","ror":"https://ror.org/004rbbw49","country_code":"CN","type":"education","lineage":["https://openalex.org/I94611258"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fangwei Wang","raw_affiliation_strings":["College of Computer &#x0026; CyberSecurity, Hebei Normal University,Shijiazhuang,China"],"affiliations":[{"raw_affiliation_string":"College of Computer &#x0026; CyberSecurity, Hebei Normal University,Shijiazhuang,China","institution_ids":["https://openalex.org/I94611258"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101449760","display_name":"Yuanyuan Lu","orcid":"https://orcid.org/0000-0001-8621-6635"},"institutions":[{"id":"https://openalex.org/I94611258","display_name":"Hebei Normal University","ror":"https://ror.org/004rbbw49","country_code":"CN","type":"education","lineage":["https://openalex.org/I94611258"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanyuan Lu","raw_affiliation_strings":["College of Computer &#x0026; CyberSecurity, Hebei Normal University,Shijiazhuang,China"],"affiliations":[{"raw_affiliation_string":"College of Computer &#x0026; CyberSecurity, Hebei Normal University,Shijiazhuang,China","institution_ids":["https://openalex.org/I94611258"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036007452","display_name":"Qingru Li","orcid":"https://orcid.org/0000-0003-2532-045X"},"institutions":[{"id":"https://openalex.org/I94611258","display_name":"Hebei Normal University","ror":"https://ror.org/004rbbw49","country_code":"CN","type":"education","lineage":["https://openalex.org/I94611258"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingru Li","raw_affiliation_strings":["College of Computer &#x0026; CyberSecurity, Hebei Normal University,Shijiazhuang,China"],"affiliations":[{"raw_affiliation_string":"College of Computer &#x0026; CyberSecurity, Hebei Normal University,Shijiazhuang,China","institution_ids":["https://openalex.org/I94611258"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035994337","display_name":"Changguang Wang","orcid":"https://orcid.org/0000-0002-2054-9215"},"institutions":[{"id":"https://openalex.org/I94611258","display_name":"Hebei Normal University","ror":"https://ror.org/004rbbw49","country_code":"CN","type":"education","lineage":["https://openalex.org/I94611258"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changguang Wang","raw_affiliation_strings":["College of Computer &#x0026; CyberSecurity, Hebei Normal University,Shijiazhuang,China"],"affiliations":[{"raw_affiliation_string":"College of Computer &#x0026; CyberSecurity, Hebei Normal University,Shijiazhuang,China","institution_ids":["https://openalex.org/I94611258"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029187512","display_name":"Yonglei Bai","orcid":null},"institutions":[{"id":"https://openalex.org/I94611258","display_name":"Hebei Normal University","ror":"https://ror.org/004rbbw49","country_code":"CN","type":"education","lineage":["https://openalex.org/I94611258"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yonglei Bai","raw_affiliation_strings":["Dean&#x0027;s Office, Hebei Normal University,Shijiazhuang,China"],"affiliations":[{"raw_affiliation_string":"Dean&#x0027;s Office, Hebei Normal University,Shijiazhuang,China","institution_ids":["https://openalex.org/I94611258"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5073481973"],"corresponding_institution_ids":["https://openalex.org/I94611258"],"apc_list":null,"apc_paid":null,"fwci":0.2975,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.50851171,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9682000279426575,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8737389445304871},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7582919597625732},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.6553004384040833},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6422427296638489},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5109142661094666},{"id":"https://openalex.org/keywords/evolutionary-algorithm","display_name":"Evolutionary algorithm","score":0.4668733775615692},{"id":"https://openalex.org/keywords/sample","display_name":"Sample (material)","score":0.44811350107192993},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.44193264842033386},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2439889907836914}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8737389445304871},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7582919597625732},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.6553004384040833},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6422427296638489},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5109142661094666},{"id":"https://openalex.org/C159149176","wikidata":"https://www.wikidata.org/wiki/Q14489129","display_name":"Evolutionary algorithm","level":2,"score":0.4668733775615692},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.44811350107192993},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.44193264842033386},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2439889907836914},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dsc54232.2022.9888884","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc54232.2022.9888884","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.46000000834465027}],"awards":[{"id":"https://openalex.org/G6022682293","display_name":null,"funder_award_id":"L2021K06,L072018Z10","funder_id":"https://openalex.org/F4320321948","funder_display_name":"Hebei Normal University"},{"id":"https://openalex.org/G7252308062","display_name":null,"funder_award_id":"61572170","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G75081104","display_name":null,"funder_award_id":"F2021205004","funder_id":"https://openalex.org/F4320322163","funder_display_name":"Natural Science Foundation of Hebei Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321948","display_name":"Hebei Normal University","ror":"https://ror.org/004rbbw49"},{"id":"https://openalex.org/F4320322163","display_name":"Natural Science Foundation of Hebei Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2591788621","https://openalex.org/W2784452215","https://openalex.org/W2932977083","https://openalex.org/W2940752008","https://openalex.org/W2945645805","https://openalex.org/W2946661411","https://openalex.org/W2982631433","https://openalex.org/W2995512646","https://openalex.org/W3007679991","https://openalex.org/W3013520104","https://openalex.org/W3083694078","https://openalex.org/W3089994140","https://openalex.org/W3090219579","https://openalex.org/W3112370249","https://openalex.org/W3120848642","https://openalex.org/W3120979750","https://openalex.org/W3127627101","https://openalex.org/W3134311463","https://openalex.org/W3138102940","https://openalex.org/W3152624640","https://openalex.org/W3152760948","https://openalex.org/W3158179156","https://openalex.org/W3164220323","https://openalex.org/W3164891553","https://openalex.org/W3170962599","https://openalex.org/W3201016636","https://openalex.org/W4288072399","https://openalex.org/W4297747285","https://openalex.org/W4300687693","https://openalex.org/W6734028196","https://openalex.org/W6745899033","https://openalex.org/W6748325151","https://openalex.org/W6750318962","https://openalex.org/W6787397131","https://openalex.org/W6794755308"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W2783112941","https://openalex.org/W2526398307","https://openalex.org/W2470029541","https://openalex.org/W4387065217","https://openalex.org/W4368275542","https://openalex.org/W4285357721","https://openalex.org/W2470502009","https://openalex.org/W3152957156"],"abstract_inverted_index":{"The":[0,93,153,205],"study":[1],"of":[2,17,24,31,41,78,96,120,128,166,175,229,231,257,261],"adversarial":[3,25,52,59,66,159,219,245,269],"attacks":[4],"on":[5,144,208,235,249],"malicious":[6,146,186],"code":[7],"detection":[8,18,22,147,151,168,187,211],"models":[9,148],"will":[10],"help":[11],"identify":[12],"and":[13,27,46,84,100,149,178,202,264],"improve":[14,20,162],"the":[15,21,29,39,65,76,90,106,114,118,126,137,157,163,172,183,217,222,232,236,244,255,259],"flaws":[16],"models,":[19,188],"ability":[23],"attacks,":[26],"enhance":[28],"security":[30],"AI":[32],"(Artificial":[33],"Intelligent)":[34],"algorithm-based":[35,58],"applications.":[36],"To":[37],"address":[38],"problems":[40],"low":[42,47],"efficiency,":[43],"long":[44],"time,":[45],"evasion":[48,164,196,206],"rate":[49,165,197,207],"in":[50,123,136,268],"generating":[51],"samples,":[53],"we":[54],"propose":[55],"a":[56,133],"co-evolutionary":[57],"sample":[60,67,270],"generation":[61,68],"method.":[62],"We":[63,140],"decompose":[64],"problem":[69],"into":[70],"three":[71,209],"sub-problems,":[72],"which":[73],"are":[74],"minimizing":[75,113,258],"number":[77,127,174,260],"modification":[79,176,200,262],"actions,":[80],"injecting":[81,97,179,265],"less":[82,98,180,266],"content,":[83],"being":[85,101],"detected":[86,102],"as":[87,103],"benign":[88,104],"by":[89,105,112,132],"target":[91,107],"model.":[92],"two":[94,121,184],"sub-problems":[95],"content":[99,267],"model":[108],"can":[109,161,213,225],"be":[110],"completed":[111],"fitness":[115],"function":[116],"through":[117],"cooperation":[119],"populations":[122],"coevolution.":[124],"Minimizing":[125],"actions":[129,177,201,263],"is":[130,240],"achieved":[131],"selection":[134],"operation":[135],"evolutionary":[138,251],"process.":[139],"perform":[141],"attack":[142,246],"experiments":[143],"static":[145,185],"commercial":[150,210],"engines.":[152],"experimental":[154],"results":[155],"show":[156],"generated":[158,218],"samples":[160,220],"some":[167],"engines":[169,212],"while":[170],"ensuring":[171],"minimum":[173],"content.":[181,204],"On":[182],"our":[189],"approach":[190,239,247],"achieves":[191],"more":[192],"than":[193],"an":[194,227,250],"80%":[195],"with":[198,243],"fewer":[199],"injected":[203],"reach":[214],"58.9%.":[215],"Uploading":[216],"to":[221,253],"VirusTotal":[223],"platform":[224],"evade":[226],"average":[228],"54.0%":[230],"anti-virus":[233],"programs":[234],"platform.":[237],"Our":[238],"also":[241],"compared":[242],"based":[248],"algorithm":[252],"verify":[254],"necessity":[256],"generation.":[271]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
