{"id":"https://openalex.org/W4408353560","doi":"https://doi.org/10.1109/icassp49660.2025.10888983","title":"MalImgDA: Diffusion-based Data Augmentation for Long-tailed Malware Family Classification","display_name":"MalImgDA: Diffusion-based Data Augmentation for Long-tailed Malware Family Classification","publication_year":2025,"publication_date":"2025-03-12","ids":{"openalex":"https://openalex.org/W4408353560","doi":"https://doi.org/10.1109/icassp49660.2025.10888983"},"language":"en","primary_location":{"id":"doi:10.1109/icassp49660.2025.10888983","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp49660.2025.10888983","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115596649","display_name":"Gang Yang","orcid":"https://orcid.org/0000-0001-8798-9760"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Gang Yang","raw_affiliation_strings":["National University of Defense Technology,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,Wuhan,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101628872","display_name":"Jun He","orcid":"https://orcid.org/0000-0001-5201-4445"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun He","raw_affiliation_strings":["National University of Defense Technology,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,Wuhan,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084855980","display_name":"Bo Wu","orcid":"https://orcid.org/0000-0002-8876-6793"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Wu","raw_affiliation_strings":["National University of Defense Technology,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,Wuhan,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101659965","display_name":"Tao Xia","orcid":"https://orcid.org/0000-0001-9469-7213"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Xia","raw_affiliation_strings":["National University of Defense Technology,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,Wuhan,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075710187","display_name":"Linna Fan","orcid":"https://orcid.org/0000-0003-2269-1175"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linna Fan","raw_affiliation_strings":["National University of Defense Technology,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,Wuhan,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070404711","display_name":"Lin Ni","orcid":"https://orcid.org/0000-0001-6118-6724"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Ni","raw_affiliation_strings":["National University of Defense Technology,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,Wuhan,China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5115596649"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04697975,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9241999983787537,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8819913268089294},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6547552347183228},{"id":"https://openalex.org/keywords/diffusion","display_name":"Diffusion","score":0.4956313371658325},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2864038646221161},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.06544944643974304}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8819913268089294},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6547552347183228},{"id":"https://openalex.org/C69357855","wikidata":"https://www.wikidata.org/wiki/Q163214","display_name":"Diffusion","level":2,"score":0.4956313371658325},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2864038646221161},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.06544944643974304},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icassp49660.2025.10888983","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp49660.2025.10888983","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322186","display_name":"Natural Science Foundation of Hubei Province","ror":null},{"id":"https://openalex.org/F4320324150","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W2010065958","https://openalex.org/W2194775991","https://openalex.org/W2267635142","https://openalex.org/W2798309714","https://openalex.org/W2965405555","https://openalex.org/W3015248254","https://openalex.org/W3125564951","https://openalex.org/W3152691043","https://openalex.org/W3164397115","https://openalex.org/W3208789089","https://openalex.org/W4285238371","https://openalex.org/W4323655380","https://openalex.org/W4324093415","https://openalex.org/W4385399132","https://openalex.org/W4386601492","https://openalex.org/W4387042424","https://openalex.org/W4389002284","https://openalex.org/W4390045019","https://openalex.org/W4391184520","https://openalex.org/W4391989542","https://openalex.org/W4392399468","https://openalex.org/W4400645079","https://openalex.org/W4401093840","https://openalex.org/W4402816839","https://openalex.org/W6679045638","https://openalex.org/W6748641434","https://openalex.org/W6749904568","https://openalex.org/W6779823529","https://openalex.org/W6805547681"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819"],"abstract_inverted_index":{"With":[0],"the":[1,25,45,68,76,123,135,148],"rapid":[2],"improvement":[3],"of":[4,47,125,137,150],"machine":[5,9],"learning":[6,10],"technology,":[7],"leveraging":[8],"methods":[11],"for":[12,112],"malware":[13,32,42,70,86,130],"classification":[14,72],"has":[15],"emerged":[16],"as":[17],"a":[18,35,56,109],"viable":[19],"approach.":[20],"However,":[21],"under":[22],"real-world":[23],"circumstance,":[24],"imbalanced":[26],"or":[27],"long-tailed":[28,69],"distribution":[29],"among":[30],"various":[31],"families,":[33,43],"poses":[34],"critical":[36],"challenge":[37],"to":[38,66,94,107,156],"classify":[39],"such":[40],"few-shot":[41,81],"eliminating":[44],"effectiveness":[46,149],"trained":[48],"classifier.":[49],"In":[50],"this":[51],"paper,":[52],"we":[53,83,99,119],"propose":[54],"MalImgDA,":[55,118],"novel":[57],"data":[58,106,126],"augmentation":[59],"framework":[60],"that":[61],"leverages":[62],"diffusion":[63,78],"model-based":[64],"approach":[65],"tackle":[67],"family":[71],"problem.":[73],"By":[74],"fine-tuning":[75],"pre-trained":[77],"model":[79],"on":[80,142],"data,":[82],"synthesize":[84],"analogous":[85],"images":[87],"from":[88],"existing":[89,105],"samples":[90,103],"with":[91,104],"high":[92],"resemblance":[93],"target":[95,138],"family.":[96,139],"And":[97],"then":[98],"can":[100,120],"mingle":[101],"synthetic":[102],"build":[108],"re-balanced":[110],"dataset":[111],"classifier":[113],"training.":[114],"Particularly,":[115],"by":[116],"utilizing":[117],"substantially":[121],"enhance":[122],"diversity":[124],"and":[127],"generate":[128],"plausible":[129],"variants":[131],"proactively":[132],"while":[133],"persevering":[134],"characteristics":[136],"Experiments":[140],"conducted":[141],"two":[143],"publicly":[144],"available":[145],"datasets":[146],"demonstrate":[147],"our":[151],"proposed":[152],"method":[153],"in":[154],"comparison":[155],"other":[157],"commonly-used":[158],"approaches.":[159]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
