{"id":"https://openalex.org/W4401751473","doi":"https://doi.org/10.1109/icccn61486.2024.10637629","title":"Explainability-Informed Targeted Malware Misclassification","display_name":"Explainability-Informed Targeted Malware Misclassification","publication_year":2024,"publication_date":"2024-07-29","ids":{"openalex":"https://openalex.org/W4401751473","doi":"https://doi.org/10.1109/icccn61486.2024.10637629"},"language":"en","primary_location":{"id":"doi:10.1109/icccn61486.2024.10637629","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn61486.2024.10637629","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 33rd International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5095839111","display_name":"Quincy Card","orcid":null},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Quincy Card","raw_affiliation_strings":["Tennessee Tech University,Department of Computer Science,Cookeville,TN,USA"],"affiliations":[{"raw_affiliation_string":"Tennessee Tech University,Department of Computer Science,Cookeville,TN,USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005398538","display_name":"Kshitiz Aryal","orcid":"https://orcid.org/0000-0001-8000-1086"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kshitiz Aryal","raw_affiliation_strings":["Tennessee Tech University,Department of Computer Science,Cookeville,TN,USA"],"affiliations":[{"raw_affiliation_string":"Tennessee Tech University,Department of Computer Science,Cookeville,TN,USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047952246","display_name":"Maanak Gupta","orcid":"https://orcid.org/0000-0001-9189-2478"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Maanak Gupta","raw_affiliation_strings":["Tennessee Tech University,Department of Computer Science,Cookeville,TN,USA"],"affiliations":[{"raw_affiliation_string":"Tennessee Tech University,Department of Computer Science,Cookeville,TN,USA","institution_ids":["https://openalex.org/I63920570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5095839111"],"corresponding_institution_ids":["https://openalex.org/I63920570"],"apc_list":null,"apc_paid":null,"fwci":1.8752,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.8629939,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9648000001907349,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8472645282745361},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6450454592704773},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.479941189289093}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8472645282745361},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6450454592704773},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.479941189289093}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn61486.2024.10637629","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn61486.2024.10637629","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 33rd International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1945616565","https://openalex.org/W2508015754","https://openalex.org/W2963539830","https://openalex.org/W2964253222","https://openalex.org/W2973367395","https://openalex.org/W3012161115","https://openalex.org/W3013037563","https://openalex.org/W3137440318","https://openalex.org/W3158694465","https://openalex.org/W3167683049","https://openalex.org/W4210864560","https://openalex.org/W4226036144","https://openalex.org/W4226504147","https://openalex.org/W4285253065","https://openalex.org/W4288638181","https://openalex.org/W4306316961","https://openalex.org/W4366544955","https://openalex.org/W4392735891","https://openalex.org/W6640425456","https://openalex.org/W6739868092","https://openalex.org/W6758125152","https://openalex.org/W6767756853","https://openalex.org/W6775082416","https://openalex.org/W6804094839","https://openalex.org/W6862529458"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W2249809453"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"there":[3],"has":[4],"been":[5],"a":[6,66,176,186,190,200,204],"surge":[7],"in":[8,25,82,141],"malware":[9,26,38,79,102,128,191,214],"attacks":[10,155,168,212],"across":[11],"critical":[12],"infrastructures,":[13],"requiring":[14],"further":[15],"research":[16,209],"and":[17,22,28,42,85,110,163,203,216,220],"development":[18],"of":[19,65,75,183,189],"appropriate":[20],"response":[21],"remediation":[23],"strategies":[24],"detection":[27],"classification.":[29],"Several":[30],"works":[31],"have":[32,46,53],"used":[33],"machine":[34],"learning":[35],"models":[36,52],"for":[37,123,127,180,193,199,206],"classification":[39,80,142],"into":[40,210],"categories,":[41],"deep":[43],"neural":[44,76],"networks":[45],"shown":[47,54],"promising":[48],"results.":[49],"However,":[50],"these":[51],"its":[55],"vulnerabilities":[56,74],"against":[57,169,213],"intentionally":[58],"crafted":[59],"adversarial":[60,73,133,152],"attacks,":[61,184],"which":[62],"yield":[63],"misclassification":[64,151],"malicious":[67],"file.":[68],"Our":[69,173],"paper":[70],"explores":[71],"such":[72,194],"network":[77],"based":[78,104],"systems":[81],"the":[83,116,124,132,136,145,157,170],"dynamic":[84,109],"online":[86,111],"analysis":[87,112],"environments.":[88,113],"To":[89],"evaluate":[90],"our":[91],"approach,":[92],"we":[93,148],"trained":[94,171],"Feed":[95],"Forward":[96],"Neural":[97],"Networks":[98],"(FFNN)":[99],"to":[100,130],"classify":[101],"categories":[103],"on":[105],"features":[106,137],"obtained":[107],"from":[108],"We":[114,196],"use":[115],"state-of-the-art":[117],"method,":[118],"SHapley":[119],"Additive":[120],"exPlanations":[121],"(SHAP),":[122],"feature":[125],"attribution":[126],"classification,":[129],"inform":[131],"attackers":[134],"about":[135],"with":[138],"significant":[139],"importance":[140],"decisions.":[143],"Using":[144],"explainability-informed":[146],"features,":[147],"perform":[149],"targeted":[150],"white-box":[153],"evasion":[154,178,211],"using":[156],"Fast":[158],"Gradient":[159,165],"Sign":[160],"Method":[161],"(FGSM)":[162],"Projected":[164],"Descent":[166],"(PGD)":[167],"classifier.":[172],"results":[174],"demonstrated":[175],"high":[177],"rate":[179],"some":[181],"instances":[182],"showing":[185],"clear":[187],"vulnerability":[188],"classifier":[192],"attacks.":[195],"offer":[197],"recommendations":[198],"balanced":[201],"approach":[202],"benchmark":[205],"much-needed":[207],"future":[208],"classifiers,":[215],"develop":[217],"more":[218],"robust":[219],"trustworthy":[221],"solutions.":[222]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
