{"id":"https://openalex.org/W3213213958","doi":"https://doi.org/10.1109/icccnt51525.2021.9579750","title":"EfficientNet-based Convolutional Neural Networks for Malware Classification","display_name":"EfficientNet-based Convolutional Neural Networks for Malware Classification","publication_year":2021,"publication_date":"2021-07-06","ids":{"openalex":"https://openalex.org/W3213213958","doi":"https://doi.org/10.1109/icccnt51525.2021.9579750","mag":"3213213958"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt51525.2021.9579750","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9579750","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008224269","display_name":"Vasundhara Acharya","orcid":"https://orcid.org/0000-0002-8720-633X"},"institutions":[{"id":"https://openalex.org/I164861460","display_name":"Manipal Academy of Higher Education","ror":"https://ror.org/02xzytt36","country_code":"IN","type":"education","lineage":["https://openalex.org/I164861460"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Vasundhara Acharya","raw_affiliation_strings":["Manipal Institute of Technology (MIT), Manipal Academy of Higher Education (MAHE), Manipal, India"],"affiliations":[{"raw_affiliation_string":"Manipal Institute of Technology (MIT), Manipal Academy of Higher Education (MAHE), Manipal, India","institution_ids":["https://openalex.org/I164861460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040100735","display_name":"Vinayakumar Ravi","orcid":"https://orcid.org/0000-0001-6873-6469"},"institutions":[{"id":"https://openalex.org/I138564716","display_name":"Prince Mohammad bin Fahd University","ror":"https://ror.org/03d64na34","country_code":"SA","type":"education","lineage":["https://openalex.org/I138564716"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Vinayakumar Ravi","raw_affiliation_strings":["Center for Artificial Intelligence, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Center for Artificial Intelligence, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia","institution_ids":["https://openalex.org/I138564716"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027538068","display_name":"Nazeeruddin Mohammad","orcid":"https://orcid.org/0000-0003-3580-5960"},"institutions":[{"id":"https://openalex.org/I138564716","display_name":"Prince Mohammad bin Fahd University","ror":"https://ror.org/03d64na34","country_code":"SA","type":"education","lineage":["https://openalex.org/I138564716"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Nazeeruddin Mohammad","raw_affiliation_strings":["Cybersecurity Center, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Center, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia","institution_ids":["https://openalex.org/I138564716"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5008224269"],"corresponding_institution_ids":["https://openalex.org/I164861460"],"apc_list":null,"apc_paid":null,"fwci":1.3713,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.81852603,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9538000226020813,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9418631196022034},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8409584760665894},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7235506772994995},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6944406628608704},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6481514573097229},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.599793553352356},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5615015029907227},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.521416187286377},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.5203045010566711},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4717952609062195},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4315411448478699},{"id":"https://openalex.org/keywords/test-set","display_name":"Test set","score":0.4169695973396301},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.412320077419281},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3554615378379822},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33268609642982483},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19280236959457397}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9418631196022034},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8409584760665894},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7235506772994995},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6944406628608704},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6481514573097229},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.599793553352356},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5615015029907227},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.521416187286377},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.5203045010566711},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4717952609062195},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4315411448478699},{"id":"https://openalex.org/C169903167","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Test set","level":2,"score":0.4169695973396301},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.412320077419281},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3554615378379822},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33268609642982483},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19280236959457397},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt51525.2021.9579750","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9579750","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2010065958","https://openalex.org/W2045140281","https://openalex.org/W2783348159","https://openalex.org/W2788864200","https://openalex.org/W2790918693","https://openalex.org/W2796394805","https://openalex.org/W2796681025","https://openalex.org/W2889474744","https://openalex.org/W2905130735","https://openalex.org/W2923563913","https://openalex.org/W2931858311","https://openalex.org/W2950754826","https://openalex.org/W2955425717","https://openalex.org/W3006334803","https://openalex.org/W3008497156","https://openalex.org/W3020985685","https://openalex.org/W3048717798","https://openalex.org/W3139210187","https://openalex.org/W6748641434","https://openalex.org/W6762718338"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2160606508","https://openalex.org/W3214491504","https://openalex.org/W2951627661","https://openalex.org/W4301628046","https://openalex.org/W2170587542","https://openalex.org/W2805222462"],"abstract_inverted_index":{"Malicious":[0],"software":[1],"is":[2,53,106],"posing":[3],"a":[4,124],"great":[5],"challenge":[6],"to":[7,13,24,75,101,111,144],"Cybersecurity":[8],"by":[9,159],"causing":[10],"huge":[11],"damage":[12],"enterprises":[14],"and":[15,31,55],"users.":[16],"Traditional":[17],"signature-based":[18],"techniques":[19,37],"have":[20,38],"found":[21],"it":[22,28],"challenging":[23],"detect":[25],"malware":[26,42,72,103,109,133,146],"as":[27,116],"has":[29],"changed":[30],"evolved":[32],"over":[33],"time.":[34],"Machine":[35],"learning":[36,169],"become":[39],"popular":[40],"for":[41,69],"detection":[43,73],"but":[44],"they":[45],"are":[46,65,114],"based":[47],"on":[48,92,123,152],"heuristic":[49],"feature":[50],"engineering,":[51],"which":[52,163],"expensive":[54],"requires":[56],"domain":[57],"expertise.":[58],"In":[59],"the":[60,88,93,97,137,153,160,165],"recent":[61],"years,":[62],"deep":[63,168],"learning,":[64],"being":[66],"actively":[67],"investigated":[68],"this":[70,86],"crucial":[71],"application":[74],"achieve":[76],"robust":[77],"solutions":[78],"with":[79,96],"higher":[80],"accuracy.":[81],"To":[82],"assist":[83],"in":[84],"achieving":[85],"goal,":[87],"EfficientNet-B1":[89],"model":[90,162],"pretrained":[91,167],"ImageNet":[94],"dataset":[95,125],"last":[98],"layer":[99],"adapted":[100],"attain":[102],"family":[104],"classification":[105],"presented.":[107],"The":[108,120],"samples":[110,129],"be":[112,141],"inputted":[113],"represented":[115],"byteplot":[117],"grayscale":[118],"images.":[119],"experimental":[121],"results":[122],"comprising":[126],"of":[127,150],"10,868":[128],"from":[130],"9":[131],"different":[132],"families":[134],"showed":[135],"that":[136],"proposed":[138,161],"approach":[139],"can":[140],"effectively":[142],"used":[143],"classify":[145],"families.":[147],"Classification":[148],"accuracy":[149],"98.57&#x0025;":[151],"held-out":[154],"test":[155],"set":[156],"was":[157],"obtained":[158],"outperformed":[164],"other":[166],"models.":[170]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
