{"id":"https://openalex.org/W3117169309","doi":"https://doi.org/10.1109/icce50685.2021.9427623","title":"Robust Malware Detection using Residual Attention Network","display_name":"Robust Malware Detection using Residual Attention Network","publication_year":2021,"publication_date":"2021-01-10","ids":{"openalex":"https://openalex.org/W3117169309","doi":"https://doi.org/10.1109/icce50685.2021.9427623","mag":"3117169309"},"language":"en","primary_location":{"id":"doi:10.1109/icce50685.2021.9427623","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce50685.2021.9427623","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021921082","display_name":"Shamika Ganesan","orcid":"https://orcid.org/0000-0001-9501-8323"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Shamika Ganesan","raw_affiliation_strings":["Computational Engineering and Networking (CEN), Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"Computational Engineering and Networking (CEN), Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040100735","display_name":"Vinayakumar Ravi","orcid":"https://orcid.org/0000-0001-6873-6469"},"institutions":[{"id":"https://openalex.org/I138564716","display_name":"Prince Mohammad bin Fahd University","ror":"https://ror.org/03d64na34","country_code":"SA","type":"education","lineage":["https://openalex.org/I138564716"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Vinayakumar Ravi","raw_affiliation_strings":["Center for Artificial Intelligence, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Center for Artificial Intelligence, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia","institution_ids":["https://openalex.org/I138564716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004970162","display_name":"Moez Krichen","orcid":"https://orcid.org/0000-0001-8873-9755"},"institutions":[{"id":"https://openalex.org/I142899784","display_name":"University of Sfax","ror":"https://ror.org/04d4sd432","country_code":"TN","type":"education","lineage":["https://openalex.org/I142899784"]},{"id":"https://openalex.org/I52207611","display_name":"Al Baha University","ror":"https://ror.org/0403jak37","country_code":"SA","type":"education","lineage":["https://openalex.org/I52207611"]}],"countries":["SA","TN"],"is_corresponding":false,"raw_author_name":"Moez Krichen","raw_affiliation_strings":["Faculty of CSIT, Al-Baha University, Saudi Arabia","ReDCAD Laboratory, University of Sfax, Tunisia"],"affiliations":[{"raw_affiliation_string":"Faculty of CSIT, Al-Baha University, Saudi Arabia","institution_ids":["https://openalex.org/I52207611"]},{"raw_affiliation_string":"ReDCAD Laboratory, University of Sfax, Tunisia","institution_ids":["https://openalex.org/I142899784"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000182583","display_name":"V. Sowmya","orcid":"https://orcid.org/0009-0007-1994-6647"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sowmya V","raw_affiliation_strings":["Computational Engineering and Networking (CEN), Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"Computational Engineering and Networking (CEN), Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021988081","display_name":"Roobaea Alroobaea","orcid":"https://orcid.org/0000-0003-1585-2962"},"institutions":[{"id":"https://openalex.org/I179331831","display_name":"Taif University","ror":"https://ror.org/014g1a453","country_code":"SA","type":"education","lineage":["https://openalex.org/I179331831"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Roobaea Alroobaea","raw_affiliation_strings":["College of Computers and Information Technology, Taif University, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computers and Information Technology, Taif University, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112182829","display_name":"Soman KP","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Soman KP","raw_affiliation_strings":["Computational Engineering and Networking (CEN), Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"Computational Engineering and Networking (CEN), Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5021921082"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":null,"apc_paid":null,"fwci":3.1996,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.92474645,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9049924612045288},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8421541452407837},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7004566192626953},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7002995014190674},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6474112272262573},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5654076933860779},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.5565876364707947},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.43597400188446045},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3319949805736542},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32155776023864746}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9049924612045288},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8421541452407837},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7004566192626953},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7002995014190674},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6474112272262573},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5654076933860779},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.5565876364707947},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.43597400188446045},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3319949805736542},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32155776023864746}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icce50685.2021.9427623","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce50685.2021.9427623","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W2010065958","https://openalex.org/W2045140281","https://openalex.org/W2057787526","https://openalex.org/W2070970642","https://openalex.org/W2120705432","https://openalex.org/W2121749752","https://openalex.org/W2163605009","https://openalex.org/W2240067561","https://openalex.org/W2581531918","https://openalex.org/W2767020126","https://openalex.org/W2775486083","https://openalex.org/W2784097977","https://openalex.org/W2793223501","https://openalex.org/W2905130735","https://openalex.org/W2923563913","https://openalex.org/W2931858311","https://openalex.org/W2963495494","https://openalex.org/W2974072230","https://openalex.org/W2997305772","https://openalex.org/W3002518139","https://openalex.org/W3005260862","https://openalex.org/W3006334803","https://openalex.org/W3011357511","https://openalex.org/W3013262845","https://openalex.org/W3014356165","https://openalex.org/W3020985685","https://openalex.org/W3048717798","https://openalex.org/W3174130612","https://openalex.org/W4230617064","https://openalex.org/W6677803415","https://openalex.org/W6678051712","https://openalex.org/W6684191040"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1557094818","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W1975357770","https://openalex.org/W4226493464","https://openalex.org/W3133861977","https://openalex.org/W2951211570","https://openalex.org/W3103566983"],"abstract_inverted_index":{"Recent":[0],"advancements":[1],"in":[2,21,98,109,113,165,185,195],"Cyber":[3,186],"Security":[4],"have":[5,96,119,130],"amalgamated":[6],"the":[7,22,30,51,91,121,134,153,160,173,180],"strengths":[8],"of":[9,24,33,53,90,123,159,183,208],"Artificial":[10],"Intelligence":[11,14],"and":[12,29,56,74,129,139,197],"Human":[13],"for":[15,39,71,87,126],"Intrusion":[16,84],"Detection.":[17],"The":[18,147,188],"colossal":[19],"increase":[20],"volume":[23],"new":[25],"malware":[26,42,92,127,161,196,201],"generated":[27],"everyday":[28],"constant":[31],"risk":[32],"zero":[34],"day":[35],"attacks":[36],"demand":[37],"research":[38,46],"a":[40,64,106],"robust":[41,191],"detection":[43,128,202],"system.":[44],"Significant":[45],"has":[47,62,198],"gone":[48],"into":[49],"exploring":[50],"use":[52,122],"Machine":[54,72,141],"Learning":[55,73,76,142],"Convolutional":[57],"Neural":[58],"Networks":[59],"(CNNs).":[60],"There":[61],"been":[63],"transition":[65],"from":[66,168,179],"using":[67,80,144],"Malware":[68],"byte":[69],"information":[70],"Deep":[75],"based":[77,83,103,137],"methods":[78,138,203],"to":[79,155],"an":[81,206],"Image":[82],"Detection":[85],"system":[86],"better":[88],"assessment":[89],"file.":[93],"Though":[94],"CNNs":[95],"helped":[97],"capturing":[99],"local":[100],"features,":[101],"Attention":[102,125],"mechanisms":[104],"play":[105],"vital":[107],"role":[108],"detecting":[110],"structural":[111,193],"changes":[112,194],"malware.":[114],"In":[115],"this":[116,132],"paper,":[117],"we":[118],"explored":[120],"Residual":[124],"compared":[131],"with":[133],"existing":[135],"CNN":[136],"conventional":[140],"algorithms":[143],"GIST":[145],"features.":[146],"proposed":[148],"method":[149,189],"could":[150],"efficiently":[151],"focus":[152],"'attention'":[154],"precisely":[156],"those":[157],"sections":[158],"which":[162,176],"were":[163],"significant":[164],"being":[166],"distinguished":[167],"benign":[169],"files,":[170],"thus":[171],"reducing":[172],"False":[174],"Positives":[175],"is":[177,190],"primary":[178],"Accessibility":[181],"point":[182],"view":[184],"Security.":[187],"against":[192],"outperformed":[199],"traditional":[200],"by":[204],"demonstrating":[205],"accuracy":[207],"99.25%.":[209]},"counts_by_year":[{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
