{"id":"https://openalex.org/W4405490822","doi":"https://doi.org/10.1109/iccp63557.2024.10793037","title":"Enhancing ML Model Resilience to Time- Evolving Data in Malware Detection Systems with Adversarial Learning","display_name":"Enhancing ML Model Resilience to Time- Evolving Data in Malware Detection Systems with Adversarial Learning","publication_year":2024,"publication_date":"2024-10-17","ids":{"openalex":"https://openalex.org/W4405490822","doi":"https://doi.org/10.1109/iccp63557.2024.10793037"},"language":"en","primary_location":{"id":"doi:10.1109/iccp63557.2024.10793037","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccp63557.2024.10793037","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 20th International Conference on Intelligent Computer Communication and Processing (ICCP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114120764","display_name":"Marian \u015eandor","orcid":null},"institutions":[{"id":"https://openalex.org/I158333966","display_name":"Technical University of Cluj-Napoca","ror":"https://ror.org/03r8nwp71","country_code":"RO","type":"education","lineage":["https://openalex.org/I158333966"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Marian \u015eandor","raw_affiliation_strings":["Technical University of Cluj-Napoca Bitdefender,Cluj-Napoca,Romania"],"affiliations":[{"raw_affiliation_string":"Technical University of Cluj-Napoca Bitdefender,Cluj-Napoca,Romania","institution_ids":["https://openalex.org/I158333966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073918798","display_name":"Radu Marian Portase","orcid":"https://orcid.org/0000-0001-9008-1462"},"institutions":[{"id":"https://openalex.org/I158333966","display_name":"Technical University of Cluj-Napoca","ror":"https://ror.org/03r8nwp71","country_code":"RO","type":"education","lineage":["https://openalex.org/I158333966"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Radu Marian Portase","raw_affiliation_strings":["Technical University of Cluj-Napoca Bitdefender,Cluj-Napoca,Romania"],"affiliations":[{"raw_affiliation_string":"Technical University of Cluj-Napoca Bitdefender,Cluj-Napoca,Romania","institution_ids":["https://openalex.org/I158333966"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060431360","display_name":"Adrian Cole\u015fa","orcid":"https://orcid.org/0000-0002-2431-4253"},"institutions":[{"id":"https://openalex.org/I158333966","display_name":"Technical University of Cluj-Napoca","ror":"https://ror.org/03r8nwp71","country_code":"RO","type":"education","lineage":["https://openalex.org/I158333966"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Adrian Colesa","raw_affiliation_strings":["Technical University of Cluj-Napoca Bitdefender,Cluj-Napoca,Romania"],"affiliations":[{"raw_affiliation_string":"Technical University of Cluj-Napoca Bitdefender,Cluj-Napoca,Romania","institution_ids":["https://openalex.org/I158333966"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5114120764"],"corresponding_institution_ids":["https://openalex.org/I158333966"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.26078279,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8496331572532654},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.7811977863311768},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7557727098464966},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7157888412475586},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.5485488176345825},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.4633389711380005},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4553433656692505},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44069162011146545},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4011774957180023},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.34140515327453613},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.06924620270729065}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8496331572532654},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.7811977863311768},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7557727098464966},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7157888412475586},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.5485488176345825},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.4633389711380005},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4553433656692505},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44069162011146545},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4011774957180023},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.34140515327453613},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.06924620270729065},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccp63557.2024.10793037","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccp63557.2024.10793037","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 20th International Conference on Intelligent Computer Communication and Processing (ICCP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.4300000071525574,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2101234009","https://openalex.org/W2911964244","https://openalex.org/W2931858311","https://openalex.org/W3000405084","https://openalex.org/W3090046868","https://openalex.org/W3111533025","https://openalex.org/W3128485327","https://openalex.org/W4283325293","https://openalex.org/W4391129456","https://openalex.org/W6745609711"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W4283221438","https://openalex.org/W2900159906","https://openalex.org/W4384648009","https://openalex.org/W4287828318","https://openalex.org/W2406556600","https://openalex.org/W4380352238","https://openalex.org/W3126470649","https://openalex.org/W2930249865"],"abstract_inverted_index":{"Malware's":[0],"rapid":[1],"evolution":[2],"and":[3,9,61],"increasing":[4],"sophistication":[5],"challenge":[6],"traditional":[7],"static":[8],"dynamic":[10],"detection":[11,28,51],"methods,":[12],"which":[13],"struggle":[14],"with":[15,53],"the":[16],"high":[17,83],"volume":[18],"of":[19],"new":[20],"threats.":[21],"Machine":[22],"learning":[23],"(ML)":[24],"techniques":[25],"offer":[26],"improved":[27],"by":[29],"automatically":[30],"identifying":[31],"malicious":[32],"patterns,":[33],"but":[34],"their":[35],"efficacy":[36],"degrades":[37],"over":[38,85],"time":[39],"as":[40],"malware":[41,50,80],"evolves.":[42],"This":[43],"study":[44],"addresses":[45],"performance":[46,84],"deterioration":[47],"in":[48],"ML-based":[49],"models":[52,76],"time-evolving":[54],"data.":[55],"We":[56],"propose":[57],"combining":[58],"feature":[59],"engineering":[60],"adversarial":[62],"training":[63,70],"to":[64],"enhance":[65],"model":[66],"resilience.":[67],"By":[68],"generating":[69],"data":[71],"mutations,":[72],"our":[73],"method":[74],"helps":[75],"better":[77],"recognize":[78],"true":[79],"indicators,":[81],"maintaining":[82],"time.":[86]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
