{"id":"https://openalex.org/W3185475590","doi":"https://doi.org/10.1109/icpr48806.2021.9412227","title":"Malware Detection by Exploiting Deep Learning over Binary Programs","display_name":"Malware Detection by Exploiting Deep Learning over Binary Programs","publication_year":2021,"publication_date":"2021-01-10","ids":{"openalex":"https://openalex.org/W3185475590","doi":"https://doi.org/10.1109/icpr48806.2021.9412227","mag":"3185475590"},"language":"en","primary_location":{"id":"doi:10.1109/icpr48806.2021.9412227","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpr48806.2021.9412227","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 25th International Conference on Pattern Recognition (ICPR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022380828","display_name":"Panpan Qi","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Panpan Qi","raw_affiliation_strings":["School of Computing, National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computing, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100771639","display_name":"Zhaoqi Zhang","orcid":"https://orcid.org/0009-0003-1924-7353"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Zhaoqi Zhang","raw_affiliation_strings":["School of Computing, National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computing, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100777576","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0002-5974-1589"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["School of Computing, National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computing, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056066639","display_name":"Chang Yao","orcid":"https://orcid.org/0000-0002-1187-6257"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chang Yao","raw_affiliation_strings":["Institute of Computing Innovation, Zhejiang University, China"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Innovation, Zhejiang University, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022380828"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":0.3047,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.53313049,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"9068","last_page":"9075"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8975461721420288},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8004966974258423},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.7338904738426208},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.700411319732666},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.680009126663208},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6520838737487793},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5678567886352539},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5618159174919128},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5428005456924438},{"id":"https://openalex.org/keywords/binary-classification","display_name":"Binary classification","score":0.5154050588607788},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.44779515266418457},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.44354158639907837},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.43266046047210693},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.42349180579185486},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.42252838611602783},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.4165585935115814},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.219812273979187},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2086726725101471}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8975461721420288},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8004966974258423},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.7338904738426208},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.700411319732666},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.680009126663208},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6520838737487793},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5678567886352539},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5618159174919128},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5428005456924438},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.5154050588607788},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.44779515266418457},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.44354158639907837},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.43266046047210693},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.42349180579185486},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.42252838611602783},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.4165585935115814},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.219812273979187},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2086726725101471},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icpr48806.2021.9412227","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpr48806.2021.9412227","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 25th International Conference on Pattern Recognition (ICPR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1482612322","https://openalex.org/W1551909886","https://openalex.org/W1558357780","https://openalex.org/W1678356000","https://openalex.org/W1893133781","https://openalex.org/W1901129140","https://openalex.org/W1966948031","https://openalex.org/W1985746537","https://openalex.org/W2010910232","https://openalex.org/W2019072634","https://openalex.org/W2022340200","https://openalex.org/W2044660163","https://openalex.org/W2076618162","https://openalex.org/W2099053789","https://openalex.org/W2144112223","https://openalex.org/W2164163973","https://openalex.org/W2220384803","https://openalex.org/W2591575955","https://openalex.org/W2734713605","https://openalex.org/W2752241832","https://openalex.org/W2766343248","https://openalex.org/W2768348081","https://openalex.org/W2782676859","https://openalex.org/W2798159728","https://openalex.org/W2806076636","https://openalex.org/W2904109097","https://openalex.org/W2951298793","https://openalex.org/W2964027161","https://openalex.org/W3099388751","https://openalex.org/W4297747285","https://openalex.org/W4300687693","https://openalex.org/W6637404493","https://openalex.org/W6639824700","https://openalex.org/W6745609711","https://openalex.org/W6751705811"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W3199964822","https://openalex.org/W4232132981","https://openalex.org/W4238046985","https://openalex.org/W3164948662","https://openalex.org/W3196324843","https://openalex.org/W3003242282","https://openalex.org/W3153597579","https://openalex.org/W3012824888","https://openalex.org/W2989686928"],"abstract_inverted_index":{"Malware":[0],"evolves":[1],"rapidly":[2],"over":[3],"time,":[4],"which":[5,126],"makes":[6,162],"existing":[7],"solutions":[8],"being":[9],"ineffective":[10],"in":[11,35],"detecting":[12],"newly":[13],"released":[14],"malware.":[15],"Machine":[16],"learning":[17,41,68],"models":[18,42],"that":[19,143],"can":[20],"learn":[21],"to":[22,64,116],"capture":[23],"malicious":[24],"patterns":[25],"directly":[26],"from":[27,94],"the":[28,66,92,128,144,153,157],"data":[29],"play":[30],"an":[31,75],"increasingly":[32],"important":[33],"role":[34],"malware":[36,59,77,98],"analysis.":[37],"However,":[38],"traditional":[39],"machine":[40,67],"heavily":[43],"depend":[44],"on":[45],"feature":[46,62,101],"engineering.":[47,102],"The":[48],"extracted":[49],"static":[50],"features":[51,93],"are":[52],"vulnerable":[53],"as":[54],"hackers":[55],"could":[56],"create":[57],"new":[58],"with":[60],"different":[61],"values":[63],"deceive":[65],"models.":[69],"In":[70,103],"this":[71],"paper,":[72],"we":[73,120],"propose":[74,121],"end-to-end":[76],"detection":[78,99],"framework":[79,146],"consisting":[80],"of":[81],"convolutional":[82],"neural":[83,87],"network,":[84],"autoencoder":[85],"and":[86,156],"decision":[88],"trees.":[89],"It":[90],"learns":[91],"multiple":[95],"domains":[96],"for":[97,130],"without":[100],"addition,":[104],"since":[105],"anti-virus":[106],"products":[107],"should":[108],"have":[109],"a":[110,122,131,149,163],"very":[111],"low":[112,133],"false":[113,134],"alarm":[114],"rate":[115,136],"avoid":[117],"annoying":[118],"users,":[119],"special":[123],"loss":[124,159],"function,":[125],"optimizes":[127],"recall":[129,151],"fixed":[132],"positive":[135],"(e.g.,":[137],"less":[138],"than":[139,152],"0.1%).":[140],"Experiments":[141],"show":[142],"proposed":[145],"has":[147],"achieved":[148],"better":[150],"baseline":[154],"models,":[155],"derived":[158],"function":[160],"also":[161],"difference.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
