{"id":"https://openalex.org/W3091548849","doi":"https://doi.org/10.1109/ijcnn48605.2020.9206671","title":"Orthrus: A Bimodal Learning Architecture for Malware Classification","display_name":"Orthrus: A Bimodal Learning Architecture for Malware Classification","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3091548849","doi":"https://doi.org/10.1109/ijcnn48605.2020.9206671","mag":"3091548849"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn48605.2020.9206671","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn48605.2020.9206671","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061428004","display_name":"Daniel Gibert","orcid":"https://orcid.org/0000-0002-2448-1297"},"institutions":[{"id":"https://openalex.org/I15766328","display_name":"Universitat de Lleida","ror":"https://ror.org/050c3cw24","country_code":"ES","type":"education","lineage":["https://openalex.org/I15766328"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Daniel Gibert","raw_affiliation_strings":["Dept. of Computer Science, University of Lleida"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, University of Lleida","institution_ids":["https://openalex.org/I15766328"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026783976","display_name":"Carles Mateu","orcid":"https://orcid.org/0000-0002-4864-0328"},"institutions":[{"id":"https://openalex.org/I15766328","display_name":"Universitat de Lleida","ror":"https://ror.org/050c3cw24","country_code":"ES","type":"education","lineage":["https://openalex.org/I15766328"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Carles Mateu","raw_affiliation_strings":["Dept. of Computer Science, University of Lleida"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, University of Lleida","institution_ids":["https://openalex.org/I15766328"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025177965","display_name":"Jordi Planes","orcid":"https://orcid.org/0000-0003-1861-9736"},"institutions":[{"id":"https://openalex.org/I15766328","display_name":"Universitat de Lleida","ror":"https://ror.org/050c3cw24","country_code":"ES","type":"education","lineage":["https://openalex.org/I15766328"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Jordi Planes","raw_affiliation_strings":["Dept. of Computer Science, University of Lleida"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, University of Lleida","institution_ids":["https://openalex.org/I15766328"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5061428004"],"corresponding_institution_ids":["https://openalex.org/I15766328"],"apc_list":null,"apc_paid":null,"fwci":1.6669,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.84707044,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.974399983882904,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8426973819732666},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8243708610534668},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7324565649032593},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.7025721073150635},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6491193771362305},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6071764826774597},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5950750708580017},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5362311005592346},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.534876823425293},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5286462903022766},{"id":"https://openalex.org/keywords/margin","display_name":"Margin (machine learning)","score":0.5134009122848511},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.4760969877243042},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4502609372138977},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.4391680359840393},{"id":"https://openalex.org/keywords/binary-classification","display_name":"Binary classification","score":0.4283721148967743},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3231501877307892},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.2935197651386261}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8426973819732666},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8243708610534668},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7324565649032593},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.7025721073150635},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6491193771362305},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6071764826774597},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5950750708580017},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5362311005592346},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.534876823425293},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5286462903022766},{"id":"https://openalex.org/C774472","wikidata":"https://www.wikidata.org/wiki/Q6760393","display_name":"Margin (machine learning)","level":2,"score":0.5134009122848511},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.4760969877243042},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4502609372138977},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.4391680359840393},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.4283721148967743},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3231501877307892},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.2935197651386261},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn48605.2020.9206671","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn48605.2020.9206671","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W135165129","https://openalex.org/W1548500763","https://openalex.org/W2010065958","https://openalex.org/W2041130390","https://openalex.org/W2079215333","https://openalex.org/W2115771393","https://openalex.org/W2150423842","https://openalex.org/W2164463255","https://openalex.org/W2176412452","https://openalex.org/W2267635142","https://openalex.org/W2475334473","https://openalex.org/W2518866423","https://openalex.org/W2557513839","https://openalex.org/W2587930273","https://openalex.org/W2599823825","https://openalex.org/W2632775315","https://openalex.org/W2767092890","https://openalex.org/W2767346760","https://openalex.org/W2767438572","https://openalex.org/W2788864200","https://openalex.org/W2792716682","https://openalex.org/W2806076636","https://openalex.org/W2889100747","https://openalex.org/W2889474744","https://openalex.org/W2894779647","https://openalex.org/W2895764107","https://openalex.org/W2904109097","https://openalex.org/W2963106521","https://openalex.org/W2963165251","https://openalex.org/W2963285578","https://openalex.org/W2978600004","https://openalex.org/W3099258169","https://openalex.org/W4297747285","https://openalex.org/W6632780167","https://openalex.org/W6685562342","https://openalex.org/W6693781031","https://openalex.org/W6730629760","https://openalex.org/W6745767184","https://openalex.org/W6745899033","https://openalex.org/W6748641434","https://openalex.org/W6751705811","https://openalex.org/W6754306286","https://openalex.org/W6754619052"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W3214491504","https://openalex.org/W3199964822","https://openalex.org/W4232132981","https://openalex.org/W4238046985","https://openalex.org/W3164948662","https://openalex.org/W3196324843","https://openalex.org/W3003242282","https://openalex.org/W3153597579"],"abstract_inverted_index":{"Malware":[0,180],"detection":[1],"and":[2,8,62,134,149,154,200],"classification":[3,63,155,191],"is":[4,40,77,163],"a":[5,26,55,71,106,157],"challenging":[6],"problem":[7],"an":[9],"active":[10],"area":[11],"of":[12,28,74,85,123,147],"research.":[13],"Traditional":[14],"machine":[15],"learning":[16,48,153,195],"methods":[17,49,76],"depend":[18],"almost":[19],"entirely":[20],"on":[21,116,177],"the":[22,45,126,130,136,142,178,198],"ability":[23],"to":[24,80,92,97,110,164,170],"extract":[25],"set":[27],"discriminative":[29],"features":[30],"into":[31,113],"which":[32],"characterize":[33],"malware.":[34],"However,":[35],"this":[36,101],"feature":[37,52,60,152,168],"engineering":[38,53],"process":[39],"very":[41],"time":[42],"consuming.":[43],"On":[44],"contrary,":[46],"deep":[47,117,194],"replace":[50],"manual":[51],"by":[54],"system":[56],"that":[57,185],"performs":[58,150],"both":[59],"extraction":[61],"from":[64,141,166],"raw":[65],"data":[66],"at":[67],"once.":[68],"Despite":[69],"that,":[70],"major":[72],"shortfall":[73],"these":[75],"their":[78],"inhability":[79],"consider":[81],"multiple":[82,167],"disparate":[83],"sources":[84],"information":[86],"when":[87,95],"performing":[88],"classification,":[89],"leading":[90],"them":[91],"perform":[93],"poorly":[94],"compared":[96],"multimodal":[98],"approaches.":[99],"In":[100],"work,":[102],"we":[103],"introduce":[104],"Orthrus,":[105],"new":[107],"bimodal":[108],"approach":[109],"categorize":[111],"malware":[112],"families":[114],"based":[115,202],"learning.":[118],"Orthrus":[119],"combines":[120],"two":[121],"modalities":[122],"data:":[124],"(1)":[125],"byte":[127],"sequence":[128],"representing":[129],"malware's":[131,172],"binary":[132],"content,":[133],"(2)":[135],"assembly":[137,143],"language":[138,144],"instructions":[139],"extracted":[140],"source":[145],"code":[146],"malware,":[148],"automatic":[151],"with":[156],"convolutional":[158],"neural":[159],"network.":[160],"The":[161,174],"idea":[162],"benefit":[165],"types":[169],"reflect":[171],"characteristics.":[173],"experiments":[175],"carried":[176],"Microsoft":[179],"Classification":[181],"Challenge":[182],"dataset":[183],"show":[184],"our":[186],"proposed":[187],"solution":[188],"achieves":[189],"higher":[190],"performance":[192],"than":[193],"approaches":[196],"in":[197],"literature":[199],"n-gram":[201],"methods.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-14T23:14:49.485078","created_date":"2025-10-10T00:00:00"}
