{"id":"https://openalex.org/W3107481903","doi":"https://doi.org/10.1109/iscisc51277.2020.9261913","title":"A Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data","display_name":"A Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data","publication_year":2020,"publication_date":"2020-09-09","ids":{"openalex":"https://openalex.org/W3107481903","doi":"https://doi.org/10.1109/iscisc51277.2020.9261913","mag":"3107481903"},"language":"en","primary_location":{"id":"doi:10.1109/iscisc51277.2020.9261913","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscisc51277.2020.9261913","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079008925","display_name":"Zahra Moti","orcid":null},"institutions":[{"id":"https://openalex.org/I166459259","display_name":"Shiraz University","ror":"https://ror.org/028qtbk54","country_code":"IR","type":"education","lineage":["https://openalex.org/I166459259"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Zahra Moti","raw_affiliation_strings":["Shiraz University, Shiraz, Iran"],"affiliations":[{"raw_affiliation_string":"Shiraz University, Shiraz, Iran","institution_ids":["https://openalex.org/I166459259"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022739916","display_name":"Sattar Hashemi","orcid":"https://orcid.org/0000-0001-6981-8810"},"institutions":[{"id":"https://openalex.org/I166459259","display_name":"Shiraz University","ror":"https://ror.org/028qtbk54","country_code":"IR","type":"education","lineage":["https://openalex.org/I166459259"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Sattar Hashemi","raw_affiliation_strings":["Shiraz University, Shiraz, Iran"],"affiliations":[{"raw_affiliation_string":"Shiraz University, Shiraz, Iran","institution_ids":["https://openalex.org/I166459259"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074265025","display_name":"Amir Namavar Jahromi","orcid":"https://orcid.org/0000-0002-9709-5872"},"institutions":[{"id":"https://openalex.org/I79817857","display_name":"University of Guelph","ror":"https://ror.org/01r7awg59","country_code":"CA","type":"education","lineage":["https://openalex.org/I79817857"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Amir Namavar Jahromi","raw_affiliation_strings":["University of Guelph, Guelph, Canada"],"affiliations":[{"raw_affiliation_string":"University of Guelph, Guelph, Canada","institution_ids":["https://openalex.org/I79817857"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5079008925"],"corresponding_institution_ids":["https://openalex.org/I166459259"],"apc_list":null,"apc_paid":null,"fwci":0.6061,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.67788018,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"6750","issue":null,"first_page":"48","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/opcode","display_name":"Opcode","score":0.8946627378463745},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8928929567337036},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8499077558517456},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7221398949623108},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6733376979827881},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5958533883094788},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5002262592315674},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4798564314842224},{"id":"https://openalex.org/keywords/term","display_name":"Term (time)","score":0.42086899280548096},{"id":"https://openalex.org/keywords/dependency","display_name":"Dependency (UML)","score":0.410236120223999},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35083311796188354},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2515755295753479},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.07552596926689148}],"concepts":[{"id":"https://openalex.org/C52173422","wikidata":"https://www.wikidata.org/wiki/Q766483","display_name":"Opcode","level":2,"score":0.8946627378463745},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8928929567337036},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8499077558517456},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7221398949623108},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6733376979827881},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5958533883094788},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5002262592315674},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4798564314842224},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.42086899280548096},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.410236120223999},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35083311796188354},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2515755295753479},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07552596926689148},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscisc51277.2020.9261913","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscisc51277.2020.9261913","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1666731339","https://openalex.org/W1996975221","https://openalex.org/W2034938003","https://openalex.org/W2079215333","https://openalex.org/W2506582421","https://openalex.org/W2523469089","https://openalex.org/W2586571469","https://openalex.org/W2612449038","https://openalex.org/W2767092890","https://openalex.org/W2779931100","https://openalex.org/W2781924583","https://openalex.org/W2788864200","https://openalex.org/W2791290067","https://openalex.org/W2792657554","https://openalex.org/W2792716682","https://openalex.org/W2794654662","https://openalex.org/W2885070483","https://openalex.org/W2885747980","https://openalex.org/W2900519066","https://openalex.org/W2913493033","https://openalex.org/W2921573932","https://openalex.org/W2962117360","https://openalex.org/W2964053523","https://openalex.org/W2964268978","https://openalex.org/W2991150929","https://openalex.org/W3000918648","https://openalex.org/W3036491774","https://openalex.org/W3099258169","https://openalex.org/W3122507336","https://openalex.org/W4320013936","https://openalex.org/W6727862155","https://openalex.org/W6748641434","https://openalex.org/W6749573115","https://openalex.org/W6750183051","https://openalex.org/W6758752386","https://openalex.org/W6788793748"],"related_works":["https://openalex.org/W36091977","https://openalex.org/W2800331776","https://openalex.org/W4382794599","https://openalex.org/W2903602818","https://openalex.org/W2003791967","https://openalex.org/W4387382577","https://openalex.org/W3016048014","https://openalex.org/W4294976063","https://openalex.org/W2384735743","https://openalex.org/W2902612505"],"abstract_inverted_index":{"Nowadays,":[0],"with":[1],"the":[2,8,25,31,52,57,100,107,132],"increasing":[3],"use":[4,42,83,114],"of":[5,24,29,54,61,91,138],"computers":[6],"and":[7,59,73,89,143],"Internet,":[9],"more":[10],"people":[11],"are":[12,64,104],"exposed":[13],"to":[14,18,46,106,120,149,156,166,179],"cyber-security":[15],"dangers.":[16],"According":[17],"antivirus":[19],"companies,":[20],"malware":[21,48,93,151,178],"is":[22,38,97,135,154,164],"one":[23],"most":[26],"common":[27],"threats":[28],"using":[30],"Internet.":[32],"Therefore,":[33],"providing":[34],"a":[35,115,136],"practical":[36],"solution":[37],"critical.":[39],"Current":[40],"methods":[41],"machine":[43],"learning":[44],"approaches":[45],"classify":[47,150,177],"samples":[49],"automatically.":[50],"Despite":[51],"success":[53],"these":[55,62],"approaches,":[56],"accuracy":[58],"efficiency":[60],"techniques":[63],"still":[65],"inadequate,":[66],"especially":[67],"for":[68,87,125],"multiple":[69],"class":[70],"classification":[71,88],"problems":[72],"imbalanced":[74],"training":[75],"data":[76],"sets.":[77],"To":[78],"mitigate":[79],"this":[80],"problem,":[81],"we":[82,113,130],"deep":[84],"learning-based":[85],"algorithms":[86],"generation":[90],"new":[92,122],"samples.":[94,152],"Our":[95,184],"model":[96,108,133,185],"based":[98],"on":[99],"opcode":[101,123],"sequences,":[102],"which":[103],"given":[105],"without":[109],"any":[110],"pre-processing.":[111],"Besides,":[112],"novel":[116],"generative":[117],"adversarial":[118],"network":[119],"generate":[121],"sequences":[124],"oversampling":[126],"minority":[127],"classes.":[128],"Also,":[129],"propose":[131],"that":[134],"combination":[137],"Convolutional":[139],"Neural":[140],"Network":[141],"(CNN)":[142],"Long":[144],"Short":[145],"Term":[146],"Memory":[147],"(LSTM)":[148],"CNN":[153],"used":[155,165],"consider":[157,167],"short-term":[158],"dependency":[159],"between":[160],"features;":[161],"while,":[162],"LSTM":[163],"longer-term":[168],"dependence.":[169],"The":[170],"experiment":[171],"results":[172],"show":[173],"our":[174],"method":[175],"could":[176],"their":[180],"corresponding":[181],"family":[182],"effectively.":[183],"achieves":[186],"98.99%":[187],"validation":[188],"accuracy.":[189]},"counts_by_year":[{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
