{"id":"https://openalex.org/W3045785127","doi":"https://doi.org/10.1109/iwcmc48107.2020.9148289","title":"LGMal: A Joint Framework Based on Local and Global Features for Malware Detection","display_name":"LGMal: A Joint Framework Based on Local and Global Features for Malware Detection","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3045785127","doi":"https://doi.org/10.1109/iwcmc48107.2020.9148289","mag":"3045785127"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc48107.2020.9148289","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc48107.2020.9148289","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006545795","display_name":"Yuhan Chai","orcid":"https://orcid.org/0000-0003-4332-0234"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuhan Chai","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057638577","display_name":"Jing Qiu","orcid":"https://orcid.org/0000-0003-4202-7802"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Qiu","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037817436","display_name":"Shen Su","orcid":"https://orcid.org/0000-0003-2744-3584"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shen Su","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038265266","display_name":"Chunsheng Zhu","orcid":"https://orcid.org/0000-0001-8041-0197"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunsheng Zhu","raw_affiliation_strings":["PCL Research Center of Networks and Communications, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"PCL Research Center of Networks and Communications, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100411650","display_name":"Lihua Yin","orcid":"https://orcid.org/0000-0001-8829-4442"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lihua Yin","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056608045","display_name":"Zhihong Tian","orcid":"https://orcid.org/0000-0002-9409-5359"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihong Tian","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5006545795"],"corresponding_institution_ids":["https://openalex.org/I37987034"],"apc_list":null,"apc_paid":null,"fwci":1.3638,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.81270573,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8702234029769897},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8329119682312012},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6759854555130005},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5343961119651794},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4832640290260315},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4762028455734253},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.45205846428871155},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4316047728061676},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3840707540512085},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.38086509704589844},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35524043440818787},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2906581163406372}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8702234029769897},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8329119682312012},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6759854555130005},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5343961119651794},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4832640290260315},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4762028455734253},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.45205846428871155},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4316047728061676},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3840707540512085},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38086509704589844},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35524043440818787},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2906581163406372},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc48107.2020.9148289","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc48107.2020.9148289","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W36091977","https://openalex.org/W1545528966","https://openalex.org/W1832693441","https://openalex.org/W2508015754","https://openalex.org/W2557513839","https://openalex.org/W2780450026","https://openalex.org/W2795033129","https://openalex.org/W2804769055","https://openalex.org/W2897880975","https://openalex.org/W2901504064","https://openalex.org/W2914373984","https://openalex.org/W2934826843","https://openalex.org/W2938709190","https://openalex.org/W2962946486","https://openalex.org/W2963650941","https://openalex.org/W2963840672","https://openalex.org/W2964015378","https://openalex.org/W2964242288","https://openalex.org/W2965563623","https://openalex.org/W2970127247","https://openalex.org/W2973142416","https://openalex.org/W2976882027","https://openalex.org/W2978600004","https://openalex.org/W2981842983","https://openalex.org/W2982645003","https://openalex.org/W2997357271","https://openalex.org/W2998300837","https://openalex.org/W3100457262","https://openalex.org/W3173001773","https://openalex.org/W4297747285","https://openalex.org/W6745899033","https://openalex.org/W6770184917","https://openalex.org/W6797211606"],"related_works":["https://openalex.org/W2470502009","https://openalex.org/W2995290701","https://openalex.org/W4386041582","https://openalex.org/W2900235625","https://openalex.org/W4386029484","https://openalex.org/W3045279525","https://openalex.org/W1827256152","https://openalex.org/W288126387","https://openalex.org/W4361733095","https://openalex.org/W2795033129"],"abstract_inverted_index":{"With":[0],"the":[1,28,34,45,100,124,136,146,165,194,205,209,214,232],"gradual":[2],"advancement":[3],"of":[4,36,50,126,129,235],"smart":[5,16,130,236],"city":[6],"construction,":[7],"various":[8],"information":[9,29,98,158,178],"systems":[10],"have":[11],"been":[12],"widely":[13],"used":[14,152,170],"in":[15,99],"cities.":[17],"In":[18,105],"order":[19],"to":[20,33,70,122,153,159,171,179],"obtain":[21],"huge":[22,55],"economic":[23,56],"benefits,":[24],"criminals":[25],"frequently":[26],"invade":[27],"system,":[30],"which":[31,134],"leads":[32],"increase":[35],"malware.":[37],"Malware":[38,189],"attacks":[39],"not":[40],"only":[41,63],"seriously":[42],"infringe":[43],"on":[44,114,185],"legitimate":[46],"rights":[47],"and":[48,67,116,141,164,213,230],"interests":[49],"users,":[51],"but":[52],"also":[53],"cause":[54],"losses.":[57],"Signature-based":[58],"malware":[59,78,90,101,120,228],"detection":[60,79,121,229],"algorithms":[61],"can":[62,81,222],"detect":[64],"known":[65],"malware,":[66],"are":[68,88],"susceptible":[69],"evasion":[71],"techniques":[72],"such":[73],"as":[74],"binary":[75],"obfuscation.":[76],"Behavior-based":[77],"methods":[80],"solve":[82,123],"this":[83,106,220],"problem":[84,125],"well.":[85],"Although":[86],"there":[87],"some":[89],"behavior":[91],"analysis":[92],"works,":[93],"they":[94],"may":[95],"ignore":[96],"semantic":[97,162,175,182],"API":[102,155,173],"call":[103,156,174],"sequence.":[104],"paper,":[107],"we":[108],"design":[109],"a":[110,224],"joint":[111,195],"framework":[112,196],"based":[113],"local":[115,161],"global":[117,181],"features":[118,163],"for":[119,227],"network":[127,140,150,233],"security":[128,234],"cities,":[131],"called":[132],"LGMal,":[133],"combines":[135],"stacked":[137,147],"convolutional":[138,143,148,167],"neural":[139,149],"graph":[142,166,176],"networks.":[144],"Specially,":[145],"is":[151,169,207,211,216],"learn":[154,172],"sequence":[157],"capture":[160,180],"networks":[168],"structure":[177],"features.":[183],"Experiments":[184],"Alibaba":[186],"Cloud":[187],"Security":[188],"Detection":[190],"datasets":[191],"show":[192,203],"that":[193,204],"gets":[197],"better":[198],"results.":[199],"The":[200],"experimental":[201],"results":[202],"precision":[206],"87.76%,":[208],"recall":[210],"88.08%,":[212],"F1-measure":[215],"87.79%.":[217],"We":[218],"hope":[219],"paper":[221],"provide":[223],"useful":[225],"way":[226],"protect":[231],"city.":[237]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
