{"id":"https://openalex.org/W3217709525","doi":"https://doi.org/10.1109/niles53778.2021.9600511","title":"Enhancing Image-Based Malware Classification Using Semi-Supervised Learning","display_name":"Enhancing Image-Based Malware Classification Using Semi-Supervised Learning","publication_year":2021,"publication_date":"2021-10-23","ids":{"openalex":"https://openalex.org/W3217709525","doi":"https://doi.org/10.1109/niles53778.2021.9600511","mag":"3217709525"},"language":"en","primary_location":{"id":"doi:10.1109/niles53778.2021.9600511","is_oa":false,"landing_page_url":"https://doi.org/10.1109/niles53778.2021.9600511","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 3rd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006829578","display_name":"Salma Abdelmonem","orcid":"https://orcid.org/0000-0003-3367-651X"},"institutions":[{"id":"https://openalex.org/I145487455","display_name":"Cairo University","ror":"https://ror.org/03q21mh05","country_code":"EG","type":"education","lineage":["https://openalex.org/I145487455"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Salma Abdelmonem","raw_affiliation_strings":["Faculty of Engineering, Cairo University, Giza, Egypt"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Cairo University, Giza, Egypt","institution_ids":["https://openalex.org/I145487455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089700434","display_name":"Shahd Seddik","orcid":null},"institutions":[{"id":"https://openalex.org/I145487455","display_name":"Cairo University","ror":"https://ror.org/03q21mh05","country_code":"EG","type":"education","lineage":["https://openalex.org/I145487455"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Shahd Seddik","raw_affiliation_strings":["Faculty of Engineering, Cairo University, Giza, Egypt"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Cairo University, Giza, Egypt","institution_ids":["https://openalex.org/I145487455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080670092","display_name":"Rania A. Elsayed","orcid":"https://orcid.org/0000-0002-2380-3071"},"institutions":[{"id":"https://openalex.org/I145487455","display_name":"Cairo University","ror":"https://ror.org/03q21mh05","country_code":"EG","type":"education","lineage":["https://openalex.org/I145487455"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Rania El-Sayed","raw_affiliation_strings":["Faculty of Engineering, Cairo University, Giza, Egypt"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Cairo University, Giza, Egypt","institution_ids":["https://openalex.org/I145487455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034799194","display_name":"Ahmed S. Kaseb","orcid":"https://orcid.org/0000-0002-2579-966X"},"institutions":[{"id":"https://openalex.org/I145487455","display_name":"Cairo University","ror":"https://ror.org/03q21mh05","country_code":"EG","type":"education","lineage":["https://openalex.org/I145487455"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Ahmed S. Kaseb","raw_affiliation_strings":["Faculty of Engineering, Cairo University, Giza, Egypt"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Cairo University, Giza, Egypt","institution_ids":["https://openalex.org/I145487455"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5006829578"],"corresponding_institution_ids":["https://openalex.org/I145487455"],"apc_list":null,"apc_paid":null,"fwci":0.463,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.63366535,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9581829905509949},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8286464214324951},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6587147116661072},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6065032482147217},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.5290207862854004},{"id":"https://openalex.org/keywords/supervised-learning","display_name":"Supervised learning","score":0.528706431388855},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4757223427295685},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4104299545288086},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3586890697479248},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.35739755630493164},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1318122148513794},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.10431894659996033},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07377350330352783}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9581829905509949},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8286464214324951},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6587147116661072},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6065032482147217},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.5290207862854004},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.528706431388855},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4757223427295685},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4104299545288086},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3586890697479248},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.35739755630493164},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1318122148513794},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.10431894659996033},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07377350330352783}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/niles53778.2021.9600511","is_oa":false,"landing_page_url":"https://doi.org/10.1109/niles53778.2021.9600511","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 3rd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W830076066","https://openalex.org/W2010065958","https://openalex.org/W2112796928","https://openalex.org/W2194775991","https://openalex.org/W2528067192","https://openalex.org/W2530816535","https://openalex.org/W2607620859","https://openalex.org/W2778775032","https://openalex.org/W2951970475","https://openalex.org/W2952229419","https://openalex.org/W3006334803","https://openalex.org/W3034749675","https://openalex.org/W3109782039","https://openalex.org/W3161861984","https://openalex.org/W6623329352","https://openalex.org/W6728096403","https://openalex.org/W6779659972","https://openalex.org/W6786859752"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W115686965","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W3152891574","https://openalex.org/W1586252162"],"abstract_inverted_index":{"Malicious":[0],"software":[1],"(malware)":[2],"creators":[3],"are":[4,28,110],"constantly":[5],"mutating":[6],"malware":[7,21,26,48,56,60,103,108],"files":[8,27,109],"in":[9,15,157,166],"order":[10],"to":[11,31,37,46,121],"avoid":[12],"detection,":[13,49],"resulting":[14],"hundreds":[16],"of":[17,19,66,85,87,125,135,172],"millions":[18],"new":[20],"every":[22],"year.":[23],"Therefore,":[24],"most":[25],"unlabeled":[29,126],"due":[30],"the":[32,64,67,83,123,136,152,170],"time":[33],"and":[34,59,76,115,143,159],"cost":[35],"needed":[36],"label":[38],"them":[39],"manually.":[40],"This":[41],"makes":[42,139],"it":[43,140],"very":[44],"challenging":[45],"perform":[47],"i.e.,":[50,62],"deciding":[51],"whether":[52],"a":[53,97],"file":[54],"is":[55,118,131,175],"or":[57],"not,":[58],"classification,":[61],"determining":[63],"family":[65],"malware.":[68],"Most":[69],"solutions":[70],"use":[71],"supervised":[72,162],"learning":[73,99,117],"(e.g.,":[74],"ResNet":[75],"VGG)":[77],"whose":[78],"accuracy":[79,158,167],"degrades":[80],"significantly":[81],"with":[82],"lack":[84],"abundance":[86],"labeled":[88,173],"data.":[89,127],"To":[90],"solve":[91],"this":[92,94,106],"problem,":[93],"paper":[95],"proposes":[96],"semi-supervised":[98,116],"model":[100,130,150],"for":[101],"image-based":[102],"classification.":[104],"In":[105],"model,":[107],"represented":[111],"as":[112,176,178],"grayscale":[113],"images,":[114],"carefully":[119],"selected":[120],"handle":[122],"plethora":[124],"Our":[128],"proposed":[129,149],"an":[132],"enhanced":[133],"version":[134],"\u220f-model,":[137],"which":[138],"more":[141],"accurate":[142],"consistent.":[144],"Experiments":[145],"show":[146],"that":[147],"our":[148],"outperforms":[151],"original":[153],"\u220f-model":[154],"by":[155,164],"4%":[156],"three":[160],"other":[161],"models":[163],"6%":[165],"especially":[168],"when":[169],"ratio":[171],"samples":[174],"low":[177],"20%.":[179]},"counts_by_year":[{"year":2024,"cited_by_count":3}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
