{"id":"https://openalex.org/W4200388623","doi":"https://doi.org/10.1109/pst52912.2021.9647787","title":"Detection of Induced False Negatives in Malware Samples","display_name":"Detection of Induced False Negatives in Malware Samples","publication_year":2021,"publication_date":"2021-12-13","ids":{"openalex":"https://openalex.org/W4200388623","doi":"https://doi.org/10.1109/pst52912.2021.9647787"},"language":"en","primary_location":{"id":"doi:10.1109/pst52912.2021.9647787","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst52912.2021.9647787","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ro.ecu.edu.au/ecuworkspost2013/11806","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085070757","display_name":"Adrian Wood","orcid":"https://orcid.org/0000-0002-3335-6375"},"institutions":[{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Adrian Wood","raw_affiliation_strings":["School of Science, Edith Cowan University, Perth, Australia"],"affiliations":[{"raw_affiliation_string":"School of Science, Edith Cowan University, Perth, Australia","institution_ids":["https://openalex.org/I12079687"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037747860","display_name":"Michael N. Johnstone","orcid":"https://orcid.org/0000-0001-7192-7098"},"institutions":[{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Michael N. Johnstone","raw_affiliation_strings":["School of Science, Edith Cowan University, Perth, Australia"],"affiliations":[{"raw_affiliation_string":"School of Science, Edith Cowan University, Perth, Australia","institution_ids":["https://openalex.org/I12079687"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5085070757"],"corresponding_institution_ids":["https://openalex.org/I12079687"],"apc_list":null,"apc_paid":null,"fwci":0.1524,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.4765382,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"96","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9389634132385254},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8004518747329712},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.5792744159698486},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5744502544403076},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5415279269218445},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5386495590209961},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.5136610865592957},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5094171166419983},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.48702293634414673},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32343393564224243},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08069345355033875}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9389634132385254},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8004518747329712},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.5792744159698486},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5744502544403076},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5415279269218445},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5386495590209961},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.5136610865592957},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5094171166419983},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.48702293634414673},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32343393564224243},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08069345355033875},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pst52912.2021.9647787","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst52912.2021.9647787","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},{"id":"pmh:oai:ro.ecu.edu.au:ecuworkspost2013-12812","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworkspost2013/11806","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2014 to 2021","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:ro.ecu.edu.au:ecuworkspost2013-12812","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworkspost2013/11806","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2014 to 2021","raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2122672392","https://openalex.org/W2749141039","https://openalex.org/W2785509559","https://openalex.org/W2793931959","https://openalex.org/W2900633536","https://openalex.org/W2934843808","https://openalex.org/W2942091739","https://openalex.org/W2963461515","https://openalex.org/W2963564844","https://openalex.org/W2964043980","https://openalex.org/W3009683280","https://openalex.org/W3070581385","https://openalex.org/W3082972322","https://openalex.org/W3127350051","https://openalex.org/W4289300166","https://openalex.org/W4297573953","https://openalex.org/W4300687693","https://openalex.org/W6748233343","https://openalex.org/W6756074407","https://openalex.org/W6790203402"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W4384648009","https://openalex.org/W4303645823","https://openalex.org/W2900159906","https://openalex.org/W4283221438","https://openalex.org/W4287828318","https://openalex.org/W2406556600","https://openalex.org/W2899811703","https://openalex.org/W2930249865"],"abstract_inverted_index":{"Malware":[0,22],"detection":[1,14,23,59],"is":[2,24,83],"an":[3,37,81],"important":[4],"area":[5],"of":[6,32,76,91,113,162,173],"cyber":[7],"security.":[8],"Computer":[9],"systems":[10],"rely":[11,109],"on":[12,110],"malware":[13,18,33,54,58,149],"applications":[15],"to":[16,46,51,70,73,85,98,118,170],"prevent":[17,99],"attacks":[19,102],"from":[20,125],"succeeding.":[21],"not":[25,62,135],"a":[26,114,137],"straightforward":[27],"task,":[28],"as":[29,151],"new":[30,53],"variants":[31,55],"are":[34],"generated":[35],"at":[36,153],"increasing":[38],"rate.":[39],"Machine":[40,64],"learning":[41],"(ML)":[42],"has":[43,66],"been":[44,68,104],"utilised":[45],"generate":[47],"predictive":[48],"classification":[49,89],"models":[50],"identify":[52,120,171],"which":[56,80],"conventional":[57],"methods":[60],"may":[61],"detect.":[63],"learning,":[65],"however,":[67],"found":[69],"be":[71],"vulnerable":[72],"different":[74],"types":[75],"adversarial":[77,100,123],"attacks,":[78],"in":[79,131],"attacker":[82],"able":[84,169],"negatively":[86],"affect":[87],"the":[88,92,111,126,154,159,163,174],"ability":[90],"ML":[93,164],"model.":[94,165],"Several":[95],"defensive":[96],"measures":[97],"poisoning":[101,177],"have":[103],"developed,":[105],"but":[106,141],"they":[107],"often":[108],"use":[112],"trusted":[115,138],"clean":[116,139],"dataset":[117],"help":[119],"and":[121],"remove":[122],"examples":[124],"training":[127],"dataset.":[128],"The":[129,166],"defence":[130,167],"this":[132],"paper":[133],"does":[134],"require":[136],"dataset,":[140],"instead,":[142],"identifies":[143],"intentional":[144],"false":[145],"negatives":[146],"(zero":[147],"day":[148],"classified":[150],"benign)":[152],"testing":[155],"stage":[156],"by":[157],"examining":[158],"activation":[160],"weights":[161],"was":[168],"94.07%":[172],"successful":[175],"targeted":[176],"attacks.":[178]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
