{"id":"https://openalex.org/W4415820630","doi":"https://doi.org/10.1109/tdsc.2025.3627810","title":"Multi-View Few-Shot Malware Classification With Support-Query Prototypes","display_name":"Multi-View Few-Shot Malware Classification With Support-Query Prototypes","publication_year":2025,"publication_date":"2025-11-03","ids":{"openalex":"https://openalex.org/W4415820630","doi":"https://doi.org/10.1109/tdsc.2025.3627810"},"language":null,"primary_location":{"id":"doi:10.1109/tdsc.2025.3627810","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3627810","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010187139","display_name":"Shuhong Chen","orcid":"https://orcid.org/0000-0002-6120-6358"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuhong Chen","raw_affiliation_strings":["School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071554167","display_name":"Hanjun Li","orcid":"https://orcid.org/0000-0002-7017-8782"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hanjun Li","raw_affiliation_strings":["School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076576641","display_name":"Sheng Wen","orcid":"https://orcid.org/0000-0003-0655-666X"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sheng Wen","raw_affiliation_strings":["Blockchain Innovation Lab, Swinburne University of Technology, Hawthorn, VIC, Australia","Blockchain Innovation Lab, Swinburne University of Technology, Victoria, Australia"],"affiliations":[{"raw_affiliation_string":"Blockchain Innovation Lab, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Blockchain Innovation Lab, Swinburne University of Technology, Victoria, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100386726","display_name":"Guojun Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guojun Wang","raw_affiliation_strings":["School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036801346","display_name":"Tianqing Zhu","orcid":"https://orcid.org/0000-0003-3411-7947"},"institutions":[{"id":"https://openalex.org/I6469544","display_name":"City University of Macau","ror":"https://ror.org/04gpd4q15","country_code":"MO","type":"education","lineage":["https://openalex.org/I6469544"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Tianqing Zhu","raw_affiliation_strings":["Faculty of Data Science, City University of Macau, Macau, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Data Science, City University of Macau, Macau, China","institution_ids":["https://openalex.org/I6469544"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["Blockchain Innovation Lab, Swinburne University of Technology, Hawthorn, VIC, Australia","Blockchain Innovation Lab, Swinburne University of Technology, Victoria, Australia"],"affiliations":[{"raw_affiliation_string":"Blockchain Innovation Lab, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Blockchain Innovation Lab, Swinburne University of Technology, Victoria, Australia","institution_ids":["https://openalex.org/I57093077"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5010187139"],"corresponding_institution_ids":["https://openalex.org/I37987034"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40788794,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"2","first_page":"2534","last_page":"2550"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.0020000000949949026,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.0013000000035390258,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9136999845504761},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6757000088691711},{"id":"https://openalex.org/keywords/generalizability-theory","display_name":"Generalizability theory","score":0.5576000213623047},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.49230000376701355},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4650999903678894},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.46459999680519104},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.4510999917984009},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4293999969959259}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9136999845504761},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8833000063896179},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6757000088691711},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6444000005722046},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5746999979019165},{"id":"https://openalex.org/C27158222","wikidata":"https://www.wikidata.org/wiki/Q5532422","display_name":"Generalizability theory","level":2,"score":0.5576000213623047},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.49230000376701355},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4650999903678894},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.46459999680519104},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.4510999917984009},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4293999969959259},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.42410001158714294},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.3982999920845032},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38029998540878296},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3774999976158142},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.3666999936103821},{"id":"https://openalex.org/C2776145971","wikidata":"https://www.wikidata.org/wiki/Q30673951","display_name":"Labeled data","level":2,"score":0.3465999960899353},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.34150001406669617},{"id":"https://openalex.org/C207685749","wikidata":"https://www.wikidata.org/wiki/Q2088941","display_name":"Domain knowledge","level":2,"score":0.33880001306533813},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.32339999079704285},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3046000003814697},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.2727000117301941},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.271699994802475},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.2500999867916107}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3627810","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3627810","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W2010065958","https://openalex.org/W2966342255","https://openalex.org/W3019875810","https://openalex.org/W3034312118","https://openalex.org/W3108878460","https://openalex.org/W3153387614","https://openalex.org/W3175941285","https://openalex.org/W3189794512","https://openalex.org/W4205270295","https://openalex.org/W4212847133","https://openalex.org/W4220768885","https://openalex.org/W4282929420","https://openalex.org/W4292826151","https://openalex.org/W4307340220","https://openalex.org/W4311897822","https://openalex.org/W4312056312","https://openalex.org/W4312250728","https://openalex.org/W4313010934","https://openalex.org/W4318194836","https://openalex.org/W4319163914","https://openalex.org/W4321365946","https://openalex.org/W4321438902","https://openalex.org/W4323064896","https://openalex.org/W4323655380","https://openalex.org/W4365801590","https://openalex.org/W4383754176","https://openalex.org/W4384661952","https://openalex.org/W4385076171","https://openalex.org/W4385755457","https://openalex.org/W4386075713","https://openalex.org/W4387234384","https://openalex.org/W4387686540","https://openalex.org/W4388686503","https://openalex.org/W4390317718","https://openalex.org/W4390562648","https://openalex.org/W4390603899","https://openalex.org/W4391503438","https://openalex.org/W4391620743","https://openalex.org/W4392121297","https://openalex.org/W4392296462","https://openalex.org/W4392303153","https://openalex.org/W4393160488","https://openalex.org/W4394862626","https://openalex.org/W4401074733","https://openalex.org/W4401396935","https://openalex.org/W4404254040","https://openalex.org/W4405304483","https://openalex.org/W4407008852","https://openalex.org/W4407784082","https://openalex.org/W4408998396","https://openalex.org/W4409233026","https://openalex.org/W4409772587","https://openalex.org/W4410394431","https://openalex.org/W4411408927"],"related_works":[],"abstract_inverted_index":{"Artificial":[0],"Intelligence":[1],"(AI)":[2],"technology":[3],"has":[4,12,49],"been":[5],"widely":[6],"used":[7],"in":[8,53],"malware":[9,41,56,81,108,128,148,156],"detection":[10],"and":[11,28,122,193],"significantly":[13],"improved":[14],"defense":[15],"against":[16],"cyberattacks.":[17],"Existing":[18],"deep":[19],"learning-based":[20],"methods":[21,62],"rely":[22],"on":[23,30,46,72,141],"training":[24],"with":[25,97],"large-scale":[26],"data":[27,197],"only":[29,171],"predefined":[31],"categories,":[32],"making":[33],"them":[34],"inadequate":[35],"for":[36,107],"rapidly":[37],"responding":[38],"to":[39,64,125,145],"novel":[40,155],"attacks.":[42],"Malware":[43],"classification":[44],"based":[45,140],"few-shot":[47,104],"learning":[48,105],"made":[50],"some":[51],"progress":[52],"identifying":[54],"unknown":[55],"using":[57],"limited":[58],"data.":[59],"However,":[60],"existing":[61,167],"struggle":[63],"achieve":[65],"high":[66],"performance":[67],"because":[68],"they":[69],"typically":[70],"focus":[71],"a":[73,79,102,112,135],"single":[74,80],"malicious":[75,114,143],"feature,":[76],"such":[77],"as":[78],"image":[82],"or":[83],"an":[84],"API":[85],"call":[86],"sequence,":[87],"thereby":[88,188],"ignoring":[89],"the":[90,127,152,163,176],"multi-dimensional":[91],"nature":[92],"of":[93,154],"malware.":[94],"To":[95],"deal":[96],"these":[98],"challenges,":[99],"we":[100,133],"propose":[101,111,134],"multi-view":[103,113,142],"method":[106,139,165,182],"classification.":[109],"We":[110],"feature":[115],"engineering":[116],"scheme,":[117],"which":[118,150],"combines":[119],"domain":[120],"knowledge":[121],"expert":[123],"experience":[124],"analyze":[126],"from":[129],"various":[130],"perspectives.":[131],"Furthermore,":[132],"support-query":[136],"prototype":[137],"generation":[138],"features":[144],"generate":[146],"higher-quality":[147],"prototypes,":[149],"enhances":[151],"representation":[153],"family":[157],"distributions.":[158,198],"Extensive":[159],"experiments":[160],"show":[161],"that":[162],"proposed":[164],"outperforms":[166],"state-of-the-art":[168],"approaches.":[169],"With":[170],"two":[172],"samples":[173],"per":[174],"family,":[175],"accuracy":[177],"still":[178],"exceeds":[179],"90%.":[180],"Our":[181],"demonstrates":[183],"superior":[184],"cross-dataset":[185],"recognition":[186],"capabilities,":[187],"fully":[189],"illustrating":[190],"its":[191],"robustness":[192],"generalizability":[194],"across":[195],"different":[196]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-11-03T00:00:00"}
