{"id":"https://openalex.org/W3211529384","doi":"https://doi.org/10.1109/tifs.2021.3124725","title":"SpecView: Malware Spectrum Visualization Framework With Singular Spectrum Transformation","display_name":"SpecView: Malware Spectrum Visualization Framework With Singular Spectrum Transformation","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3211529384","doi":"https://doi.org/10.1109/tifs.2021.3124725","mag":"3211529384"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2021.3124725","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3124725","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027501725","display_name":"Jian Yu","orcid":"https://orcid.org/0000-0002-9488-5182"},"institutions":[{"id":"https://openalex.org/I4210165736","display_name":"Hanshan Normal University","ror":"https://ror.org/05tqaz865","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210165736"]},{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jian Yu","raw_affiliation_strings":["Guangdong Key Laboratory of Information Security, Sun Yat-sen University, Guangzhou, China","School of Computer and Information Engineering, Hanshan Normal University, Chaozhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"School of Computer and Information Engineering, Hanshan Normal University, Chaozhou, China","institution_ids":["https://openalex.org/I4210165736"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087322902","display_name":"Yuewang He","orcid":"https://orcid.org/0000-0002-2709-0443"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuewang He","raw_affiliation_strings":["Guangdong Key Laboratory of Information Security Technology, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security Technology, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084076598","display_name":"Qiben Yan","orcid":"https://orcid.org/0000-0003-0551-2163"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qiben Yan","raw_affiliation_strings":["Michigan State University, East Lansing, MI, USA"],"affiliations":[{"raw_affiliation_string":"Michigan State University, East Lansing, MI, USA","institution_ids":["https://openalex.org/I87216513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077333494","display_name":"Xiangui Kang","orcid":"https://orcid.org/0000-0002-3134-0353"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangui Kang","raw_affiliation_strings":["Guangdong Key Laboratory of Information Security Technology, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security Technology, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5027501725"],"corresponding_institution_ids":["https://openalex.org/I157773358","https://openalex.org/I4210165736"],"apc_list":null,"apc_paid":null,"fwci":2.2854,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.89256254,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"16","issue":null,"first_page":"5093","last_page":"5107"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9552000164985657,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8905394077301025},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8330181837081909},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.612989068031311},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5087993741035461},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.49028661847114563},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.46884310245513916},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.4615706205368042},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4329734742641449},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4045676290988922},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.37054407596588135},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18663346767425537}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8905394077301025},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8330181837081909},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.612989068031311},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5087993741035461},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49028661847114563},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.46884310245513916},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.4615706205368042},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4329734742641449},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4045676290988922},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.37054407596588135},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18663346767425537}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2021.3124725","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3124725","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1303975003","display_name":null,"funder_award_id":"62072484","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2370504912","display_name":null,"funder_award_id":"XN202035","funder_id":"https://openalex.org/F4320326686","funder_display_name":"Hanshan Normal University"},{"id":"https://openalex.org/G3092172996","display_name":null,"funder_award_id":"CNS-1950171","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7248977280","display_name":null,"funder_award_id":"61772571","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8030380906","display_name":null,"funder_award_id":"2019QY2203","funder_id":"https://openalex.org/F4320327261","funder_display_name":"National Center for Research and Development"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320326686","display_name":"Hanshan Normal University","ror":"https://ror.org/05tqaz865"},{"id":"https://openalex.org/F4320327261","display_name":"National Center for Research and Development","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":70,"referenced_works":["https://openalex.org/W43648929","https://openalex.org/W108952153","https://openalex.org/W1512947164","https://openalex.org/W1634176025","https://openalex.org/W1843925602","https://openalex.org/W1851403712","https://openalex.org/W1932627398","https://openalex.org/W1967185446","https://openalex.org/W1982147649","https://openalex.org/W2009320922","https://openalex.org/W2010065958","https://openalex.org/W2020184885","https://openalex.org/W2030806251","https://openalex.org/W2056132907","https://openalex.org/W2066220442","https://openalex.org/W2079215333","https://openalex.org/W2101234009","https://openalex.org/W2122672392","https://openalex.org/W2124833832","https://openalex.org/W2150795982","https://openalex.org/W2152195021","https://openalex.org/W2161867031","https://openalex.org/W2167003418","https://openalex.org/W2296240038","https://openalex.org/W2301473744","https://openalex.org/W2397306716","https://openalex.org/W2403153566","https://openalex.org/W2487124337","https://openalex.org/W2514847810","https://openalex.org/W2523428333","https://openalex.org/W2543580944","https://openalex.org/W2583329118","https://openalex.org/W2590294838","https://openalex.org/W2752485287","https://openalex.org/W2754462941","https://openalex.org/W2754625712","https://openalex.org/W2768073432","https://openalex.org/W2773197722","https://openalex.org/W2790918693","https://openalex.org/W2791541601","https://openalex.org/W2792672492","https://openalex.org/W2795845996","https://openalex.org/W2796394805","https://openalex.org/W2811511039","https://openalex.org/W2885003046","https://openalex.org/W2885070483","https://openalex.org/W2894236118","https://openalex.org/W2895853133","https://openalex.org/W2900275727","https://openalex.org/W2907236248","https://openalex.org/W2908835234","https://openalex.org/W2941199301","https://openalex.org/W2962930443","https://openalex.org/W2963562762","https://openalex.org/W2980842047","https://openalex.org/W2982739679","https://openalex.org/W2990114920","https://openalex.org/W3004280948","https://openalex.org/W3011624874","https://openalex.org/W3014274353","https://openalex.org/W3026465517","https://openalex.org/W3036847733","https://openalex.org/W3040987796","https://openalex.org/W3104141960","https://openalex.org/W4285719527","https://openalex.org/W6604458729","https://openalex.org/W6655500103","https://openalex.org/W6675354045","https://openalex.org/W6679060694","https://openalex.org/W6727618058"],"related_works":["https://openalex.org/W2620652965","https://openalex.org/W2900526031","https://openalex.org/W4296272594","https://openalex.org/W4360993664","https://openalex.org/W2465235098","https://openalex.org/W2470029541","https://openalex.org/W2470502009","https://openalex.org/W2167003418","https://openalex.org/W2728713145","https://openalex.org/W2171035369"],"abstract_inverted_index":{"With":[0],"the":[1,29,58,118,125,130,138,145,156,175,211,218,229,233,249],"rapid":[2],"development":[3],"of":[4,19,61,158],"automation":[5],"tools":[6],"including":[7],"polymorphic":[8],"and":[9,14,74,116,169,179,190,204,217],"metamorphic":[10],"engines,":[11],"generic":[12],"packers,":[13],"genetic":[15],"programming,":[16],"many":[17],"variants":[18,196],"malware":[20,35,45,49,63,85,97,107,159,172,195,225,240],"have":[21,38],"emerged,":[22],"which":[23,65],"pose":[24],"a":[25,62,96],"significant":[26],"threat":[27],"to":[28,67,123,143],"Internet":[30],"security.":[31],"To":[32],"effectively":[33,193],"detect":[34],"variants,":[36],"researchers":[37],"developed":[39],"visualization-based":[40],"approaches":[41,55],"that":[42,165,197,242],"can":[43,192],"visualize":[44],"adaptations":[46],"for":[47,223],"in-depth":[48],"analysis.":[50],"However,":[51],"most":[52],"existing":[53],"visualization":[54,99],"rely":[56],"on":[57,174,214,232,248],"binary":[59,108],"image":[60],"sample,":[64],"fail":[66],"provide":[68],"an":[69],"effective":[70,168],"texture":[71],"feature":[72],"representation":[73],"thus":[75],"often":[76],"result":[77],"in":[78,81,129,150,155,171],"low":[79],"efficiency":[80],"coping":[82],"with":[83,101,185],"challenging":[84],"samples.":[86],"In":[87],"this":[88],"paper,":[89],"we":[90,136],"propose":[91],"<italic":[92],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[93],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">SpecView</i>":[94],",":[95],"spectrum":[98,103,114,120,133,147],"framework":[100],"singular":[102,119,146],"transformation.":[104],"SpecView":[105,154,166],"converts":[106],"code":[109],"into":[110],"one-dimensional":[111],"time":[112,131],"series":[113,132],"data,":[115],"leverages":[117],"transformation":[121,148],"method":[122,209],"obtain":[124],"structural":[126],"changes":[127],"preserved":[128],"data.":[134],"Then,":[135],"utilize":[137],"particle":[139],"swarm":[140],"optimization":[141],"algorithm":[142],"optimize":[144],"performance":[149],"SpecView.":[151],"We":[152],"apply":[153],"task":[157],"classification.":[160],"Extensive":[161],"experimental":[162],"results":[163],"show":[164],"is":[167],"efficient":[170],"classification":[173,186,219],"Malimg,":[176],"Malheur,":[177],"Drebin,":[178],"PRAGuard":[180,250],"Malgenome":[181,251],"Class":[182,244,252],"Encryption":[183,245,253],"datasets,":[184],"accuracy":[187,220],"exceeding":[188],"99%,":[189],"it":[191],"identify":[194],"use":[198,243],"evasive":[199],"techniques":[200,247],"such":[201],"as":[202,236,238],"packer":[203,231],"encryption":[205],"obfuscation.":[206],"The":[207],"proposed":[208],"outperforms":[210],"state-of-the-art":[212],"methods":[213],"all":[215],"datasets":[216],"reaches":[221],"100%":[222],"5":[224],"families":[226,241],"packed":[227],"by":[228],"UPX":[230],"Malimg":[234],"dataset,":[235],"well":[237],"9":[239],"obfuscation":[246],"datasets.":[254]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
