{"id":"https://openalex.org/W4388019121","doi":"https://doi.org/10.1109/tifs.2023.3328431","title":"ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification","display_name":"ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification","publication_year":2023,"publication_date":"2023-10-30","ids":{"openalex":"https://openalex.org/W4388019121","doi":"https://doi.org/10.1109/tifs.2023.3328431"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3328431","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3328431","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087322902","display_name":"Yuewang He","orcid":"https://orcid.org/0000-0002-2709-0443"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuewang He","raw_affiliation_strings":["Guangdong Key Laboratory of Information Security Technology, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security Technology, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077333494","display_name":"Xiangui Kang","orcid":"https://orcid.org/0000-0002-3134-0353"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangui Kang","raw_affiliation_strings":["Guangdong Key Laboratory of Information Security Technology, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security Technology, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084076598","display_name":"Qiben Yan","orcid":"https://orcid.org/0000-0003-0551-2163"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qiben Yan","raw_affiliation_strings":["Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA","institution_ids":["https://openalex.org/I87216513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085509544","display_name":"Enping Li","orcid":"https://orcid.org/0009-0008-9073-5567"},"institutions":[{"id":"https://openalex.org/I17856709","display_name":"Bridgewater State University","ror":"https://ror.org/02x3skf39","country_code":"US","type":"education","lineage":["https://openalex.org/I17856709"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Enping Li","raw_affiliation_strings":["Department of Computer Science, Bridgewater State University, Bridgewater, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Bridgewater State University, Bridgewater, MA, USA","institution_ids":["https://openalex.org/I17856709"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5087322902"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":6.6821,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.97787693,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"19","issue":null,"first_page":"1142","last_page":"1155"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9805999994277954,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9760000109672546,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8520417213439941},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8243169784545898},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.5597528219223022},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5457637906074524},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.534323513507843},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5026342868804932},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.433957576751709},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.41288983821868896},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33919399976730347},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1721268594264984}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8520417213439941},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8243169784545898},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.5597528219223022},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5457637906074524},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.534323513507843},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5026342868804932},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.433957576751709},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.41288983821868896},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33919399976730347},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1721268594264984},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3328431","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3328431","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1303975003","display_name":null,"funder_award_id":"62072484","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":60,"referenced_works":["https://openalex.org/W2010065958","https://openalex.org/W2030806251","https://openalex.org/W2097117768","https://openalex.org/W2122672392","https://openalex.org/W2183341477","https://openalex.org/W2194775991","https://openalex.org/W2301473744","https://openalex.org/W2548971154","https://openalex.org/W2549139847","https://openalex.org/W2587930273","https://openalex.org/W2618530766","https://openalex.org/W2752485287","https://openalex.org/W2752782242","https://openalex.org/W2754462941","https://openalex.org/W2768073432","https://openalex.org/W2783615536","https://openalex.org/W2792672492","https://openalex.org/W2795033129","https://openalex.org/W2796394805","https://openalex.org/W2900275727","https://openalex.org/W2906631928","https://openalex.org/W2907236248","https://openalex.org/W2931858311","https://openalex.org/W2941199301","https://openalex.org/W2949468774","https://openalex.org/W2951908758","https://openalex.org/W2960023330","https://openalex.org/W2963165251","https://openalex.org/W2969659874","https://openalex.org/W2971299916","https://openalex.org/W2980859170","https://openalex.org/W2982739679","https://openalex.org/W2990114920","https://openalex.org/W3034552520","https://openalex.org/W3042537214","https://openalex.org/W3083139378","https://openalex.org/W3097711322","https://openalex.org/W3105429705","https://openalex.org/W3108960907","https://openalex.org/W3119370674","https://openalex.org/W3127455599","https://openalex.org/W3138102940","https://openalex.org/W3138516171","https://openalex.org/W3168097936","https://openalex.org/W3177052299","https://openalex.org/W3187160727","https://openalex.org/W3203731077","https://openalex.org/W3211281133","https://openalex.org/W3211529384","https://openalex.org/W4225997439","https://openalex.org/W4229010634","https://openalex.org/W4282582195","https://openalex.org/W4288070321","https://openalex.org/W4288072399","https://openalex.org/W4289752563","https://openalex.org/W4300687693","https://openalex.org/W6750318962","https://openalex.org/W6766978945","https://openalex.org/W6796538260","https://openalex.org/W6810964969"],"related_works":["https://openalex.org/W2782775281","https://openalex.org/W4312334973","https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W2591124010","https://openalex.org/W3200508744","https://openalex.org/W4311848503","https://openalex.org/W3025122950","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"Malware":[0],"detection":[1,47,154,188,208],"and":[2,10,19,28,67,109,117,131,150,155,178,209],"classification":[3,156,159,210],"are":[4,49,135,194],"crucial":[5],"for":[6],"protecting":[7],"digital":[8],"devices":[9],"information":[11,64,119],"systems.":[12],"Accurate":[13],"identification":[14],"of":[15,35,41,55,65,107,184,189],"malware":[16,27,46,97,102,153,207],"enables":[17],"researchers":[18],"incident":[20],"responders":[21],"to":[22,60,93,113],"take":[23],"prompt":[24],"measures":[25],"against":[26],"mitigate":[29],"its":[30,132],"damage.":[31],"With":[32],"the":[33,39,56,63,69,83,88,96,101,165,176,190],"development":[34],"attention":[36,44,57,79,140,203],"mechanisms":[37,80,204],"in":[38,152],"field":[40,106],"computer":[42],"vision,":[43],"mechanism-based":[45],"techniques":[48,167],"also":[50,111,195],"rapidly":[51],"evolving.":[52],"The":[53,161],"essence":[54],"mechanism":[58],"is":[59,91,110,148],"focus":[61,94],"on":[62,82,95,175,186,197],"interest":[66],"suppress":[68],"useless":[70],"information.":[71],"In":[72],"this":[73,126],"paper,":[74],"we":[75],"develop":[76],"different":[77,138],"plug-and-play":[78,139],"based":[81],"ResNeXt":[84],"tagging":[85],"model,":[86],"where":[87],"designed":[89,127],"model":[90],"trained":[92],"features":[98],"by":[99],"capturing":[100],"image":[103],"channel":[104],"perception":[105],"view":[108],"able":[112],"provide":[114],"more":[115],"helpful":[116],"flexible":[118],"than":[120],"other":[121],"methods.":[122],"We":[123],"have":[124],"named":[125],"neural":[128],"network":[129],"ResNeXt+,":[130],"core":[133],"modules":[134],"built":[136],"with":[137,157,168,181],"mechanisms.":[141],"Extensive":[142],"experimental":[143],"results":[144],"show":[145],"that":[146,202],"ResNeXt+":[147],"effective":[149],"efficient":[151],"high":[158],"accuracy.":[160,211],"proposed":[162],"methods":[163],"outperform":[164],"state-of-the-art":[166],"seven":[169,198],"benchmark":[170],"datasets.":[171],"Cross-dataset":[172],"experiments":[173,193],"conducted":[174,196],"Windows":[177],"Android":[179],"datasets,":[180,199],"an":[182],"accuracy":[183],"90.64%":[185],"cross-dataset":[187],"android.":[191],"Ablation":[192],"which":[200],"demonstrate":[201],"can":[205],"improve":[206]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":21},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
