{"id":"https://openalex.org/W4412985068","doi":"https://doi.org/10.1109/tnsm.2025.3596134","title":"Attention-Enhanced Graph Convolution Network for Malware Family Feature Extraction and Embedding","display_name":"Attention-Enhanced Graph Convolution Network for Malware Family Feature Extraction and Embedding","publication_year":2025,"publication_date":"2025-08-05","ids":{"openalex":"https://openalex.org/W4412985068","doi":"https://doi.org/10.1109/tnsm.2025.3596134"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2025.3596134","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3596134","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022953646","display_name":"Shun-Wen Hsiao","orcid":"https://orcid.org/0000-0003-0780-8144"},"institutions":[{"id":"https://openalex.org/I87354575","display_name":"National Chengchi University","ror":"https://ror.org/03rqk8h36","country_code":"TW","type":"education","lineage":["https://openalex.org/I87354575"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Shun-Wen Hsiao","raw_affiliation_strings":["Department of Management Information Systems, National Chengchi University, Taipei City, Taiwan","Department of Management Information Systems, National Chengchi University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Management Information Systems, National Chengchi University, Taipei City, Taiwan","institution_ids":["https://openalex.org/I87354575"]},{"raw_affiliation_string":"Department of Management Information Systems, National Chengchi University, Taiwan","institution_ids":["https://openalex.org/I87354575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111145951","display_name":"Po-Yu Chu","orcid":null},"institutions":[{"id":"https://openalex.org/I87354575","display_name":"National Chengchi University","ror":"https://ror.org/03rqk8h36","country_code":"TW","type":"education","lineage":["https://openalex.org/I87354575"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Po-Yu Chu","raw_affiliation_strings":["Department of Management Information Systems, National Chengchi University, Taipei City, Taiwan","Department of Management Information Systems, National Chengchi University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Management Information Systems, National Chengchi University, Taipei City, Taiwan","institution_ids":["https://openalex.org/I87354575"]},{"raw_affiliation_string":"Department of Management Information Systems, National Chengchi University, Taiwan","institution_ids":["https://openalex.org/I87354575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5022953646"],"corresponding_institution_ids":["https://openalex.org/I87354575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28931573,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":"5","first_page":"4222","last_page":"4238"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9818999767303467,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8302110433578491},{"id":"https://openalex.org/keywords/convolution","display_name":"Convolution (computer science)","score":0.6484386920928955},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6154276132583618},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5935701727867126},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5837019085884094},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5220948457717896},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.521568238735199},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4573691487312317},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4338147044181824},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3624648451805115},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2868722677230835},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.1306276023387909}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8302110433578491},{"id":"https://openalex.org/C45347329","wikidata":"https://www.wikidata.org/wiki/Q5166604","display_name":"Convolution (computer science)","level":3,"score":0.6484386920928955},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6154276132583618},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5935701727867126},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5837019085884094},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5220948457717896},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.521568238735199},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4573691487312317},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4338147044181824},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3624648451805115},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2868722677230835},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.1306276023387909},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2025.3596134","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3596134","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5724196582","display_name":null,"funder_award_id":"113-2221-E-004-014-MY3","funder_id":"https://openalex.org/F4320331164","funder_display_name":"National Science and Technology Council"},{"id":"https://openalex.org/G8594840663","display_name":null,"funder_award_id":"113-2634-F-004-001-MBK","funder_id":"https://openalex.org/F4320331164","funder_display_name":"National Science and Technology Council"}],"funders":[{"id":"https://openalex.org/F4320331164","display_name":"National Science and Technology Council","ror":"https://ror.org/00wnb9798"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1573526548","https://openalex.org/W1975966552","https://openalex.org/W2024170198","https://openalex.org/W2033339460","https://openalex.org/W2064675550","https://openalex.org/W2066220442","https://openalex.org/W2154529672","https://openalex.org/W2309796561","https://openalex.org/W2770366677","https://openalex.org/W2788919350","https://openalex.org/W2907492528","https://openalex.org/W2935625550","https://openalex.org/W3003925307","https://openalex.org/W3006140559","https://openalex.org/W3007754518","https://openalex.org/W3023107948","https://openalex.org/W3036603968","https://openalex.org/W3038674659","https://openalex.org/W3195121218","https://openalex.org/W3201020763","https://openalex.org/W3209520664","https://openalex.org/W4283214123","https://openalex.org/W4323363627","https://openalex.org/W4328028694","https://openalex.org/W4360969865","https://openalex.org/W4385245566","https://openalex.org/W4393972734","https://openalex.org/W4399894485","https://openalex.org/W4400034767"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W3152891574","https://openalex.org/W4316881845","https://openalex.org/W2975527072"],"abstract_inverted_index":{"Understanding":[0],"malware":[1,32,98,155,169,201,214],"from":[2,216],"its":[3,197,217],"dynamic":[4],"API":[5],"call":[6,15,33,55,99,121,194,219],"sequence":[7,16,56,74,158],"is":[8],"non-trivial,":[9],"since":[10],"the":[11,21,73,95,107,111,118,143,147,179,182,189,200,210,224],"length":[12],"of":[13,97,115,120,181,192,212],"a":[14,54,90,124,129,213],"might":[17,24],"be":[18,25],"long":[19],"and":[20,38,61,66,104,127,164],"important":[22,108],"calls":[23,109],"neglected":[26],"by":[27],"human":[28],"beings.":[29],"In":[30,78,153],"addition,":[31],"sequences":[34,100,122,220],"are":[35],"unstructured,":[36],"text-based,":[37],"variable-length":[39],"with":[40,89],"semantics,":[41],"making":[42],"it":[43],"more":[44],"challenging":[45],"to":[46,93,105,177,195,221],"perform":[47,174],"downstream":[48],"analysis":[49],"tasks.":[50,172],"Unlike":[51],"natural":[52],"language,":[53],"may":[57],"contain":[58],"programming-related":[59],"properties":[60],"structures,":[62],"such":[63],"as":[64],"loops":[65],"repeated":[67],"calls;":[68],"therefore,":[69],"this":[70,79],"paper":[71],"considers":[72],"structure":[75,96,119,132],"for":[76,101,135,149,199],"analysis.":[77,136],"paper,":[80],"we":[81,207],"design":[82,114],"an":[83],"Attention-Enhanced":[84],"Graph":[85],"Convolution":[86],"Network":[87],"(AEGCN)":[88],"Markov":[91,125],"model":[92,126],"learn":[94],"representation":[102],"learning":[103],"pinpoint":[106],"in":[110,146,168],"sequence.":[112],"The":[113,137],"AEGCN":[116],"preserves":[117],"using":[123],"adopts":[128],"customized":[130],"attention":[131,139,184,190],"on":[133],"GCN":[134],"proposed":[138],"mechanism":[140],"can":[141,208],"affect":[142],"information":[144],"propagation":[145],"graph":[148],"feature":[150],"extraction":[151],"purposes.":[152],"real-world":[154],"experiments,":[156],"AEGCN\u2019s":[157],"embeddings":[159],"outperform":[160],"text":[161],"embedding":[162],"methods":[163],"conventional":[165],"GNN":[166],"models":[167],"family":[170,202,215,225],"classification":[171,203],"We":[173,186],"ablation":[175],"experiments":[176],"examine":[178],"effectiveness":[180],"new":[183],"mechanisms.":[185],"also":[187],"visualize":[188],"weight":[191],"each":[193],"manifest":[196],"importance":[198],"task.":[204],"That":[205],"is,":[206],"extract":[209],"features":[211],"unstructured":[218],"better":[222],"understand":[223],"behavior.":[226]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
