{"id":"https://openalex.org/W3091973050","doi":"https://doi.org/10.1109/tr.2020.3020954","title":"The Classification and Detection of Malware Using Soft Relevance Evaluation","display_name":"The Classification and Detection of Malware Using Soft Relevance Evaluation","publication_year":2020,"publication_date":"2020-10-09","ids":{"openalex":"https://openalex.org/W3091973050","doi":"https://doi.org/10.1109/tr.2020.3020954","mag":"3091973050"},"language":"en","primary_location":{"id":"doi:10.1109/tr.2020.3020954","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tr.2020.3020954","pdf_url":null,"source":{"id":"https://openalex.org/S87725633","display_name":"IEEE Transactions on Reliability","issn_l":"0018-9529","issn":["0018-9529","1558-1721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Reliability","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053364949","display_name":"Yongchao Zhang","orcid":"https://orcid.org/0000-0001-6804-1990"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yongchao Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0001-6804-1990","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100462347","display_name":"Zhe Liu","orcid":"https://orcid.org/0000-0001-8578-2635"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhe Liu","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","State Key Laboratory of Cryptology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-8578-2635","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060117799","display_name":"Yu Jiang","orcid":"https://orcid.org/0000-0003-0955-503X"},"institutions":[{"id":"https://openalex.org/I4210156423","display_name":"National Engineering Research Center for Information Technology in Agriculture","ror":"https://ror.org/04c3j3t84","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210156423"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Jiang","raw_affiliation_strings":["School of Software, Tsinghua University, China, Beijing, China","Beijing National Research Center for Information Science and Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-0955-503X","affiliations":[{"raw_affiliation_string":"School of Software, Tsinghua University, China, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Beijing National Research Center for Information Science and Technology, Beijing, China","institution_ids":["https://openalex.org/I4210156423"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5053364949"],"corresponding_institution_ids":["https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":2.2792,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.89060867,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"71","issue":"1","first_page":"309","last_page":"320"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8601647615432739},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7137436866760254},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.7036111354827881},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance (law)","score":0.6691035032272339},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6575515270233154},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5719316601753235},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.5150758624076843},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.1731065809726715},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12019360065460205}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8601647615432739},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7137436866760254},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.7036111354827881},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.6691035032272339},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6575515270233154},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5719316601753235},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.5150758624076843},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.1731065809726715},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12019360065460205},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tr.2020.3020954","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tr.2020.3020954","pdf_url":null,"source":{"id":"https://openalex.org/S87725633","display_name":"IEEE Transactions on Reliability","issn_l":"0018-9529","issn":["0018-9529","1558-1721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Reliability","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G664217264","display_name":null,"funder_award_id":"61802180","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7120789399","display_name":null,"funder_award_id":"NE2018106","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1614298861","https://openalex.org/W1893133781","https://openalex.org/W2010065958","https://openalex.org/W2163352848","https://openalex.org/W2267635142","https://openalex.org/W2295598076","https://openalex.org/W2506186764","https://openalex.org/W2519371923","https://openalex.org/W2526236008","https://openalex.org/W2582361049","https://openalex.org/W2586571469","https://openalex.org/W2590294838","https://openalex.org/W2736972628","https://openalex.org/W2751469117","https://openalex.org/W2756078197","https://openalex.org/W2767092890","https://openalex.org/W2767675758","https://openalex.org/W2770258819","https://openalex.org/W2770848722","https://openalex.org/W2778944892","https://openalex.org/W2784727992","https://openalex.org/W2786476294","https://openalex.org/W2789834059","https://openalex.org/W2792657554","https://openalex.org/W2795033129","https://openalex.org/W2887382161","https://openalex.org/W2889384500","https://openalex.org/W2905284391","https://openalex.org/W2908857929","https://openalex.org/W2962861874","https://openalex.org/W6636510571","https://openalex.org/W6726965311","https://openalex.org/W6727652223","https://openalex.org/W6743618022","https://openalex.org/W6744049000","https://openalex.org/W7029952734"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W3008173435","https://openalex.org/W3214491504","https://openalex.org/W2963507914"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"researchers":[3],"have":[4],"made":[5],"a":[6,35,54,63,96,121,203],"great":[7],"success":[8],"on":[9,29],"the":[10,30,42,73,84,126,130,147,155,164,180,213,236],"automatic":[11],"classification":[12],"and":[13,119,139,172,177,208,211],"detection":[14,219],"of":[15,67,134,179,187],"malware":[16,37,123,127,189,218,229],"utilizing":[17],"machine":[18,23,215],"learning":[19,24,216],"methods.":[20],"However,":[21],"most":[22],"based":[25,217],"approaches":[26],"over":[27],"rely":[28],"training":[31,43,104,171,207,237],"samples":[32,94],"such":[33,50],"that":[34,71,195,231],"new":[36,64,97,122,228],"family":[38,98,124],"not":[39,101,233],"belonging":[40],"to":[41,77,91,117,226],"set":[44],"cannot":[45],"be":[46,115],"identified.":[47],"To":[48],"address":[49],"issue,":[51],"we":[52,82,107],"propose":[53],"soft":[55,69],"relevance":[56,70],"value":[57],"(":[58],"<italic":[59,110,198],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[60,111,199],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">s</i>":[61,112,200],"-value),":[62],"evaluating":[65],"way":[66],"feature":[68],"uses":[72],"mixed":[74,85],"distance":[75,86],"criterion":[76,87],"assess":[78],"classified":[79],"results.":[80],"Specifically,":[81],"leverage":[83],"from":[88,129],"pattern":[89],"recognition":[90],"distinguish":[92,118],"testing":[93],"as":[95],"which":[99],"is":[100,150,158,224],"labeled":[102],"in":[103,205,235],"set.":[105,238],"Finally,":[106],"evaluate":[108],"how":[109],"-value":[113,201],"can":[114],"used":[116],"classify":[120],"with":[125],"datasets":[128],"Research":[131],"Prediction":[132],"Competition":[133],"Microsoft":[135],"Malware":[136],"Classification":[137],"Challenge":[138],"Windows":[140],"(Kaggle).":[141],"The":[142,185],"experimental":[143],"results":[144,193],"show":[145],"that,":[146],"train-ing":[148],"time":[149,157,168,182],"approximately":[151],"12":[152],"hours,":[153],"while":[154],"prediction":[156,209],"only":[159,174],"\u223c0.5":[160],"second.":[161],"Comparing":[162],"against":[163],"Kaggle":[165],"winner,":[166],"our":[167,196,222],"costs":[169],"for":[170],"pprediction":[173],"occupy":[175],"16.7%":[176],"3.8%":[178],"winner.s":[181],"costs,":[183],"respectively.":[184],"accuracy":[186],"classifying":[188],"reaches":[190],"99.8%.":[191],"Such":[192],"indicates":[194],"proposed":[197],"achieves":[202],"balance":[204],"accuracy,":[206],"time,":[210],"outperforms":[212],"state-of-the-art":[214],"approaches.":[220],"Besides,":[221],"method":[223],"able":[225],"identify":[227],"families":[230],"are":[232],"included":[234]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2}],"updated_date":"2026-05-14T08:36:36.166977","created_date":"2025-10-10T00:00:00"}
