{"id":"https://openalex.org/W4390693581","doi":"https://doi.org/10.1109/iccais59597.2023.10382321","title":"ZSL-SLCNN: Zero-Shot Learning with Semantic Label CNN for Malware Classification","display_name":"ZSL-SLCNN: Zero-Shot Learning with Semantic Label CNN for Malware Classification","publication_year":2023,"publication_date":"2023-11-27","ids":{"openalex":"https://openalex.org/W4390693581","doi":"https://doi.org/10.1109/iccais59597.2023.10382321"},"language":"en","primary_location":{"id":"doi:10.1109/iccais59597.2023.10382321","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccais59597.2023.10382321","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 12th International Conference on Control, Automation and Information Sciences (ICCAIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050184686","display_name":"Tuan Van Dao","orcid":"https://orcid.org/0000-0003-1227-1986"},"institutions":[{"id":"https://openalex.org/I443798","display_name":"National Defense Academy of Japan","ror":"https://ror.org/05xszy717","country_code":"JP","type":"education","lineage":["https://openalex.org/I443798"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Tuan Van Dao","raw_affiliation_strings":["Graduate School of Science and Engineering National Defense Academy of Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Science and Engineering National Defense Academy of Japan","institution_ids":["https://openalex.org/I443798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049917170","display_name":"Hiroshi Sat\u014d","orcid":"https://orcid.org/0000-0002-5899-1340"},"institutions":[{"id":"https://openalex.org/I443798","display_name":"National Defense Academy of Japan","ror":"https://ror.org/05xszy717","country_code":"JP","type":"education","lineage":["https://openalex.org/I443798"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroshi Sato","raw_affiliation_strings":["Graduate School of Science and Engineering National Defense Academy of Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Science and Engineering National Defense Academy of Japan","institution_ids":["https://openalex.org/I443798"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110944383","display_name":"Masao Kubo","orcid":null},"institutions":[{"id":"https://openalex.org/I443798","display_name":"National Defense Academy of Japan","ror":"https://ror.org/05xszy717","country_code":"JP","type":"education","lineage":["https://openalex.org/I443798"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masao Kubo","raw_affiliation_strings":["Graduate School of Science and Engineering National Defense Academy of Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Science and Engineering National Defense Academy of Japan","institution_ids":["https://openalex.org/I443798"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050184686"],"corresponding_institution_ids":["https://openalex.org/I443798"],"apc_list":null,"apc_paid":null,"fwci":0.4075,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.60682316,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"572","last_page":"577"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8527383804321289},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8280029296875},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6404674053192139},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.5804765224456787},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5424633026123047},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5352742075920105},{"id":"https://openalex.org/keywords/shot","display_name":"Shot (pellet)","score":0.4719977378845215},{"id":"https://openalex.org/keywords/word-embedding","display_name":"Word embedding","score":0.4572474956512451},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.4112253785133362},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14404016733169556}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8527383804321289},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8280029296875},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6404674053192139},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.5804765224456787},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5424633026123047},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5352742075920105},{"id":"https://openalex.org/C2778344882","wikidata":"https://www.wikidata.org/wiki/Q278938","display_name":"Shot (pellet)","level":2,"score":0.4719977378845215},{"id":"https://openalex.org/C2777462759","wikidata":"https://www.wikidata.org/wiki/Q18395344","display_name":"Word embedding","level":3,"score":0.4572474956512451},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.4112253785133362},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14404016733169556},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccais59597.2023.10382321","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccais59597.2023.10382321","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 12th International Conference on Control, Automation and Information Sciences (ICCAIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W652269744","https://openalex.org/W1992753948","https://openalex.org/W2010065958","https://openalex.org/W2124033848","https://openalex.org/W2150295085","https://openalex.org/W2334493732","https://openalex.org/W2493916176","https://openalex.org/W2552383788","https://openalex.org/W2611632661","https://openalex.org/W2748618181","https://openalex.org/W2783348159","https://openalex.org/W2962714319","https://openalex.org/W2962762077","https://openalex.org/W2970299364","https://openalex.org/W3000411596","https://openalex.org/W3005941094","https://openalex.org/W3013908242","https://openalex.org/W3030051702","https://openalex.org/W3138102940","https://openalex.org/W3174909610","https://openalex.org/W3189794512","https://openalex.org/W3203731077","https://openalex.org/W4205270295","https://openalex.org/W4220678224","https://openalex.org/W4281945774","https://openalex.org/W4283259368","https://openalex.org/W4292541930","https://openalex.org/W4301409532","https://openalex.org/W4323313104","https://openalex.org/W4323338649","https://openalex.org/W4327971682","https://openalex.org/W4367296576","https://openalex.org/W4383751665","https://openalex.org/W4394449576","https://openalex.org/W6678360021","https://openalex.org/W6682222085","https://openalex.org/W6791353385","https://openalex.org/W6864220122"],"related_works":["https://openalex.org/W2074502265","https://openalex.org/W4214877189","https://openalex.org/W2097492617","https://openalex.org/W2773965352","https://openalex.org/W2381179799","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2980279061","https://openalex.org/W2537959205","https://openalex.org/W4286432911"],"abstract_inverted_index":{"Malware":[0],"is":[1,45],"becoming":[2],"increasingly":[3],"sophisticated,":[4],"with":[5,59,90,117],"new":[6],"malware":[7,100,140,169],"constantly":[8],"emerging,":[9],"posing":[10],"challenges":[11],"for":[12,163],"cybersecurity":[13],"teams":[14],"to":[15,29,48,70,79,103,120,137],"classify":[16,49],"them":[17],"accurately.":[18],"Traditional":[19],"supervised":[20],"learning":[21,98,133],"methods":[22],"have":[23],"achieved":[24],"impressive":[25],"results":[26],"recently,":[27],"thanks":[28],"the":[30,122,157],"contributions":[31],"of":[32,42,124,159],"various":[33],"novel":[34,112],"techniques":[35],"and":[36,94,145,167],"models.":[37],"However,":[38],"a":[39,111],"notable":[40],"drawback":[41],"this":[43,72,107],"approach":[44],"its":[46,75],"inability":[47],"malicious":[50],"code":[51],"it":[52],"has":[53,64],"never":[54],"encountered,":[55],"in":[56,67,99],"other":[57],"words,":[58],"untrained":[60],"labels.":[61,151],"Zero-shot":[62],"Learning":[63],"been":[65],"explored":[66],"diverse":[68],"fields":[69],"address":[71],"limitation,":[73],"but":[74],"performance":[76],"still":[77],"needs":[78],"improve.":[80],"Notably,":[81],"most":[82],"current":[83],"studies":[84,95],"only":[85],"focus":[86],"on":[87],"one-layer":[88],"mapping,":[89],"few":[91],"outstanding":[92],"achievements,":[93],"using":[96,141],"zero-shot":[97,132],"classification":[101],"need":[102],"be":[104,135],"improved.":[105],"In":[106],"paper,":[108],"we":[109,155],"propose":[110],"method":[113,162],"utilizing":[114],"Semantic":[115],"Labels":[116],"two-layer":[118],"mapping":[119],"enhance":[121],"efficiency":[123],"traditional":[125],"Zero-Shot":[126],"Learning.":[127],"This":[128],"study":[129],"explores":[130],"how":[131],"can":[134],"leveraged":[136],"detect":[138],"image-based":[139],"merely":[142],"simple":[143],"CNN":[144],"pre-trained":[146],"word":[147],"embedding":[148],"as":[149],"semantic":[150],"Through":[152],"experimental":[153],"results,":[154],"demonstrate":[156],"effectiveness":[158],"our":[160],"proposed":[161],"classifying":[164],"both":[165],"seen":[166],"unseen":[168],"families.":[170]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
