{"id":"https://openalex.org/W4396920917","doi":"https://doi.org/10.1142/s0218194024500256","title":"Approach to Detect Windows Malware Based on Malicious Tendency Image and ResNet Algorithm","display_name":"Approach to Detect Windows Malware Based on Malicious Tendency Image and ResNet Algorithm","publication_year":2024,"publication_date":"2024-05-15","ids":{"openalex":"https://openalex.org/W4396920917","doi":"https://doi.org/10.1142/s0218194024500256"},"language":"en","primary_location":{"id":"doi:10.1142/s0218194024500256","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218194024500256","pdf_url":null,"source":{"id":"https://openalex.org/S131442419","display_name":"International Journal of Software Engineering and Knowledge Engineering","issn_l":"0218-1940","issn":["0218-1940","1793-6403"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Software Engineering and Knowledge Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100673338","display_name":"Bing Zhang","orcid":"https://orcid.org/0000-0002-9867-8439"},"institutions":[{"id":"https://openalex.org/I39333907","display_name":"Yanshan University","ror":"https://ror.org/02txfnf15","country_code":"CN","type":"education","lineage":["https://openalex.org/I39333907"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bing Zhang","raw_affiliation_strings":["School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, Hebei, P. R. China","The Key Laboratory of Software Engineering, Yanshan University, Qinhuangdao 066004, Hebei, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, Hebei, P. R. China","institution_ids":["https://openalex.org/I39333907"]},{"raw_affiliation_string":"The Key Laboratory of Software Engineering, Yanshan University, Qinhuangdao 066004, Hebei, P. R. China","institution_ids":["https://openalex.org/I39333907"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037003825","display_name":"Hongchang Zhang","orcid":"https://orcid.org/0000-0002-7306-7850"},"institutions":[{"id":"https://openalex.org/I39333907","display_name":"Yanshan University","ror":"https://ror.org/02txfnf15","country_code":"CN","type":"education","lineage":["https://openalex.org/I39333907"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongchang Zhang","raw_affiliation_strings":["School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, Hebei, P. R. China","The Key Laboratory of Software Engineering, Yanshan University, Qinhuangdao 066004, Hebei, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, Hebei, P. R. China","institution_ids":["https://openalex.org/I39333907"]},{"raw_affiliation_string":"The Key Laboratory of Software Engineering, Yanshan University, Qinhuangdao 066004, Hebei, P. R. China","institution_ids":["https://openalex.org/I39333907"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106407633","display_name":"Rong Ren","orcid":"https://orcid.org/0009-0002-9320-9382"},"institutions":[{"id":"https://openalex.org/I39333907","display_name":"Yanshan University","ror":"https://ror.org/02txfnf15","country_code":"CN","type":"education","lineage":["https://openalex.org/I39333907"]},{"id":"https://openalex.org/I4210101931","display_name":"HBIS (China)","ror":"https://ror.org/00zjpfj13","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210101931"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rong Ren","raw_affiliation_strings":["Hebei Port Group Co., Ltd, Tang Shan 063200, Hebei, P. R. China","School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, Hebei, P. R. China"],"affiliations":[{"raw_affiliation_string":"Hebei Port Group Co., Ltd, Tang Shan 063200, Hebei, P. R. China","institution_ids":["https://openalex.org/I4210101931"]},{"raw_affiliation_string":"School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, Hebei, P. R. China","institution_ids":["https://openalex.org/I39333907"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014737936","display_name":"Zhen Wen","orcid":"https://orcid.org/0000-0002-4193-8690"},"institutions":[{"id":"https://openalex.org/I39333907","display_name":"Yanshan University","ror":"https://ror.org/02txfnf15","country_code":"CN","type":"education","lineage":["https://openalex.org/I39333907"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Wen","raw_affiliation_strings":["School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, Hebei, P. R. China","The Key Laboratory of Software Engineering, Yanshan University, Qinhuangdao 066004, Hebei, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, Hebei, P. R. China","institution_ids":["https://openalex.org/I39333907"]},{"raw_affiliation_string":"The Key Laboratory of Software Engineering, Yanshan University, Qinhuangdao 066004, Hebei, P. R. China","institution_ids":["https://openalex.org/I39333907"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100743351","display_name":"Qian Wang","orcid":"https://orcid.org/0000-0001-7159-1424"},"institutions":[{"id":"https://openalex.org/I39333907","display_name":"Yanshan University","ror":"https://ror.org/02txfnf15","country_code":"CN","type":"education","lineage":["https://openalex.org/I39333907"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Wang","raw_affiliation_strings":["School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, Hebei, P. R. China","The Key Laboratory of Software Engineering, Yanshan University, Qinhuangdao 066004, Hebei, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, Hebei, P. R. China","institution_ids":["https://openalex.org/I39333907"]},{"raw_affiliation_string":"The Key Laboratory of Software Engineering, Yanshan University, Qinhuangdao 066004, Hebei, P. R. China","institution_ids":["https://openalex.org/I39333907"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100673338"],"corresponding_institution_ids":["https://openalex.org/I39333907"],"apc_list":null,"apc_paid":null,"fwci":0.3735,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.51442951,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"34","issue":"07","first_page":"1173","last_page":"1197"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9800000190734863,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9497219324111938},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7322116494178772},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.5170105695724487},{"id":"https://openalex.org/keywords/precision-and-recall","display_name":"Precision and recall","score":0.5058400630950928},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4828358292579651},{"id":"https://openalex.org/keywords/recall-rate","display_name":"Recall rate","score":0.4752216935157776},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.47324424982070923},{"id":"https://openalex.org/keywords/recall","display_name":"Recall","score":0.43471062183380127},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.42731714248657227},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4226074814796448},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4093208611011505},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3647347092628479},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3365980386734009},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3338441848754883},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17693686485290527}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9497219324111938},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7322116494178772},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.5170105695724487},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.5058400630950928},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4828358292579651},{"id":"https://openalex.org/C2987098735","wikidata":"https://www.wikidata.org/wiki/Q3808900","display_name":"Recall rate","level":2,"score":0.4752216935157776},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.47324424982070923},{"id":"https://openalex.org/C100660578","wikidata":"https://www.wikidata.org/wiki/Q18733","display_name":"Recall","level":2,"score":0.43471062183380127},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42731714248657227},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4226074814796448},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4093208611011505},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3647347092628479},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3365980386734009},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3338441848754883},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17693686485290527},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0218194024500256","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218194024500256","pdf_url":null,"source":{"id":"https://openalex.org/S131442419","display_name":"International Journal of Software Engineering and Knowledge Engineering","issn_l":"0218-1940","issn":["0218-1940","1793-6403"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Software Engineering and Knowledge Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4822674993","display_name":null,"funder_award_id":"F2022203089","funder_id":"https://openalex.org/F4320322163","funder_display_name":"Natural Science Foundation of Hebei Province"},{"id":"https://openalex.org/G7719504569","display_name":null,"funder_award_id":"F2022203026","funder_id":"https://openalex.org/F4320322163","funder_display_name":"Natural Science Foundation of Hebei Province"},{"id":"https://openalex.org/G8357833378","display_name":null,"funder_award_id":"62376240","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322163","display_name":"Natural Science Foundation of Hebei Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2021436318","https://openalex.org/W2050855115","https://openalex.org/W2065311994","https://openalex.org/W2087211161","https://openalex.org/W2165698076","https://openalex.org/W2194775991","https://openalex.org/W2618530766","https://openalex.org/W2752241832","https://openalex.org/W2789580363","https://openalex.org/W2946483985","https://openalex.org/W2998010923","https://openalex.org/W2998961572","https://openalex.org/W3021632667","https://openalex.org/W3034897363","https://openalex.org/W3038549562","https://openalex.org/W3093538749","https://openalex.org/W3099388751","https://openalex.org/W3137440318","https://openalex.org/W3181247433","https://openalex.org/W3215108294","https://openalex.org/W4254134390","https://openalex.org/W4306154842","https://openalex.org/W4306931429"],"related_works":["https://openalex.org/W2358294942","https://openalex.org/W2388600609","https://openalex.org/W1996359983","https://openalex.org/W4283736679","https://openalex.org/W2601891598","https://openalex.org/W4367460280","https://openalex.org/W3214249595","https://openalex.org/W2130086496","https://openalex.org/W2121569490","https://openalex.org/W2352065863"],"abstract_inverted_index":{"Timely":[0],"detection":[1,43,52,105,132,194,198],"of":[2,25,41,112,147,168,200],"self-replicating":[3],"malware":[4,26,51,72,77,89,113,138,201],"in":[5,69,166,177,202],"the":[6,39,65,103,110,124,130,192,197,221],"high":[7],"market":[8],"share":[9],"Windows":[10,50],"operating":[11],"system":[12],"can":[13],"effectively":[14],"prevent":[15],"personal":[16],"or":[17],"corporate":[18],"financial":[19],"losses.":[20],"The":[21,158,211],"form":[22],"and":[23,59,67,79,139,156,179,183,204,220],"characteristics":[24],"are":[27],"constantly":[28],"evolving,":[29],"leading":[30],"to":[31,63,86,101,108,135,209],"a":[32,49,144],"concept":[33,114],"drift":[34],"issue":[35,111],"that":[36,161],"gradually":[37],"decreases":[38],"effectiveness":[40],"traditional":[42],"methods.":[44],"Therefore,":[45],"we":[46],"propose":[47],"WinMDet,":[48],"method":[53],"based":[54],"on":[55],"malicious":[56,83,98],"tendency":[57,84,99],"image":[58],"ResNet":[60],"algorithm.":[61],"First,":[62],"tackle":[64],"complexity":[66],"difficulty":[68],"accurately":[70],"characterizing":[71],"features,":[73],"WinMDet":[74,94,116,148,162],"retains":[75],"detailed":[76],"features":[78],"encodes":[80],"them":[81],"into":[82],"images":[85,100],"better":[87],"describe":[88],"across":[90],"different":[91],"periods.":[92],"Secondly,":[93],"utilizes":[95],"previously":[96],"generated":[97],"train":[102],"initial":[104,131,193],"model.":[106],"Then,":[107],"alleviate":[109],"drift,":[115],"employs":[117],"Local":[118],"Maximum":[119],"Mean":[120],"Discrepancy":[121],"(LMMD)":[122],"as":[123,153],"criterion":[125],"for":[126],"model":[127,195],"transfer,":[128],"enhancing":[129],"model\u2019s":[133],"ability":[134],"distinguish":[136],"between":[137],"benign":[140],"software.":[141],"We":[142],"conducted":[143],"comprehensive":[145],"evaluation":[146],"using":[149],"common":[150],"metrics":[151],"such":[152],"accuracy,":[154,169],"precision":[155,178],"recall.":[157],"results":[159],"indicate":[160],"performs":[163],"remarkably":[164],"well":[165],"terms":[167],"exceeding":[170],"82%.":[171],"Additionally,":[172],"significant":[173],"improvements":[174],"were":[175],"observed":[176],"recall,":[180],"surpassing":[181],"82.42%":[182],"82.06%,":[184],"respectively.":[185],"After":[186],"employing":[187],"our":[188],"LMMD-based":[189],"transfer":[190],"method,":[191],"improved":[196],"accuracy":[199],"2021":[203],"2022":[205],"by":[206,216,226],"approximately":[207],"4.22%":[208],"8.06%.":[210],"false":[212,222],"negative":[213],"rate":[214,224],"decreased":[215,225],"at":[217,227],"most":[218,228],"4.34%,":[219],"positive":[223],"4.61%.":[229]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
