{"id":"https://openalex.org/W2896748148","doi":"https://doi.org/10.1145/3207677.3277976","title":"Large-scale Malware Automatic Detection Based On Multiclass Features and Machine Learning","display_name":"Large-scale Malware Automatic Detection Based On Multiclass Features and Machine Learning","publication_year":2018,"publication_date":"2018-10-18","ids":{"openalex":"https://openalex.org/W2896748148","doi":"https://doi.org/10.1145/3207677.3277976","mag":"2896748148"},"language":"en","primary_location":{"id":"doi:10.1145/3207677.3277976","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3207677.3277976","pdf_url":null,"source":{"id":"https://openalex.org/S4306523741","display_name":"Proceedings of the 2nd International Conference on Computer Science and Application Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Computer Science and Application Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100404719","display_name":"Zhiqiang Wang","orcid":"https://orcid.org/0000-0002-1789-8414"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiqiang Wang","raw_affiliation_strings":["Beijing Electronic Science &amp; Technology Institute, Beijing, China and Anhui Province Key Laboratory of Industry Safety and Emergency Technology, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Beijing Electronic Science &amp; Technology Institute, Beijing, China and Anhui Province Key Laboratory of Industry Safety and Emergency Technology, Hefei, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014611666","display_name":"Yao Tang","orcid":"https://orcid.org/0000-0001-7761-4367"},"institutions":[{"id":"https://openalex.org/I1299457549","display_name":"Civil Aviation Administration of China","ror":"https://ror.org/05gfwht30","country_code":"CN","type":"government","lineage":["https://openalex.org/I1299457549","https://openalex.org/I4210127216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yao Tang","raw_affiliation_strings":["Beijing Electronic Science &amp; Technology Institute, Beijing, China and Information Technology Research Base of Civil Aviation Administration of China, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Beijing Electronic Science &amp; Technology Institute, Beijing, China and Information Technology Research Base of Civil Aviation Administration of China, Tianjin, China","institution_ids":["https://openalex.org/I1299457549"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013885739","display_name":"Jing Yao","orcid":"https://orcid.org/0000-0003-1301-9758"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Yao","raw_affiliation_strings":["Beijing Electronic Science &amp; Technology Institute, BeiJing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Electronic Science &amp; Technology Institute, BeiJing, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113931165","display_name":"Rong Qian","orcid":"https://orcid.org/0000-0002-4732-5553"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rong Qian","raw_affiliation_strings":["Beijing Electronic Science &amp; Technology Institute, BeiJing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Electronic Science &amp; Technology Institute, BeiJing, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100459192","display_name":"Zheng Zhang","orcid":"https://orcid.org/0009-0001-1263-8920"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Zhang","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101728918","display_name":"Pingchuan Ma","orcid":"https://orcid.org/0000-0001-7680-2817"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pingchuan Ma","raw_affiliation_strings":["Beijing Electronic Science &amp; Technology Institute, BeiJing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Electronic Science &amp; Technology Institute, BeiJing, China","institution_ids":["https://openalex.org/I202334528"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100404719"],"corresponding_institution_ids":["https://openalex.org/I202334528"],"apc_list":null,"apc_paid":null,"fwci":0.23,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.42380952,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"2017","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9724000096321106,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.889588475227356},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8312855958938599},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7547503709793091},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6868590712547302},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6088261604309082},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.4985694885253906},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.48361411690711975},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4412071704864502},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.4266509711742401},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33404868841171265},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20588448643684387}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.889588475227356},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8312855958938599},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7547503709793091},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6868590712547302},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6088261604309082},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.4985694885253906},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.48361411690711975},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4412071704864502},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.4266509711742401},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33404868841171265},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20588448643684387}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3207677.3277976","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3207677.3277976","pdf_url":null,"source":{"id":"https://openalex.org/S4306523741","display_name":"Proceedings of the 2nd International Conference on Computer Science and Application Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Computer Science and Application Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2010256880","https://openalex.org/W2077278164","https://openalex.org/W2110889728","https://openalex.org/W2125011234","https://openalex.org/W2137644153","https://openalex.org/W2247175430","https://openalex.org/W2313513770","https://openalex.org/W2563758005","https://openalex.org/W2612340813","https://openalex.org/W2620763085","https://openalex.org/W2777119424","https://openalex.org/W2789983203","https://openalex.org/W4256462051"],"related_works":["https://openalex.org/W2717179875","https://openalex.org/W4249118297","https://openalex.org/W2439951656","https://openalex.org/W1573526548","https://openalex.org/W1998188341","https://openalex.org/W4360982091","https://openalex.org/W3176864451","https://openalex.org/W2053632570","https://openalex.org/W3211525895","https://openalex.org/W2187910102"],"abstract_inverted_index":{"In":[0,64],"the1":[1],"modern":[2],"global":[3],"mobile":[4,24,36],"phone":[5],"market,":[6],"Android":[7],"OS":[8],"is":[9,96,113],"firmly":[10],"occupying":[11],"the":[12,16,21,28,62,91,111,118,126,131,136,146,155,166,172,199,207,217,222,228],"first":[13,127],"throne":[14],"with":[15,27],"absolute":[17],"user":[18],"base":[19],"and":[20,26,34,43,82,100,108,144,164,193,215,233],"proportion":[22],"of":[23,30,54,150,210,230],"phones,":[25],"proliferation":[29],"android":[31,137,142,176],"smart":[32],"phones":[33],"other":[35,112],"devices,":[37],"it":[38],"has":[39,171],"also":[40],"attracted":[41],"more":[42,44],"attention":[45],"from":[46],"malware":[47,55,75,107,177],"developers.":[48],"There":[49,85],"are":[50,86,152,182],"a":[51,73],"large":[52],"number":[53],"in":[56,90],"several":[57],"major":[58],"application":[59],"markets":[60],"around":[61],"world.":[63],"order":[65],"to":[66,98,116,122,184,220],"solve":[67],"this":[68,70],"problem,":[69,128,157],"paper":[71],"proposes":[72],"large-scale":[74],"detection":[76,93,208],"system":[77,232],"based":[78],"on":[79],"multiclass":[80],"features":[81,103,132,143,147,192],"machine":[83,161],"learning.":[84],"two":[87],"main":[88],"problems":[89],"traditional":[92],"schemes,":[94],"one":[95],"how":[97,115],"analyze":[99],"extract":[101,190],"effectively":[102],"which":[104,226],"can":[105,134],"distinguish":[106],"benign":[109],"software,":[110],"that":[114,133,170],"select":[117,130,165,194],"most":[119,167,200],"suitable":[120,168,201],"algorithm":[121,169,202],"detect":[123],"malware.":[124],"For":[125,154],"we":[129,158,189],"reflect":[135],"software's":[138],"maliciousness":[139],"by":[140,205],"extracting":[141],"removing":[145],"whose":[148],"degree":[149],"distinction":[151],"less.":[153],"second":[156],"compare":[159],"seven":[160],"learning":[162],"algorithms":[163],"highest":[173,223],"accuracy":[174],"for":[175],"identification.":[178],"Afterwards,":[179],"many":[180],"experiments":[181],"done":[183],"verify":[185],"our":[186,231],"solutions.":[187],"First,":[188],"234":[191],"76":[195],"features.":[196],"Second,":[197],"selecting":[198],"\"ensemble":[203],"learning\"":[204],"comparing":[206],"accuracies":[209],"7":[211],"algorithms,":[212],"then":[213],"adjusting":[214],"optimizing":[216],"related":[218],"parameter":[219],"achieve":[221],"accuracy,":[224],"99.73%,":[225],"proves":[227],"effectiveness":[229],"scheme.":[234]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
