{"id":"https://openalex.org/W3111614445","doi":"https://doi.org/10.1145/3427228.3427268","title":"StegoNet: Turn Deep Neural Network into a Stegomalware","display_name":"StegoNet: Turn Deep Neural Network into a Stegomalware","publication_year":2020,"publication_date":"2020-12-07","ids":{"openalex":"https://openalex.org/W3111614445","doi":"https://doi.org/10.1145/3427228.3427268","mag":"3111614445"},"language":"en","primary_location":{"id":"doi:10.1145/3427228.3427268","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3427228.3427268","pdf_url":null,"source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101757491","display_name":"Tao Liu","orcid":"https://orcid.org/0009-0005-8875-6711"},"institutions":[{"id":"https://openalex.org/I2276074","display_name":"Lawrence Technological University","ror":"https://ror.org/04d52ej85","country_code":"US","type":"education","lineage":["https://openalex.org/I2276074"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tao Liu","raw_affiliation_strings":["Lawrence Technological University, United States of America"],"affiliations":[{"raw_affiliation_string":"Lawrence Technological University, United States of America","institution_ids":["https://openalex.org/I2276074"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100323067","display_name":"Zihao Liu","orcid":"https://orcid.org/0000-0001-5306-6626"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zihao Liu","raw_affiliation_strings":["Florida International University"],"affiliations":[{"raw_affiliation_string":"Florida International University","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100666053","display_name":"Qi Liu","orcid":"https://orcid.org/0000-0002-2877-4900"},"institutions":[{"id":"https://openalex.org/I186143895","display_name":"Lehigh University","ror":"https://ror.org/012afjb06","country_code":"US","type":"education","lineage":["https://openalex.org/I186143895"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qi Liu","raw_affiliation_strings":["Lehigh University"],"affiliations":[{"raw_affiliation_string":"Lehigh University","institution_ids":["https://openalex.org/I186143895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067226050","display_name":"Wujie Wen","orcid":"https://orcid.org/0000-0003-0011-0675"},"institutions":[{"id":"https://openalex.org/I186143895","display_name":"Lehigh University","ror":"https://ror.org/012afjb06","country_code":"US","type":"education","lineage":["https://openalex.org/I186143895"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wujie Wen","raw_affiliation_strings":["Lehigh University"],"affiliations":[{"raw_affiliation_string":"Lehigh University","institution_ids":["https://openalex.org/I186143895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035679293","display_name":"Wenyao Xu","orcid":"https://orcid.org/0000-0001-6444-9411"},"institutions":[{"id":"https://openalex.org/I115441956","display_name":"Buffalo State University","ror":"https://ror.org/05ms04m92","country_code":"US","type":"education","lineage":["https://openalex.org/I115441956"]},{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenyao Xu","raw_affiliation_strings":["SUNY Buffalo, United States of America"],"affiliations":[{"raw_affiliation_string":"SUNY Buffalo, United States of America","institution_ids":["https://openalex.org/I115441956","https://openalex.org/I63190737"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100351548","display_name":"Ming Li","orcid":"https://orcid.org/0009-0008-3991-966X"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ming Li","raw_affiliation_strings":["University of Arizona, United States of America"],"affiliations":[{"raw_affiliation_string":"University of Arizona, United States of America","institution_ids":["https://openalex.org/I138006243"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101757491"],"corresponding_institution_ids":["https://openalex.org/I2276074"],"apc_list":null,"apc_paid":null,"fwci":1.765,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.87502191,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"928","last_page":"938"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7274032235145569},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.6516804695129395},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.626380205154419},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.594254195690155},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5687327980995178},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5632585287094116},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4108569324016571},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38580620288848877},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.34311044216156006},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2657487094402313},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11262160539627075}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7274032235145569},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.6516804695129395},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.626380205154419},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.594254195690155},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5687327980995178},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5632585287094116},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4108569324016571},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38580620288848877},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.34311044216156006},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2657487094402313},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11262160539627075},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3427228.3427268","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3427228.3427268","pdf_url":null,"source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W347692644","https://openalex.org/W1541986238","https://openalex.org/W1663973292","https://openalex.org/W1686810756","https://openalex.org/W1945046319","https://openalex.org/W2028197392","https://openalex.org/W2075652908","https://openalex.org/W2097117768","https://openalex.org/W2100495367","https://openalex.org/W2102511552","https://openalex.org/W2108598243","https://openalex.org/W2139438093","https://openalex.org/W2163605009","https://openalex.org/W2180612164","https://openalex.org/W2183341477","https://openalex.org/W2194775991","https://openalex.org/W2279098554","https://openalex.org/W2291390035","https://openalex.org/W2521090836","https://openalex.org/W2612445135","https://openalex.org/W2753783305","https://openalex.org/W2757528734","https://openalex.org/W2772825438","https://openalex.org/W2798302089","https://openalex.org/W2919115771","https://openalex.org/W2962763344","https://openalex.org/W2963207607","https://openalex.org/W2963446712","https://openalex.org/W2964299589","https://openalex.org/W2991309320","https://openalex.org/W4239092273","https://openalex.org/W4252979261","https://openalex.org/W6696876242"],"related_works":["https://openalex.org/W2883256816","https://openalex.org/W2171408034","https://openalex.org/W3003320923","https://openalex.org/W2106140982","https://openalex.org/W2152313554","https://openalex.org/W2064303750","https://openalex.org/W4285042611","https://openalex.org/W1509300825","https://openalex.org/W2154044472","https://openalex.org/W4210772589"],"abstract_inverted_index":{"Deep":[0],"Neural":[1],"Networks":[2],"(DNNs)":[3],"are":[4,17,134],"now":[5],"presenting":[6],"human-level":[7],"performance":[8],"on":[9,196,206],"many":[10],"real-world":[11],"applications,":[12],"and":[13,20,50,93,130,143,161,176,204,215,218,228],"DNN-based":[14],"intelligent":[15],"services":[16],"becoming":[18],"more":[19,21],"popular":[22],"across":[23],"all":[24],"aspects":[25],"of":[26,47,108,115,118,168,210,220,230],"our":[27],"lives.":[28],"Unfortunately,":[29],"the":[30,45,94,99,193,207,216,221,226],"ever-increasing":[31],"DNN":[32,51,67,104],"service":[33,88],"implies":[34],"a":[35,69,81,116,166],"dangerous":[36],"feature":[37],"which":[38,112],"has":[39],"not":[40],"yet":[41],"been":[42],"well":[43,224],"studied\u2013allowing":[44],"marriage":[46],"existing":[48],"malware":[49],"model":[52,78,141,152],"for":[53,136,148],"any":[54],"pre-defined":[55],"malicious":[56],"purpose.":[57],"In":[58],"this":[59],"paper,":[60],"we":[61],"comprehensively":[62],"investigate":[63],"how":[64],"to":[65,98,180],"turn":[66],"into":[68],"new":[70],"breed":[71],"evasive":[72],"self-contained":[73],"stegomalware,":[74],"namely":[75],"StegoNet,":[76],"using":[77],"parameter":[79,132],"as":[80],"novel":[82],"payload":[83,109,212],"injection":[84,110,213],"channel,":[85],"with":[86],"no":[87],"quality":[89],"degradation":[90],"(i.e.":[91],"accuracy)":[92],"triggering":[95,169,222],"event":[96],"connected":[97],"physical":[100,185],"world":[101],"by":[102,183],"specified":[103],"inputs.":[105],"A":[106],"series":[107],"techniques":[111,170],"take":[113],"advantage":[114],"variety":[117],"unique":[119],"neural":[120],"network":[121],"natures":[122],"like":[123,171],"complex":[124],"structure,":[125],"high":[126],"error":[127],"resilience":[128,157],"capability":[129],"huge":[131],"size,":[133],"developed":[135],"both":[137],"uncompressed":[138],"models":[139,146],"(with":[140],"redundancy)":[142],"deeply":[144],"compressed":[145],"tailored":[147],"resource-limited":[149],"devices":[150],"(no":[151],"redundancy),":[153],"including":[154],"LSB":[155],"substitution,":[156],"training,":[158],"value":[159],"mapping,":[160],"sign-mapping.":[162],"We":[163,191],"also":[164],"proposed":[165,211],"set":[167],"logits":[172],"trigger,":[173],"rank":[174,178],"trigger":[175,179,181],"fine-tuned":[177],"StegoNet":[182,194],"specific":[184],"events":[186],"under":[187],"realistic":[188],"environment":[189],"variations.":[190],"implement":[192],"prototype":[195],"Nvidia":[197],"Jetson":[198],"TX2":[199],"testbed.":[200],"Extensive":[201],"experimental":[202],"results":[203],"discussions":[205],"evasiveness,":[208],"integrity":[209],"techniques,":[214,223],"reliability":[217],"sensitivity":[219],"demonstrate":[225],"feasibility":[227],"practicality":[229],"StegoNet.":[231]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
