{"id":"https://openalex.org/W3210424595","doi":"https://doi.org/10.1145/3459637.3482400","title":"Unsupervised Domain Adaptation for Static Malware Detection based on Gradient Boosting Trees","display_name":"Unsupervised Domain Adaptation for Static Malware Detection based on Gradient Boosting Trees","publication_year":2021,"publication_date":"2021-10-26","ids":{"openalex":"https://openalex.org/W3210424595","doi":"https://doi.org/10.1145/3459637.3482400","mag":"3210424595"},"language":"en","primary_location":{"id":"doi:10.1145/3459637.3482400","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3459637.3482400","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3459637.3482400","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th ACM International Conference on Information &amp; Knowledge Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3459637.3482400","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022380828","display_name":"Panpan Qi","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Panpan Qi","raw_affiliation_strings":["National University of Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100391659","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0001-5367-7056"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["National University of Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008764857","display_name":"Lei Zhu","orcid":"https://orcid.org/0000-0002-9193-8234"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Lei Zhu","raw_affiliation_strings":["National University of Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110918847","display_name":"See Kiong Ng","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"See Kiong Ng","raw_affiliation_strings":["National University of Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022380828"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":0.8158,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.78650449,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1457","last_page":"1466"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8697384595870972},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.841877818107605},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7093808054924011},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.6984220743179321},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6669059991836548},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5260065793991089},{"id":"https://openalex.org/keywords/domain-adaptation","display_name":"Domain adaptation","score":0.5101199746131897},{"id":"https://openalex.org/keywords/weighting","display_name":"Weighting","score":0.45974570512771606},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.43918493390083313},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.4243372082710266},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3807227611541748},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.12683984637260437}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8697384595870972},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.841877818107605},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7093808054924011},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.6984220743179321},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6669059991836548},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5260065793991089},{"id":"https://openalex.org/C2776434776","wikidata":"https://www.wikidata.org/wiki/Q19246213","display_name":"Domain adaptation","level":3,"score":0.5101199746131897},{"id":"https://openalex.org/C183115368","wikidata":"https://www.wikidata.org/wiki/Q856577","display_name":"Weighting","level":2,"score":0.45974570512771606},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.43918493390083313},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.4243372082710266},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3807227611541748},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.12683984637260437},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C126838900","wikidata":"https://www.wikidata.org/wiki/Q77604","display_name":"Radiology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3459637.3482400","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3459637.3482400","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3459637.3482400","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th ACM International Conference on Information &amp; Knowledge Management","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3459637.3482400","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3459637.3482400","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3459637.3482400","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th ACM International Conference on Information &amp; Knowledge Management","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7300000190734863}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3210424595.pdf","grobid_xml":"https://content.openalex.org/works/W3210424595.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W1678356000","https://openalex.org/W1893133781","https://openalex.org/W2035956549","https://openalex.org/W2076618162","https://openalex.org/W2102419107","https://openalex.org/W2104068492","https://openalex.org/W2115328185","https://openalex.org/W2122838776","https://openalex.org/W2149933564","https://openalex.org/W2153929442","https://openalex.org/W2157762168","https://openalex.org/W2170612786","https://openalex.org/W2229387242","https://openalex.org/W2467286621","https://openalex.org/W2593768305","https://openalex.org/W2611292810","https://openalex.org/W2768348081","https://openalex.org/W2811380766","https://openalex.org/W2940934424","https://openalex.org/W2963240485","https://openalex.org/W2963826681","https://openalex.org/W2964288524","https://openalex.org/W2997654197","https://openalex.org/W2998010923","https://openalex.org/W2998083796","https://openalex.org/W3006815328","https://openalex.org/W3007501395"],"related_works":["https://openalex.org/W2180954594","https://openalex.org/W2052835778","https://openalex.org/W2097492617","https://openalex.org/W2049003611","https://openalex.org/W2125652721","https://openalex.org/W2756978580","https://openalex.org/W3108206494","https://openalex.org/W2739726746","https://openalex.org/W4242380336","https://openalex.org/W2141272333"],"abstract_inverted_index":{"Static":[0],"malware":[1,8,48,52,59,186],"detection":[2],"is":[3,21],"important":[4],"for":[5,11,25,47,94,106,120,165],"protection":[6],"against":[7],"by":[9],"allowing":[10],"malicious":[12],"files":[13],"to":[14,18,56,70,72,124,140,172],"be":[15],"detected":[16],"prior":[17],"execution.":[19],"It":[20],"also":[22],"especially":[23],"suitable":[24],"machine":[26,95],"learning-based":[27],"approaches.":[28],"Recently,":[29],"gradient":[30],"boosting":[31,170],"decision":[32],"trees":[33],"(GBDT)":[34],"models,":[35],"e.g.,":[36],"LightGBM":[37],"(a":[38],"popular":[39],"implementation":[40],"of":[41,177,191],"GBDT),":[42],"have":[43,91],"shown":[44],"outstanding":[45],"performance":[46,132],"detection.":[49],"However,":[50,102],"as":[51],"programs":[53],"are":[54],"known":[55],"evolve":[57],"rapidly,":[58],"classification":[60],"models":[61,97],"trained":[62],"on":[63,183],"the":[64,73,77,82,116,135,143,151,174,189],"(source)":[65],"training":[66,152],"data":[67,84],"often":[68],"fail":[69],"generalize":[71],"target":[74,136,145,180],"domain,":[75],"i.e.,":[76],"deployed":[78],"environment.":[79],"To":[80],"handle":[81],"underlying":[83],"distribution":[85],"drifts,":[86],"unsupervised":[87,103,121],"domain":[88,104,122],"adaptation":[89,105,123],"techniques":[90],"been":[92],"proposed":[93,193],"learning":[96,100,118],"including":[98],"deep":[99],"models.":[101],"GBDT":[107,126,164],"has":[108],"remained":[109],"challenging.":[110],"In":[111,138],"this":[112],"paper,":[113],"we":[114,147],"adapt":[115],"adversarial":[117],"framework":[119],"enable":[125],"learn":[127],"domain-invariant":[128],"features":[129],"and":[130],"alleviate":[131],"degradation":[133],"in":[134,168],"domain.":[137],"addition,":[139],"fully":[141],"exploit":[142],"unlabelled":[144],"data,":[146],"merge":[148],"them":[149],"into":[150,163],"dataset":[153],"after":[154],"pseudo-labelling.":[155],"We":[156],"propose":[157],"a":[158],"new":[159],"weighting":[160],"scheme":[161],"integrated":[162],"sampling":[166],"instances":[167],"each":[169],"round":[171],"reduce":[173],"negative":[175],"impact":[176],"wrongly":[178],"labelled":[179],"instances.":[181],"Experiments":[182],"two":[184],"large":[185],"datasets":[187],"demonstrate":[188],"superiority":[190],"our":[192],"method.":[194]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
