{"id":"https://openalex.org/W4396879103","doi":"https://doi.org/10.1145/3647444.3652455","title":"A Lightweight Generative Adversarial Network for Imbalanced Malware Image Classification","display_name":"A Lightweight Generative Adversarial Network for Imbalanced Malware Image Classification","publication_year":2023,"publication_date":"2023-11-23","ids":{"openalex":"https://openalex.org/W4396879103","doi":"https://doi.org/10.1145/3647444.3652455"},"language":"en","primary_location":{"id":"doi:10.1145/3647444.3652455","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3647444.3652455","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3647444.3652455","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3647444.3652455","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086102702","display_name":"Kwok Tai Chui","orcid":"https://orcid.org/0000-0001-7992-9901"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kwok Tai Chui","raw_affiliation_strings":["School of Science and Technology, Hong Kong Metropolitan University, China"],"affiliations":[{"raw_affiliation_string":"School of Science and Technology, Hong Kong Metropolitan University, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5086102702"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.61,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.68767603,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7921401858329773},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7610986232757568},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7191115021705627},{"id":"https://openalex.org/keywords/generative-adversarial-network","display_name":"Generative adversarial network","score":0.6455209255218506},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.6236110329627991},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6206660866737366},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.5857700705528259},{"id":"https://openalex.org/keywords/contextual-image-classification","display_name":"Contextual image classification","score":0.5704813599586487},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4467952251434326},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3558804988861084},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13036349415779114}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7921401858329773},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7610986232757568},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7191115021705627},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.6455209255218506},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.6236110329627991},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6206660866737366},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.5857700705528259},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.5704813599586487},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4467952251434326},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3558804988861084},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13036349415779114}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3647444.3652455","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3647444.3652455","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3647444.3652455","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3647444.3652455","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3647444.3652455","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3647444.3652455","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4396879103.pdf"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W1504573138","https://openalex.org/W2186222003","https://openalex.org/W2555483129","https://openalex.org/W2962117360","https://openalex.org/W3112778273","https://openalex.org/W3123084659","https://openalex.org/W3156834475","https://openalex.org/W3185956134","https://openalex.org/W3203175689","https://openalex.org/W3208789089","https://openalex.org/W4200319377","https://openalex.org/W4200320221","https://openalex.org/W4206231533","https://openalex.org/W4220729157","https://openalex.org/W4246674854","https://openalex.org/W4284976255","https://openalex.org/W4296466829","https://openalex.org/W4306954497","https://openalex.org/W4311169516","https://openalex.org/W4312250728","https://openalex.org/W4319071268","https://openalex.org/W4320490818","https://openalex.org/W4320495408","https://openalex.org/W4362641139","https://openalex.org/W4387164353"],"related_works":["https://openalex.org/W2888032422","https://openalex.org/W3156763702","https://openalex.org/W4385421777","https://openalex.org/W4377980832","https://openalex.org/W2897769091","https://openalex.org/W2845413374","https://openalex.org/W3005996785","https://openalex.org/W4297411772","https://openalex.org/W4235873501","https://openalex.org/W2972144487"],"abstract_inverted_index":{"Classifying":[0],"malware":[1,15,104],"images":[2,16],"is":[3,17,37,50],"important":[4],"in":[5,43,58,107],"cybersecurity.":[6],"The":[7],"nature":[8],"of":[9,14,25,86,103],"different":[10],"families":[11],"and":[12,83,112,121],"classes":[13,31],"imbalanced,":[18],"which":[19,44],"leads":[20],"to":[21,39,52,93,99],"a":[22,45,74,84,95],"challenging":[23],"issue":[24],"biased":[26,67],"classification,":[27],"where":[28],"the":[29,33,70,101,118],"majority":[30,71],"dominate":[32],"model's":[34,119],"performance.":[35],"Attention":[36],"drawn":[38],"generative":[40,46],"artificial":[41],"intelligence,":[42],"adversarial":[47],"network":[48],"(GAN)":[49],"used":[51],"synthesize":[53],"more":[54,62],"training":[55,124],"samples":[56],"(particularly":[57],"minority":[59],"classes).":[60],"A":[61],"balanced":[63],"dataset":[64],"can":[65],"reduce":[66],"classification":[68,106],"towards":[69],"class.":[72],"However,":[73],"robust":[75],"GAN":[76,97],"model":[77,98],"usually":[78],"requires":[79],"high":[80],"computing":[81],"power":[82],"lot":[85],"epochs.":[87],"In":[88],"this":[89],"paper,":[90],"we":[91],"aim":[92],"design":[94],"lightweight":[96],"enhance":[100],"performance":[102],"image":[105],"imbalanced":[108],"datasets.":[109],"Performance":[110],"evaluation":[111],"analysis":[113],"show":[114],"that":[115],"it":[116],"enhances":[117],"accuracy":[120],"reduces":[122],"its":[123],"time.":[125],"Future":[126],"research":[127],"directions":[128],"are":[129],"also":[130],"shared.":[131]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2026-01-21T23:30:37.877113","created_date":"2025-10-10T00:00:00"}
