{"id":"https://openalex.org/W4399418931","doi":"https://doi.org/10.1145/3651671.3651735","title":"Building Visual Malware Dataset using VirusShare Data and Comparing Machine Learning Baseline Model to CoAtNet for Malware Classification","display_name":"Building Visual Malware Dataset using VirusShare Data and Comparing Machine Learning Baseline Model to CoAtNet for Malware Classification","publication_year":2024,"publication_date":"2024-02-02","ids":{"openalex":"https://openalex.org/W4399418931","doi":"https://doi.org/10.1145/3651671.3651735"},"language":"en","primary_location":{"id":"doi:10.1145/3651671.3651735","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3651671.3651735","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3651671.3651735","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 16th International Conference on Machine Learning and Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3651671.3651735","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035370139","display_name":"Roberto Bruzzese","orcid":"https://orcid.org/0000-0002-5141-337X"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Roberto Bruzzese","raw_affiliation_strings":["INGEGNERIA INFORMATICA, AUTOMATICA E GESTIONALE, La Sapienza University, Italy"],"raw_orcid":"https://orcid.org/0000-0002-5141-337X","affiliations":[{"raw_affiliation_string":"INGEGNERIA INFORMATICA, AUTOMATICA E GESTIONALE, La Sapienza University, Italy","institution_ids":["https://openalex.org/I861853513"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5035370139"],"corresponding_institution_ids":["https://openalex.org/I861853513"],"apc_list":null,"apc_paid":null,"fwci":1.3153,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.79451837,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"185","last_page":"193"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12859","display_name":"Cell Image Analysis Techniques","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1304","display_name":"Biophysics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8924726247787476},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8429000377655029},{"id":"https://openalex.org/keywords/baseline","display_name":"Baseline (sea)","score":0.6987553834915161},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6803632378578186},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6605488061904907},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.5038632750511169},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.44070714712142944},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.41178107261657715},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1331620216369629}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8924726247787476},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8429000377655029},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.6987553834915161},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6803632378578186},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6605488061904907},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.5038632750511169},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.44070714712142944},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41178107261657715},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1331620216369629},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C111368507","wikidata":"https://www.wikidata.org/wiki/Q43518","display_name":"Oceanography","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3651671.3651735","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3651671.3651735","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3651671.3651735","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 16th International Conference on Machine Learning and Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3651671.3651735","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3651671.3651735","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3651671.3651735","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 16th International Conference on Machine Learning and Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.4300000071525574,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4399418931.pdf"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W2043263066","https://openalex.org/W2132886902","https://openalex.org/W2331896832","https://openalex.org/W2514847810","https://openalex.org/W2625739732","https://openalex.org/W2751469117","https://openalex.org/W2769312722","https://openalex.org/W2889100747","https://openalex.org/W2913954081","https://openalex.org/W2963925437","https://openalex.org/W2981413347","https://openalex.org/W2990138404","https://openalex.org/W2991526275","https://openalex.org/W3007032623","https://openalex.org/W3008497156","https://openalex.org/W3027400042","https://openalex.org/W3029868457","https://openalex.org/W3036930808","https://openalex.org/W3082575476","https://openalex.org/W3111237076","https://openalex.org/W3138516171","https://openalex.org/W3156181280","https://openalex.org/W3171087525","https://openalex.org/W3178593045","https://openalex.org/W3179869055","https://openalex.org/W3182984361","https://openalex.org/W3205581468","https://openalex.org/W3208954537","https://openalex.org/W4238151205","https://openalex.org/W4297630076","https://openalex.org/W4298395628","https://openalex.org/W4320235122","https://openalex.org/W4328036754","https://openalex.org/W4396219753","https://openalex.org/W6763367864","https://openalex.org/W6791301604"],"related_works":["https://openalex.org/W2469507153","https://openalex.org/W2008790809","https://openalex.org/W2768892939","https://openalex.org/W3164408430","https://openalex.org/W4285507391","https://openalex.org/W2397240470","https://openalex.org/W2602767565","https://openalex.org/W170652726","https://openalex.org/W2883822334","https://openalex.org/W2134874482"],"abstract_inverted_index":{"The":[0,163],"present":[1],"work":[2,7,28,164],"takes":[3],"inspiration":[4],"from":[5,40],"the":[6,38,60,95,105,111,114,121,131,138,159],"of":[8,66,86,104,113,123,180],"Zihang":[9],"Dai,":[10],"Hanxiao":[11],"Liu,":[12],"Quoc":[13],"V.":[14],"Le,":[15],"Mingxing":[16],"Tan":[17],"at":[18],"Google":[19],"Research,":[20],"Brain":[21],"Team":[22],"about":[23],"CoAtNet":[24,61],".":[25],"In":[26],"that":[27,32],"it":[29,33],"was":[30],"showed":[31],"is":[34,150],"possible":[35],"to":[36,58,62,73,97,109,130,174],"combine":[37],"strengths":[39],"both":[41],"convolution":[42],"and":[43,49,69,89,177],"transformer":[44],"architectures,":[45],"by":[46],"unifying":[47],"convnets":[48],"self-attention":[50],"into":[51],"a":[52,63,74,83,101,124,152,172,175],"machine":[53],"learning":[54],"model.":[55,77,116],"We":[56],"want":[57],"apply":[59],"visual":[64,102,139,184],"dataset":[65,103,126],"malware":[67,106,183],"images":[68,107],"compare":[70],"its":[71],"performances":[72],"baseline":[75],"CNN":[76],"For":[78],"this":[79,167],"reason":[80],"we":[81],"need":[82,153],"data":[84,157],"set":[85],"appropriate":[87],"size":[88],"format.":[90],"From":[91],"these":[92],"needs":[93],"triggers":[94],"requirement":[96],"find":[98],"or":[99],"generate":[100],"capable":[108],"measure":[110],"accuracy":[112],"constructed":[115],"As":[117],"will":[118,127],"be":[119,128],"seen,":[120],"creation":[122],"new":[125],"preferred":[129],"search":[132],"for":[133,154,158],"an":[134,181],"existing":[135],"dataset.":[136,186],"Although":[137],"approach":[140],"has":[141],"already":[142],"been":[143],"extensively":[144],"tested":[145],"in":[146,166],"recent":[147],"years,":[148],"there":[149],"still":[151],"more":[155],"customised":[156],"model":[160],"under":[161],"examination.":[162],"described":[165],"paper":[168],"can":[169],"serve":[170],"as":[171],"guide":[173],"balanced":[176],"dimensioned":[178],"construction":[179],"optimal":[182],"image":[185]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
