{"id":"https://openalex.org/W4214591891","doi":"https://doi.org/10.1145/3488933.3489003","title":"A Deep Learning Malicious Code Classification Method Combined with Texture Feature Extraction GSINET","display_name":"A Deep Learning Malicious Code Classification Method Combined with Texture Feature Extraction GSINET","publication_year":2021,"publication_date":"2021-09-24","ids":{"openalex":"https://openalex.org/W4214591891","doi":"https://doi.org/10.1145/3488933.3489003"},"language":"en","primary_location":{"id":"doi:10.1145/3488933.3489003","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3488933.3489003","pdf_url":null,"source":{"id":"https://openalex.org/S4363608564","display_name":"2021 4th International Conference on Artificial Intelligence and Pattern Recognition","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 4th International Conference on Artificial Intelligence and Pattern Recognition","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101506669","display_name":"Pengfei Wei","orcid":"https://orcid.org/0000-0001-8093-0803"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Pengfei Wei","raw_affiliation_strings":["School of Science and Technology, Xi'an University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"School of Science and Technology, Xi'an University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100343319","display_name":"Yong Zhang","orcid":"https://orcid.org/0000-0001-9253-4330"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Zhang","raw_affiliation_strings":["School of Computer Science and Technology, Xi'an University of Posts and Telecommunications, China and Industry School of Modern Post, Xi'an University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi'an University of Posts and Telecommunications, China and Industry School of Modern Post, Xi'an University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083177507","display_name":"Ling Yue","orcid":"https://orcid.org/0000-0001-6476-0189"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ling Yue","raw_affiliation_strings":["School of Science and Technology, Xi'an University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"School of Science and Technology, Xi'an University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056050667","display_name":"Jialu Xu","orcid":"https://orcid.org/0000-0002-7745-2000"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jialu Xu","raw_affiliation_strings":["School of Electronic Engineering, Xi'an University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Xi'an University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I4210136859"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101506669"],"corresponding_institution_ids":["https://openalex.org/I4210136859"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23304231,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"41","issue":null,"first_page":"83","last_page":"90"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9768000245094299,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8203442096710205},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7210221290588379},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.7191692590713501},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5864139199256897},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5680940747261047},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5308619141578674},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4392316937446594},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4197113811969757},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.41261914372444153}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8203442096710205},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7210221290588379},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.7191692590713501},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5864139199256897},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5680940747261047},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5308619141578674},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4392316937446594},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4197113811969757},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.41261914372444153},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3488933.3489003","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3488933.3489003","pdf_url":null,"source":{"id":"https://openalex.org/S4363608564","display_name":"2021 4th International Conference on Artificial Intelligence and Pattern Recognition","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 4th International Conference on Artificial Intelligence and Pattern Recognition","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.550000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2790918693","https://openalex.org/W2796394805","https://openalex.org/W6749245467"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W4226493464","https://openalex.org/W4312417841","https://openalex.org/W3133861977","https://openalex.org/W2951211570","https://openalex.org/W3103566983","https://openalex.org/W3029198973","https://openalex.org/W2388600609"],"abstract_inverted_index":{"In":[0,144],"recent":[1],"years,":[2],"malicious":[3,20,40,80,149,163],"code":[4,21,41,81,150,164],"attacks":[5],"in":[6],"the":[7,58,109,116,127,131,137,146,160,168],"field":[8],"of":[9,60,118,162],"cyberspace":[10],"security":[11],"have":[12,24],"become":[13],"more":[14,16],"and":[15,32,64,78,83,101,136,166],"serious.":[17],"The":[18],"traditional":[19,110],"detection":[22,26,84,129,165],"methods":[23],"low":[25],"rate,":[27],"incomplete":[28],"feature":[29,47,70,156],"extraction,":[30],"time-consuming":[31],"laborious.":[33],"This":[34],"paper":[35],"proposes":[36],"a":[37,79],"deep":[38,147],"learning":[39,148],"classification":[42,82,102,151],"method":[43,120,152],"combined":[44,113,153],"with":[45,108,114,126,154],"texture":[46,76,155],"extraction.":[48],"By":[49],"pixelating":[50],"binary":[51],"executable":[52],"files":[53],"into":[54],"gray":[55,86],"images,":[56],"on":[57,94],"basis":[59],"ensuring":[61],"data":[62,65],"balance":[63],"accuracy,":[66],"speed":[67],"up":[68],"robust":[69],"(SURF)":[71],"is":[72,91,134,141],"used":[73],"to":[74],"extract":[75],"features,":[77],"model":[85,112],"scale":[87],"image":[88],"network":[89,97],"(GSINet)":[90],"constructed":[92],"based":[93],"convolution":[95],"neural":[96],"(CNN)":[98],"for":[99],"training":[100],"detection.":[103],"Experiments":[104],"show":[105],"that":[106],"compared":[107],"bag-of-words":[111],"classifiers,":[115],"accuracy":[117,132,161],"this":[119],"has":[121],"increased":[122],"by":[123],"13.3%;":[124],"Compared":[125],"existing":[128],"methods,":[130],"rate":[133,140],"99.0%,":[135],"false":[138,169],"positive":[139,170],"only":[142],"1%.":[143],"conclusion,":[145],"extraction":[157],"effectively":[158],"improves":[159],"reduces":[167],"rate.":[171]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
