{"id":"https://openalex.org/W4385299222","doi":"https://doi.org/10.1145/3603781.3604217","title":"Generation of Adversarial Malware Based on Genetic Algorithm and Instruction Replacement","display_name":"Generation of Adversarial Malware Based on Genetic Algorithm and Instruction Replacement","publication_year":2023,"publication_date":"2023-05-26","ids":{"openalex":"https://openalex.org/W4385299222","doi":"https://doi.org/10.1145/3603781.3604217"},"language":"en","primary_location":{"id":"doi:10.1145/3603781.3604217","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3603781.3604217","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102836589","display_name":"Siyi Pan","orcid":"https://orcid.org/0000-0001-8376-3836"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Siyi Pan","raw_affiliation_strings":["College of Information Science and Technology, Jinan University, China"],"raw_orcid":"https://orcid.org/0000-0001-8376-3836","affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Jinan University, China","institution_ids":["https://openalex.org/I34949971","https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114069894","display_name":"Aoxiang Sun","orcid":"https://orcid.org/0009-0000-1150-080X"},"institutions":[{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]},{"id":"https://openalex.org/I4210136497","display_name":"Jilin Medical University","ror":"https://ror.org/03mzw7781","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136497"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Aoxiang Sun","raw_affiliation_strings":["College of Information and Computational Science, Jilin University, China"],"raw_orcid":"https://orcid.org/0009-0000-1150-080X","affiliations":[{"raw_affiliation_string":"College of Information and Computational Science, Jilin University, China","institution_ids":["https://openalex.org/I4210136497","https://openalex.org/I194450716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038733147","display_name":"Yu Li Xu","orcid":"https://orcid.org/0009-0006-2879-3438"},"institutions":[{"id":"https://openalex.org/I4210098034","display_name":"Key Laboratory of Guangdong Province","ror":"https://ror.org/00swtqp09","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210098034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingmei Xu","raw_affiliation_strings":["Guangdong Science &amp; Technology Infrastructure Center, Guangdong Provincial Key Laboratory of High-Performance Computing, China"],"raw_orcid":"https://orcid.org/0009-0006-2879-3438","affiliations":[{"raw_affiliation_string":"Guangdong Science &amp; Technology Infrastructure Center, Guangdong Provincial Key Laboratory of High-Performance Computing, China","institution_ids":["https://openalex.org/I4210098034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078133995","display_name":"Zhuoqian Liang","orcid":"https://orcid.org/0000-0001-5706-3254"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhuoqian Liang","raw_affiliation_strings":["College of Information Science and Technology, Jinan University, China"],"raw_orcid":"https://orcid.org/0000-0001-5706-3254","affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Jinan University, China","institution_ids":["https://openalex.org/I34949971","https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011235038","display_name":"Yuxia Sun","orcid":"https://orcid.org/0000-0002-5959-0629"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I34949971","display_name":"University of Jinan","ror":"https://ror.org/02mjz6f26","country_code":"CN","type":"education","lineage":["https://openalex.org/I34949971"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuxia Sun","raw_affiliation_strings":["College of Information Science and Technology, Jinan University, China"],"raw_orcid":"https://orcid.org/0000-0002-5959-0629","affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Jinan University, China","institution_ids":["https://openalex.org/I34949971","https://openalex.org/I159948400"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102836589"],"corresponding_institution_ids":["https://openalex.org/I159948400","https://openalex.org/I34949971"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08047044,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"936","last_page":"942"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9692000150680542,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9476000070571899,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.9033005237579346},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8177164793014526},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7965415716171265},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.5936294794082642},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.49784350395202637},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.4758170247077942},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.4559108018875122},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.417886346578598},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4104583263397217},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38737842440605164},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3832246661186218},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3691607117652893},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3554132580757141},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1493004858493805},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08614754676818848}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.9033005237579346},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8177164793014526},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7965415716171265},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.5936294794082642},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.49784350395202637},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.4758170247077942},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.4559108018875122},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.417886346578598},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4104583263397217},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38737842440605164},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3832246661186218},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3691607117652893},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3554132580757141},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1493004858493805},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08614754676818848}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3603781.3604217","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3603781.3604217","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1659842140","https://openalex.org/W2789987041","https://openalex.org/W3089994140","https://openalex.org/W3210837816","https://openalex.org/W3215350803"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W2900159906","https://openalex.org/W3105849702","https://openalex.org/W4384648009","https://openalex.org/W4283221438","https://openalex.org/W4287828318","https://openalex.org/W2406556600","https://openalex.org/W4380352238","https://openalex.org/W3126470649"],"abstract_inverted_index":{"With":[0],"the":[1,9,20,48,51,59,67,74,110,114],"development":[2],"of":[3,22,58,69,127],"cyberspace":[4],"security":[5],"attack":[6,128],"and":[7,39,102,130],"defense,":[8],"malware":[10,54],"detection":[11,55],"model":[12],"based":[13,97,120],"on":[14,47,98,121],"machine":[15],"learning":[16],"is":[17,33,95,119],"also":[18],"facing":[19],"threat":[21],"adversarial":[23,37,45,64],"examples.":[24],"An":[25],"important":[26],"way":[27],"to":[28,34,43,79],"defend":[29],"against":[30],"such":[31],"threats":[32],"generate":[35],"effective":[36],"examples":[38,65],"then":[40],"use":[41],"them":[42],"conduct":[44],"training":[46],"model.":[49],"For":[50],"end-to-end":[52],"PE":[53,91],"model,":[56],"most":[57],"existing":[60,115],"generation":[61,88,116],"technologies":[62],"for":[63,90],"adopt":[66],"method":[68],"inserting":[70],"dead":[71,75],"codes,":[72],"but":[73],"codes":[76],"are":[77],"easy":[78],"be":[80],"filtered":[81],"out":[82],"by":[83],"preprocessing.":[84],"A":[85],"novel":[86],"adversarial-example":[87],"approach":[89,112],"malware,":[92],"called":[93],"AGA,":[94],"proposed":[96],"a":[99,122],"genetic":[100],"algorithm":[101],"equivalent-instruction":[103],"replacement.":[104],"The":[105],"experimental":[106],"studies":[107],"show":[108],"that":[109],"AGA":[111],"outperforms":[113],"approach,":[117],"which":[118],"particle-swarm-optimization":[123],"algorithm,":[124],"in":[125],"terms":[126],"effectiveness":[129],"attack-generation":[131],"efficiency.":[132]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
