{"id":"https://openalex.org/W3008022637","doi":"https://doi.org/10.1155/2020/6309243","title":"Incremental Learning for Malware Classification in Small Datasets","display_name":"Incremental Learning for Malware Classification in Small Datasets","publication_year":2020,"publication_date":"2020-02-20","ids":{"openalex":"https://openalex.org/W3008022637","doi":"https://doi.org/10.1155/2020/6309243","mag":"3008022637"},"language":"en","primary_location":{"id":"doi:10.1155/2020/6309243","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6309243","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6309243.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/6309243.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101526011","display_name":"Jingmei Li","orcid":"https://orcid.org/0000-0002-7246-3093"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jingmei Li","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089386832","display_name":"Di Xue","orcid":"https://orcid.org/0000-0002-6430-5466"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Di Xue","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000318376","display_name":"Weifei Wu","orcid":"https://orcid.org/0000-0002-6217-0043"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weifei Wu","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100784264","display_name":"Jiaxiang Wang","orcid":"https://orcid.org/0000-0003-3059-798X"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiaxiang Wang","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China","institution_ids":["https://openalex.org/I151727225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5089386832","https://openalex.org/A5101526011"],"corresponding_institution_ids":["https://openalex.org/I151727225"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":1.9699,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.86484529,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8906728625297546},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.873949408531189},{"id":"https://openalex.org/keywords/opcode","display_name":"Opcode","score":0.8077728748321533},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6614542603492737},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6553648710250854},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5727484226226807},{"id":"https://openalex.org/keywords/multiclass-classification","display_name":"Multiclass classification","score":0.5275565981864929},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.4672868847846985},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4438278079032898},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3687439560890198},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10950475931167603}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8906728625297546},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.873949408531189},{"id":"https://openalex.org/C52173422","wikidata":"https://www.wikidata.org/wiki/Q766483","display_name":"Opcode","level":2,"score":0.8077728748321533},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6614542603492737},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6553648710250854},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5727484226226807},{"id":"https://openalex.org/C123860398","wikidata":"https://www.wikidata.org/wiki/Q6934605","display_name":"Multiclass classification","level":3,"score":0.5275565981864929},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.4672868847846985},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4438278079032898},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3687439560890198},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10950475931167603},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/6309243","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6309243","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6309243.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6311d595d48142f6b29c27ef0a671c8b","is_oa":true,"landing_page_url":"https://doaj.org/article/6311d595d48142f6b29c27ef0a671c8b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/6309243","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6309243","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6309243.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3008022637.pdf","grobid_xml":"https://content.openalex.org/works/W3008022637.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W1509669977","https://openalex.org/W1596717185","https://openalex.org/W1914293472","https://openalex.org/W1968259359","https://openalex.org/W2027721581","https://openalex.org/W2029674613","https://openalex.org/W2045256553","https://openalex.org/W2050855115","https://openalex.org/W2065523140","https://openalex.org/W2079215333","https://openalex.org/W2121227244","https://openalex.org/W2153393809","https://openalex.org/W2156415837","https://openalex.org/W2237959143","https://openalex.org/W2267727210","https://openalex.org/W2290318923","https://openalex.org/W2463281489","https://openalex.org/W2508644642","https://openalex.org/W2564494760","https://openalex.org/W2565906027","https://openalex.org/W2732916693","https://openalex.org/W2736972628","https://openalex.org/W2738219410","https://openalex.org/W2761652379","https://openalex.org/W2779598397","https://openalex.org/W2891723189","https://openalex.org/W2959221393","https://openalex.org/W2963162443","https://openalex.org/W2970814972","https://openalex.org/W3123969097"],"related_works":["https://openalex.org/W36091977","https://openalex.org/W4382794599","https://openalex.org/W2800331776","https://openalex.org/W2903602818","https://openalex.org/W2003791967","https://openalex.org/W4387382577","https://openalex.org/W3016048014","https://openalex.org/W4294976063","https://openalex.org/W2902612505","https://openalex.org/W2765921396"],"abstract_inverted_index":{"Information":[0],"security":[1],"is":[2],"an":[3,17,85,105],"important":[4,12,18],"research":[5],"area.":[6],"As":[7,162],"a":[8,77,149,163],"very":[9],"special":[10],"yet":[11],"case,":[13],"malware":[14,28,36,51,87,134,160,173,191,200],"classification":[15,52,88,129,142,156,169],"plays":[16],"role":[19],"in":[20],"information":[21],"security.":[22],"In":[23,136],"the":[24,27,50,62,81,117,140,168,177,182,195,203,207],"real":[25],"world,":[26],"datasets":[29],"are":[30,45],"open-ended":[31],"and":[32,34,42,99,152,180,202,209],"dynamic,":[33],"new":[35,43,63,133,141,145,150,159],"samples":[37,146],"belonging":[38],"to":[39,54,148,188],"old":[40,155,183],"classes":[41,44,174],"increasing":[46],"continuously.":[47],"This":[48],"requires":[49],"method":[53,108,198],"enable":[55],"incremental":[56,86,100,106,196],"learning,":[57],"which":[58,92,124],"can":[59,125,166],"efficiently":[60],"learn":[61],"knowledge.":[64],"However,":[65],"existing":[66],"works":[67],"mainly":[68],"focus":[69],"on":[70,110],"feature":[71],"engineering":[72],"with":[73,185],"machine":[74,114],"learning":[75,101,107,132,197],"as":[76,116],"tool.":[78],"To":[79],"solve":[80],"problem,":[82],"we":[83],"present":[84],"framework,":[89],"named":[90,122],"\u201cIMC,\u201d":[91],"consists":[93],"of":[94,120,171,211],"opcode":[95],"sequence":[96],"extraction,":[97],"selection,":[98],"method.":[102],"We":[103,193],"develop":[104],"based":[109],"multiclass":[111],"support":[112],"vector":[113],"(SVM)":[115],"core":[118],"component":[119],"IMC,":[121,137],"\u201cIMCSVM,\u201d":[123],"incrementally":[126],"improve":[127,167],"its":[128],"ability":[130],"by":[131,175],"samples.":[135,161],"IMCSVM":[138],"adds":[139],"planes":[143,157],"(if":[144],"belong":[147],"class)":[151],"updates":[153],"all":[154],"for":[158],"result,":[164],"IMC":[165],"quality":[170],"known":[172,186],"minimizing":[176],"prediction":[178],"error":[179],"transfer":[181],"model":[184],"knowledge":[187],"classify":[189],"unknown":[190],"classes.":[192],"apply":[194],"into":[199],"classification,":[201],"experimental":[204],"results":[205],"demonstrate":[206],"advantages":[208],"effectiveness":[210],"IMC.":[212]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
