{"id":"https://openalex.org/W7138885220","doi":"https://doi.org/10.23919/icact68090.2026.11431538","title":"An Interpretable Hybrid Model for PDF Malware Detection Using CNN and Vision Transformer","display_name":"An Interpretable Hybrid Model for PDF Malware Detection Using CNN and Vision Transformer","publication_year":2026,"publication_date":"2026-02-08","ids":{"openalex":"https://openalex.org/W7138885220","doi":"https://doi.org/10.23919/icact68090.2026.11431538"},"language":null,"primary_location":{"id":"doi:10.23919/icact68090.2026.11431538","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact68090.2026.11431538","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 28th International Conference on Advanced Communications Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078413113","display_name":"Emmanuel Kwesi Baah","orcid":"https://orcid.org/0000-0001-9091-3513"},"institutions":[{"id":"https://openalex.org/I4210106992","display_name":"Lancaster University Ghana","ror":"https://ror.org/01g3dya06","country_code":"GH","type":"education","lineage":["https://openalex.org/I4210106992"]}],"countries":["GH"],"is_corresponding":true,"raw_author_name":"Emmanuel Kwesi Baah","raw_affiliation_strings":["Lancaster University Ghana,Department of Computer Science,Accra,Ghana"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Lancaster University Ghana,Department of Computer Science,Accra,Ghana","institution_ids":["https://openalex.org/I4210106992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025633260","display_name":"Dominic Asamoah","orcid":"https://orcid.org/0000-0003-4393-4148"},"institutions":[{"id":"https://openalex.org/I28046988","display_name":"Kwame Nkrumah University of Science and Technology","ror":"https://ror.org/00cb23x68","country_code":"GH","type":"education","lineage":["https://openalex.org/I28046988"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Dominic Asamoah","raw_affiliation_strings":["Kwame Nkrumah University of Science and Technology,Department of Computer Science,Kumasi,Ghana"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Kwame Nkrumah University of Science and Technology,Department of Computer Science,Kumasi,Ghana","institution_ids":["https://openalex.org/I28046988"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130075080","display_name":"Frederick Ledi","orcid":null},"institutions":[{"id":"https://openalex.org/I28046988","display_name":"Kwame Nkrumah University of Science and Technology","ror":"https://ror.org/00cb23x68","country_code":"GH","type":"education","lineage":["https://openalex.org/I28046988"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Frederick Ledi","raw_affiliation_strings":["Kwame Nkrumah University of Science and Technology,Department of Computer Science,Kumasi,Ghana"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Kwame Nkrumah University of Science and Technology,Department of Computer Science,Kumasi,Ghana","institution_ids":["https://openalex.org/I28046988"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047384859","display_name":"Anthony Kingsley Sackey","orcid":"https://orcid.org/0000-0001-5228-3813"},"institutions":[{"id":"https://openalex.org/I2803198","display_name":"Ho Technical University","ror":"https://ror.org/00j7bab93","country_code":"GH","type":"education","lineage":["https://openalex.org/I2803198"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Anthony Kingsley Sackey","raw_affiliation_strings":["Ho Technical University,Department of Computer Science,Ho,Ghana"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Ho Technical University,Department of Computer Science,Ho,Ghana","institution_ids":["https://openalex.org/I2803198"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Eric Agyekum Nana Boamah","orcid":null},"institutions":[{"id":"https://openalex.org/I28046988","display_name":"Kwame Nkrumah University of Science and Technology","ror":"https://ror.org/00cb23x68","country_code":"GH","type":"education","lineage":["https://openalex.org/I28046988"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Eric Agyekum Nana Boamah","raw_affiliation_strings":["Kwame Nkrumah University of Science and Technology,Department of Computer Science,Kumasi,Ghana"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Kwame Nkrumah University of Science and Technology,Department of Computer Science,Kumasi,Ghana","institution_ids":["https://openalex.org/I28046988"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129830545","display_name":"Richard Kofi Doh","orcid":null},"institutions":[{"id":"https://openalex.org/I28046988","display_name":"Kwame Nkrumah University of Science and Technology","ror":"https://ror.org/00cb23x68","country_code":"GH","type":"education","lineage":["https://openalex.org/I28046988"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Richard Kofi Doh","raw_affiliation_strings":["Kwame Nkrumah University of Science and Technology,Department of Computer Science,Kumasi,Ghana"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Kwame Nkrumah University of Science and Technology,Department of Computer Science,Kumasi,Ghana","institution_ids":["https://openalex.org/I28046988"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5078413113"],"corresponding_institution_ids":["https://openalex.org/I4210106992"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.51022749,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.00279999990016222,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.0017000000225380063,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8984000086784363},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.5181000232696533},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.42329999804496765},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.40369999408721924},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3977999985218048},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.29330000281333923}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8984000086784363},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.710099995136261},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.5181000232696533},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5157999992370605},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42329999804496765},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.40369999408721924},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3977999985218048},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39579999446868896},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3257000148296356},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3003999888896942},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.29330000281333923},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.29179999232292175},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.28459998965263367},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.27140000462532043},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.26600000262260437},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.26350000500679016},{"id":"https://openalex.org/C5339829","wikidata":"https://www.wikidata.org/wiki/Q1425977","display_name":"Machine vision","level":2,"score":0.2572999894618988}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icact68090.2026.11431538","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact68090.2026.11431538","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 28th International Conference on Advanced Communications Technology (ICACT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6582698822021484}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2574797807","https://openalex.org/W2575541032","https://openalex.org/W2765325603","https://openalex.org/W2790818813","https://openalex.org/W2921340717","https://openalex.org/W2951553000","https://openalex.org/W2955474601","https://openalex.org/W2978640371","https://openalex.org/W2988431094","https://openalex.org/W3006292440","https://openalex.org/W3088861647","https://openalex.org/W3118310289","https://openalex.org/W3140854437","https://openalex.org/W3167153756","https://openalex.org/W3175110185","https://openalex.org/W4214612132","https://openalex.org/W4288104392","https://openalex.org/W4293066540","https://openalex.org/W4296710614","https://openalex.org/W4303627748","https://openalex.org/W4316012720","https://openalex.org/W4384824609","https://openalex.org/W4389041984","https://openalex.org/W4391147981","https://openalex.org/W4393180535","https://openalex.org/W4402475031"],"related_works":[],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"malware":[3,53,104],"has":[4,12],"become":[5,13],"more":[6,14],"prevalent":[7],"just":[8],"as":[9,58],"the":[10,106,134,146,148],"internet":[11],"complex":[15],"and":[16,25,38,79,90,130,141],"ubiquitous.":[17],"Malware":[18],"is":[19],"expanding":[20],"at":[21],"an":[22,88,119,153],"alarming":[23],"rate,":[24],"PDF":[26,103,116,159],"documents":[27],"are":[28,73],"a":[29],"prominent":[30],"attack":[31],"surface":[32],"due":[33],"to":[34,46,66,75,145,151],"their":[35],"programmable":[36],"components":[37],"hardware":[39],"independence.":[40],"Various":[41],"approaches":[42],"have":[43],"been":[44],"employed":[45],"protect":[47],"PDF(portable":[48],"document":[49],"format)":[50],"files":[51],"from":[52],"attacks.":[54],"Older":[55],"approaches,":[56],"such":[57],"dependency-based":[59],"algorithms,":[60],"addressed":[61],"structural":[62],"anomalies":[63],"but":[64],"struggled":[65],"handle":[67],"black-box":[68],"threats.":[69],"Other":[70],"existing":[71],"techniques":[72],"known":[74],"be":[76,152],"less":[77],"efficient":[78,89],"perform":[80],"poorly":[81],"against":[82],"new":[83],"vulnerabilities.":[84],"This":[85],"study":[86,110],"presents":[87],"novel":[91],"hybrid":[92,135],"solution":[93,149],"(Convolutional":[94],"Neural":[95],"Network(CNN)":[96],"+":[97],"Vision":[98],"Transformer":[99],"(ViT))":[100],"for":[101,157],"combating":[102],"using":[105],"PDFRep":[107],"dataset.":[108],"The":[109],"identified":[111],"key":[112],"players":[113],"in":[114],"detecting":[115,158],"malware,":[117],"achieving":[118],"average":[120],"of":[121],"0.99":[122],"across":[123],"receiver":[124],"operating":[125],"characteristics,":[126],"accuracy,":[127],"recall,":[128],"precision,":[129],"F1":[131],"score.":[132],"Furthermore,":[133],"model":[136],"obtained":[137],"relatively":[138],"low":[139],"false-positive":[140],"false-negative":[142],"rates.":[143],"According":[144],"results,":[147],"proved":[150],"improvement":[154],"over":[155],"others":[156],"malware.":[160]},"counts_by_year":[],"updated_date":"2026-05-03T08:25:01.440150","created_date":"2026-03-20T00:00:00"}
