{"id":"https://openalex.org/W4402993487","doi":"https://doi.org/10.3233/faia240418","title":"Checking Robustness of Neural Network Models for the Classification of Malware","display_name":"Checking Robustness of Neural Network Models for the Classification of Malware","publication_year":2024,"publication_date":"2024-09-25","ids":{"openalex":"https://openalex.org/W4402993487","doi":"https://doi.org/10.3233/faia240418"},"language":"en","primary_location":{"id":"doi:10.3233/faia240418","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3233/faia240418","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://dx.doi.org/10.3233/faia240418","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072458190","display_name":"Teresa Alsinet","orcid":"https://orcid.org/0000-0003-4594-5502"},"institutions":[{"id":"https://openalex.org/I15766328","display_name":"Universitat de Lleida","ror":"https://ror.org/050c3cw24","country_code":"ES","type":"education","lineage":["https://openalex.org/I15766328"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Teresa Alsinet","raw_affiliation_strings":["Universitat de Lleida"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Universitat de Lleida","institution_ids":["https://openalex.org/I15766328"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070784397","display_name":"Josep Argelich","orcid":"https://orcid.org/0000-0003-4089-6422"},"institutions":[{"id":"https://openalex.org/I15766328","display_name":"Universitat de Lleida","ror":"https://ror.org/050c3cw24","country_code":"ES","type":"education","lineage":["https://openalex.org/I15766328"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Josep Argelich","raw_affiliation_strings":["Universitat de Lleida"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Universitat de Lleida","institution_ids":["https://openalex.org/I15766328"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047023182","display_name":"Ram\u00f3n B\u00e9jar","orcid":"https://orcid.org/0000-0002-5208-685X"},"institutions":[{"id":"https://openalex.org/I15766328","display_name":"Universitat de Lleida","ror":"https://ror.org/050c3cw24","country_code":"ES","type":"education","lineage":["https://openalex.org/I15766328"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Ramon Bejar","raw_affiliation_strings":["Universitat de Lleida"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Universitat de Lleida","institution_ids":["https://openalex.org/I15766328"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063586825","display_name":"Ant\u00f3nio Morgado","orcid":"https://orcid.org/0000-0002-5295-1321"},"institutions":[{"id":"https://openalex.org/I121345201","display_name":"Instituto de Engenharia de Sistemas e Computadores Investiga\u00e7\u00e3o e Desenvolvimento","ror":"https://ror.org/04mqy3p58","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I121345201","https://openalex.org/I4210125590"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Antonio Morgado","raw_affiliation_strings":["INESC-ID/IST Universidade de Lisboa"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"INESC-ID/IST Universidade de Lisboa","institution_ids":["https://openalex.org/I121345201"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025177965","display_name":"Jordi Planes","orcid":"https://orcid.org/0000-0003-1861-9736"},"institutions":[{"id":"https://openalex.org/I15766328","display_name":"Universitat de Lleida","ror":"https://ror.org/050c3cw24","country_code":"ES","type":"education","lineage":["https://openalex.org/I15766328"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Jordi Planes","raw_affiliation_strings":["Universitat de Lleida"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Universitat de Lleida","institution_ids":["https://openalex.org/I15766328"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5072458190"],"corresponding_institution_ids":["https://openalex.org/I15766328"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.38817481,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9749000072479248,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7127795219421387},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7008152008056641},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6745204925537109},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6026443243026733},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.49933600425720215},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.35255134105682373},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14070123434066772},{"id":"https://openalex.org/keywords/chemistry","display_name":"Chemistry","score":0.04183840751647949}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7127795219421387},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7008152008056641},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6745204925537109},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6026443243026733},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49933600425720215},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35255134105682373},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14070123434066772},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.04183840751647949},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3233/faia240418","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3233/faia240418","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},{"id":"pmh:oai:repositori.udl.cat:10459.1/467688","is_oa":true,"landing_page_url":"https://hdl.handle.net/10459.1/467688","pdf_url":null,"source":{"id":"https://openalex.org/S4306400812","display_name":"Repositori ObertUDL (University of Lleida)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I15766328","host_organization_name":"Universitat de Lleida","host_organization_lineage":["https://openalex.org/I15766328"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.3233/faia240418","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3233/faia240418","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W3046775127","https://openalex.org/W3107602296","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W4364306694","https://openalex.org/W4312192474","https://openalex.org/W4283697347"],"abstract_inverted_index":{"In":[0],"the":[1,11,47,54,63,67,99,115,118,145,153,156,166],"recent":[2],"years,":[3],"there":[4,104],"has":[5],"been":[6],"a":[7,31,42,95,122,130,134,162],"strong":[8],"concern":[9],"over":[10],"robustness":[12,48,131,146,154],"of":[13,24,49,56,66,74,108,117,129,144,155],"machine":[14],"learning":[15],"systems,":[16],"specially":[17],"when":[18],"working":[19],"in":[20],"critical":[21,26],"systems.":[22],"One":[23],"such":[25,109,161],"domains":[27],"is":[28,34,60],"cybersecurity,":[29],"and":[30,90],"particular":[32,96],"example":[33],"malware":[35],"detection.":[36],"This":[37],"works":[38],"aims":[39],"to":[40,45,53,70,84,151],"provide":[41],"formal":[43],"technique":[44,59],"check":[46,102],"neural":[50,68,100,119,135],"networks":[51],"applied":[52],"detection":[55],"malware.":[57,141],"The":[58,142],"based":[61],"on":[62],"automatic":[64],"translation":[65],"network":[69,136],"an":[71,110],"equivalent":[72],"set":[73],"equations":[75],"that":[76,112,137],"can":[77,113,148],"be":[78,149],"subsequently":[79],"rigorously":[80],"analyzed":[81],"with":[82],"respect":[83],"certain":[85],"conditions":[86],"for":[87,98,133,159],"its":[88],"input":[89,97,111],"output.":[91],"That":[92],"is,":[93],"given":[94],"network,":[101],"if":[103],"exist":[105],"slight":[106],"variations":[107],"modify":[114],"output":[116],"network.":[120],"As":[121],"case":[123],"study,":[124],"we":[125],"present":[126],"preliminary":[127],"results":[128,143],"analysis":[132,147],"detects":[138],"Windows":[139],"PE":[140],"used":[150],"certify":[152],"classifier":[157,163],"or":[158],"improving":[160],"by":[164],"fixing":[165],"flaws":[167],"detected.":[168]},"counts_by_year":[],"updated_date":"2026-05-03T08:25:01.440150","created_date":"2025-10-10T00:00:00"}
