4.7 Article

Imbalanced Malware Family Classification Using Multimodal Fusion and Weight Self-Learning

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

Dynamic Prototype Network Based on Sample Adaptation for Few-Shot Malware Detection

Yuhan Chai et al.

Summary: The continuous increase and spread of malware have caused immeasurable losses to social enterprises and even the country, especially unknown malware. Most existing methods use predefined class samples to train models, which cannot handle unknown malware detection. In this paper, we propose a Dynamic Prototype Network based on Sample Adaptation for few-shot malware detection (DPNSA) to address this issue. Our method outperforms the existing models and achieves significant improvement in malware detection.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2023)

Article Engineering, Multidisciplinary

A Malicious Mining Code Detection Method Based on Multi-Features Fusion

Shudong Li et al.

Summary: This paper introduces a malicious mining code detection method based on feature fusion and machine learning. It extracts multi-dimensional features and fuses them with other statistical features to train a detection model using machine learning. Experimental results show that the method has high recognition accuracy and performance metrics.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Computer Science, Hardware & Architecture

A new secure arrangement for privacy-preserving data collection

Jingcheng Song et al.

Summary: User health data is essential for IoT healthcare, but privacy is often a challenge. Many privacy-preserving data collection schemes have been proposed to balance the need for data collection and personal privacy. The proposed secure arrangement method based on matrix eigenvalue calculation is more robust and efficient compared to current methods.

COMPUTER STANDARDS & INTERFACES (2022)

Article Automation & Control Systems

A Privacy-Enhanced Retrieval Technology for the Cloud-Assisted Internet of Things

Tian Wang et al.

Summary: The article introduces a privacy-enhanced retrieval technology called PERT for cloud-assisted IoT, which preserves data privacy by hiding data transmission information, and the experiments have shown its effectiveness.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Automation & Control Systems

Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices

Weizheng Wang et al.

Summary: The Industrial Internet of Things (IIoT) has significantly transformed personal lifestyles and society operations, sparking interest in areas such as intelligent logistics, smart grids, and smart cities. To address security concerns in IIoT, researchers have proposed a novel certificateless signature scheme using blockchain technology and smart contracts, demonstrating its advantages in security and efficiency.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Interdisciplinary Applications

Malicious mining code detection based on ensemble learning in cloud computing environment

Shudong Li et al.

Summary: The study proposes a method for detecting malicious mining code in cloud platforms by fusing Bagging and Boosting algorithms to construct a detection model, reducing the variance of model detection significantly and achieving higher accuracy and robustness compared to traditional classifiers. The experimental results show high values of AUC (0.992) and F1-score (0.987), with a low standard deviation of AUC values under different data inputs (0.0009).

SIMULATION MODELLING PRACTICE AND THEORY (2021)

Article Automation & Control Systems

A Novel Web Attack Detection System for Internet of Things via Ensemble Classification

Chaochao Luo et al.

Summary: The IoT technology has been widely applied in various fields, but the diversity of devices makes networks more vulnerable to web attacks. Researchers proposed a deep learning-based web attack detection system that can accurately detect web attacks with low false positive and negative rates.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques

Shudong Li et al.

Summary: This paper proposes a machine learning-based method to accurately identify the real organization entities behind APT attacks in the Internet of Things, in order to protect IoT security. Experimental results demonstrate the effectiveness of the method in attribution analysis of APT malware samples.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Information Systems

Blockchain-Based On-Demand Computing Resource Trading in IoV-Assisted Smart City

Xi Lin et al.

Summary: In a smart city, IoV can assist in achieving flexible computing resource demand response by sharing idle vehicle computing resources. To ensure transaction security and privacy in the system, a consortium blockchain approach is employed without involving a centralized trusted third-party. Additionally, a two-stage Stackelberg game is constructed to encourage individual smart vehicles to participate and optimize utilities of buyers and sellers.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2021)

Proceedings Paper Computer Science, Software Engineering

A Comprehensive Study on Learning-Based PE Malware Family Classification Methods

Yixuan Ma et al.

Summary: In the field of PE malware classification, learning-based methods have gained popularity, but lack consistent comparisons between different approaches and suffer from degradation in performance due to concept drift. Existing methods face challenges of long prediction times and high memory consumption, hindering their adoption in industry usage.

PROCEEDINGS OF THE 29TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '21) (2021)

Article Computer Science, Hardware & Architecture

IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture

Danish Vasan et al.

COMPUTER NETWORKS (2020)

Article Engineering, Electrical & Electronic

Secrecy Performance Analysis of UAV Assisted Relay Transmission for Cognitive Network With Energy Harvesting

Baofeng Ji et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Hardware & Architecture

Emerging Technologies for 5G-IoV Networks: Applications, Trends and Opportunities

Wei Duan et al.

IEEE NETWORK (2020)

Proceedings Paper Computer Science, Hardware & Architecture

Malware Classification on Imbalanced Data through Self-Attention

Yu Ding et al.

2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) (2020)

Article Computer Science, Artificial Intelligence

Multimodal Machine Learning: A Survey and Taxonomy

Tadas Baltrusaitis et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2019)

Article Computer Science, Information Systems

A Novel Solutions for Malicious Code Detection and Family Clustering Based on Machine Learning

Hangfeng Yang et al.

IEEE ACCESS (2019)

Article Computer Science, Cybernetics

Decentralized On-Demand Energy Supply for Blockchain in Internet of Things: A Microgrids Approach

Jianan Li et al.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2019)

Review Computer Science, Artificial Intelligence

Learning under Concept Drift: A Review

Jie Lu et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2019)

Article Computer Science, Information Systems

Malware identification using visualization images and deep learning

Sang Ni et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Artificial Intelligence

Extremely randomized trees

P Geurts et al.

MACHINE LEARNING (2006)