Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 240800062-6.doi: 10.11896/jsjkx.240800062
• Information Security • Previous Articles Next Articles
XING Yuyang, WANG Baohui
CLC Number:
| [1]AV-TEST:The Independent IT-Security Institute[EB/OL].https://www.av-test.org/en/statistics/malware. [2]BHATIA T,KAUSHAL R.Malware detection in android based on dynamic analysis[C]//2017 International Conference on Cyber Security and Protection of Digital Services(Cyber Security).IEEE,2017. [3]JIANG H,TURKI T,WANG J T L.DLGraph:Malware detection using deep learning and graph embedding[C]//2018 17th IEEE International Conference on Machine Learning and Applications(ICMLA).IEEE,2018:1029-1033. [4]YANG S,LI S,CHEN W,et al.A real-time and adaptive-lear-ning malware detection method based on API-pair graph[J].IEEE Access,2020,8:208120-208135. [5]ABUSNAINA A,ABUHAMAD M,ALASMARY H,et al.Dl-fhmc:Deep learning-based fine-grained hierarchical learning approach for robust malware classification[J].IEEE Transactions on Dependable and Secure Computing,2021,19(5):3432-3447. [6]AGUIRRE J,PAPO D,BULDÚ J M.Successful strategies forcompeting networks[J].Nature Physics,2013,9(4):230-234. [7]GOYAL M,KUMAR R.Machine Learning for Malware Detection on Balanced and Imbalanced Datasets[C]//2020 International Conference on Decision Aid Sciences and Application(DASA).IEEE,2020:867-871. [8]KONG Z,XUE J,WANG Y,et al.MalFSM:Feature Subset Selection Method for Malware Family Classification[J].Chinese Journal of Electronics,2023,32(1):26-38. [9]WU Z,ZHANG J,KOU L.A Model for Malware DetectionMethod based on API call Sequence Clustering[C]//2022 9th International Conference on Dependable Systems and Their Applications(DSA).IEEE,2022:1049-1050. [10]SRIRAM S,VINAYAKUMAR R,SOWMYA V,et al.Multi-scale learning based malware variant detection using spatial pyramid pooling network[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).IEEE,2020:740-745. [11]ALAM M,AKRAM A,SAEED T,et al.DeepMalware:A Deep Learning based Malware Images Classification[C]//2021 International Conference on Cyber Warfare and Security(ICCWS).IEEE,2021:93-99. |
| [1] | CHEN Han, XU Zefeng, JIANG Jiu, FAN Fan, ZHANG Junjian, HE Chu, WANG Wenwei. Large Language Model and Deep Network Based Cognitive Assessment Automatic Diagnosis [J]. Computer Science, 2026, 53(3): 41-51. |
| [2] | GE Zeqing, HUANG Shengjun. Semi-supervised Learning Method for Multi-label Tabular Data [J]. Computer Science, 2026, 53(3): 151-157. |
| [3] | WANG Jinghong, LI Pengchao, WANG Xizhao, ZHANG Zili. Dual-channel Graph Neural Network Based on KAN [J]. Computer Science, 2026, 53(3): 188-196. |
| [4] | QIN Jing, LI Guanfeng, CHEN Yuyin, XIAO Yuhang. Embedding Model of Knowledge Graph via Jointly Modeling Ontology and Instances [J]. Computer Science, 2026, 53(3): 331-340. |
| [5] | WANG Xinyu, SONG Xiaomin, ZHENG Huiming, PENG Dezhong, CHEN Jie. Contrastive Learning-based Masked Graph Autoencoder [J]. Computer Science, 2026, 53(2): 145-151. |
| [6] | CHEN Lin, MA Longxuan, ZHANG Yongbing, HUANG Yuxin, GAO Shengxiang, YU Zhengtao. Industrial Text Classification for Chinese and Vietnamese Based on Prompt Learning and AdaptiveLoss Weighting [J]. Computer Science, 2026, 53(2): 312-321. |
| [7] | JIANG Lei, WANG Zi, YANG Rong, HAN Wanglin. Human Motion Recognition Algorithm Based on Wearable Sensors [J]. Computer Science, 2026, 53(2): 342-348. |
| [8] | XUE Jingyan, XIA Jianan, HUO Ruili, LIU Jie, ZHOU Xuezhong. Review of Retinal Image Analysis Methods for OCT/OCTA Based on Deep Learning [J]. Computer Science, 2026, 53(1): 128-140. |
| [9] | JIA Jingdong, HOU Xin, WANG Zhe, HUANG Jian. Research on User Data-driven App Fading Functions [J]. Computer Science, 2026, 53(1): 262-270. |
| [10] | WANG Yongquan, SU Mengqi, SHI Qinglei, MA Yining, SUN Yangfan, WANG Changmiao, WANG Guoyou, XI Xiaoming, YIN Yilong, WAN Xiang. Research Progress of Machine Learning in Diagnosis and Treatment of Esophageal Cancer [J]. Computer Science, 2025, 52(9): 4-15. |
| [11] | LI Fang, WANG Jie. DACSNet:Dual Attention Mechanism and Classification Supervision Network for Breast Lesion Detection in Ultrasound Images [J]. Computer Science, 2025, 52(9): 54-61. |
| [12] | LIU Leyuan, CHEN Gege, WU Wei, WANG Yong, ZHOU Fan. Survey of Data Classification and Grading Studies [J]. Computer Science, 2025, 52(9): 195-211. |
| [13] | JIANG Rui, FAN Shuwen, WANG Xiaoming, XU Youyun. Clustering Algorithm Based on Improved SOM Model [J]. Computer Science, 2025, 52(8): 162-170. |
| [14] | WANG Jia, XIA Ying, FENG Jiangfan. Few-shot Video Action Recognition Based on Two-stage Spatio-Temporal Alignment [J]. Computer Science, 2025, 52(8): 251-258. |
| [15] | ZHANG Yuan, ZHANG Shengjie, LIU Lilong, QIAN Shengsheng. Research on Continual Social Event Classification Based on Continual Event Knowledge Network [J]. Computer Science, 2025, 52(8): 268-276. |
|
||