Computer Science ›› 2026, Vol. 53 ›› Issue (4): 435-444.doi: 10.11896/jsjkx.250500078
• Information Security • Previous Articles Next Articles
YIN Chuang, LIU Jianyi, ZHANG Ru
CLC Number:
| [1]YAN S,REN J,WANG W,et al.A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security[J].IEEE Communications Surveys & Tutorials,2023,25(1):467-496. [2]SHAH N,FARIK M.Ransomware-Threats,Vulnerabilities and Recommendations[J].International Journal of Scientific & Technology Research,2017,6:307-309. [3]The State of Ransomware 2023[EB/OL].(2023-05-10)[2025-06-24].https://news.sophos.com/en-us/2023/05/10/the-state-of-ransomware-2023/. [4]XUE D,LI J,LYU T,et al.Malware Classification Using Probability Scoring and Machine Learning[J].IEEE Access,2019,7:91641-91656. [5]WASOYE S,STEVENS M,MORGAN C,et al.RansomwareClassification Using BTLS Algorithm and Machine Learning Approaches[EB/OL].https://doi.org/10.21203/rs.3.rs-5131919/v1. [6]ZHU J,JANG-JACCARD J,SINGH A,et al.A few-shot meta-learning based siamese neural network using entropy features for ransomware classification[J].Computers & Security,2022,117:102691. [7]FINN C,ABBEEL P,LEVINE S.Model-agnostic meta-learning for fast adaptation of deep networks[C]//Proceedings of the 34th International Conference on Machine Learning.2017:1126-1135. [8]JI Y,ZOU K,ZOU B.Mi-MAML:Classifying few-shot advanced malware using multi-improved model-agnostic meta-learning[J].Cybersecurity,2024,7(1):72. [9]ZHAO W X,ZHOU K,LI J,et al.A Survey of Large Language Models[J].arXiv:2303.18223,2023. [10]WU J,GAN W,CHEN Z,et al.Multimodal Large Language Models:A Survey[C]//2023 IEEE International Conference on Big Data(BigData).IEEE,2023:15-18. [11]ZHONG X,BAN H.Pre-trained network-based transfer lear-ning:A small-sample machine learning approach to nuclear power plant classification problem[J].Annals of Nuclear Energy,2022,175:109201. [12]CHEN X,LIU T,FOURNIER-VIGER P,et al.A fine-grained self-adapting prompt learning approach for few-shot learning with pre-trained language models[J].Knowledge-Based Systems,2024,299:111968. [13]LIN Z,YU S,KUANG Z,et al.Multimodality helps unimodality:Cross-modal few-shot learning with multimodal models[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.IEEE,2023. [14]CHRISTODORESCU M,JHA S.Static analysis of executables to detect malicious patterns[C]//Proceedings of the 12th Conference on USENIX Security Symposium.Washington,DC:USENIX Association,2003. [15]ABUSITTA A,LI M Q,FUNG B C M.Malware classification and composition analysis:A survey of recent developments[J].Journal of Information Security and Applications,2021,59:102828. [16]FIRDAUSI I,LIM C,ERWIN A,et al.Analysis of MachineLearning Techniques Used in Behavior-Based Malware Detection[C]//2010 Second International Conference on Advances in Computing,Control,and Telecommunication Technologies.IEEE,2010:2-3. [17]KOLOSNJAJI B,ZARRAS A,WEBSTER G,et al.Deep Lear-ning for Classification of Malware System Call Sequences[C]//Australasian Joint Conference on Artificial Intelligence.Sprin-ger,2016. [18]SHARMA O,SHARMA A,KALIA A.MIGAN:GAN for faci-litating malware image synthesis with improved malware classification on novel dataset[J].Expert Systems with Applications,2024,241:122678. [19]DENG H,GUO C,SHEN G,et al.MCTVD:A malware classification method based on three-channel visualization and deep learning[J].Computers & Security,2023,126:103084. [20]ABBASI M S,AL-SAHAF H,MANSOORI M,et al.Behavior-based ransomware classification:A particle swarm optimization wrapper-based approach for feature selection[J].Applied Soft Computing,2022,121:108744. [21]AURANGZEB S,ANWAR H,NAEEM M A,et al.BigRC-EML:Big-data based ransomware classification using ensemble machine learning[J].Cluster Computing,2022,25(5):3405-3422. [22]CHAGANTI R,RAVI V,PHAM T D.Image-based malwarerepresentation approach with EfficientNet convolutional neural networks for effective malware classification[J].Journal of Information Security and Applications,2022,69:103306. [23]NI S,QIAN Q,ZHANG R.Malware identification using visua-lization images and deep learning[J].Computers & Security,2018,77:871-885. [24]CONTI M,KHANDHAR S,VINOD P.A few-shot malwareclassification approach for unknown family recognition using malware feature visualization[J].Computers & Security,2022,122:102887. [25]PARISOT A,BENTO L M S,MACHADO R C S.Ransomware Detection:Leveraging Sandbox,Text Mining Techniques and Machine Learning[C]//2024 IEEE International Workshop on Metrology for Industry 40 & IoT(MetroInd40 & IoT).IEEE,2024:29-31. [26]ZHOU Y,LIU Z,XUE J,et al.LM-cAPI:A Lite Model Based on API Core Semantic Information for Malware Classification[C]//International Conference on Applied Cryptography and Network Security.Springer,2024. [27]LISA F T,ISLAM S R,KUMAR N M.Multi-modal machine learning model for interpretable malware classification[C]//World Conference on Explainable Artificial Intelligence.Sprin-ger,2024. [28]LIAOW,LIU Z,DAI H,et al.Mask-guided BERT for few-shot text classification[J].Neurocomputing,2024,610:128576. [29]LI H,CHEN S,WANG G,et al.Enhancing Few-Shot Malware Classification Through Joint Learning of Malware Images and Opcode Sequences[C]//2024 IEEE International Symposium on Parallel and Distributed Processing with Applications(ISPA).IEEE,2024. [30]SRIVASTAVA S,SHARMA G.Omnivec:Learning robust representations with cross-modal sharing[C]//Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision.IEEE,2024. [31]YACOUBY R,AXMAN D.Probabilistic extension of precision,recall,and f1 score for more thorough evaluation of classification models[C]//Proceedings of the First Workshop on Evaluation and Comparison of NLP Systems.IEEE,2020. [32]VirusShare.com[EB/OL].(2025-06-25)[2025-06-25].https://virusshare.com/research. [33]VirusTotal[EB/OL].(2025-06-25)[2025-06-25].https://www.virustotal.com/gui/home/upload. |
| [1] | GAO Tai, REN Yanzhang, WANG Huiqing, LI Ying, WANG Bin. KGMamba:Gene Regulatory Network Prediction Model Based on Kolmogorov-Arnold Network Optimizing Graph Convolutional Network and Mamba [J]. Computer Science, 2026, 53(4): 101-111. |
| [2] | ZHANG Xueqin, WANG Zhineng, LI Jinsheng, LU Yisong, LUO Fei. Key Node Identification in Temporal Social Networks Based on Deep Learning and Multi-feature Fusion [J]. Computer Science, 2026, 53(4): 143-154. |
| [3] | GU Bokai, LIU Dun, SUN Yang. STWD-DLFRD:Multi-granularity Fake Review Detection via Sequential Three-way Decisions and Deep Learning [J]. Computer Science, 2026, 53(4): 188-196. |
| [4] | ZHENG Cheng, BAN Qingqing. Knowledge-assisted and Reinforced Syntax-driven for Aspect-based Sentiment Analysis [J]. Computer Science, 2026, 53(4): 406-414. |
| [5] | LI Zequn, DING Fei. Fatigue Driving Detection Based on Dual-branch Fusion and Segmented Domain AdaptationTransfer Learning [J]. Computer Science, 2026, 53(3): 78-87. |
| [6] | FU Yukai, LI Qingzhen, DONG Zhixue, SHI Dongli, ZHAO Peng. Pedestrian Re-identification Methods Based on Limited Target Data and Deep Learning [J]. Computer Science, 2026, 53(3): 287-294. |
| [7] | YU Ding, LI Zhangwei. Prediction Method of RNA Secondary Structure Based on Transformer Architecture [J]. Computer Science, 2026, 53(3): 375-382. |
| [8] | DU Jiantong, GUAN Zeli, XUE Zhe. Multi-task Learning-based Ophthalmic Video Feature Fusion and Multi-dimensional Profiling [J]. Computer Science, 2026, 53(3): 383-391. |
| [9] | SU Ruitao, REN Jiongjiong, CHEN Shaozhen. Deep Learning-based Neural Differential Distinguishers for GIFT-128 and ASCON [J]. Computer Science, 2026, 53(3): 453-458. |
| [10] | HUANG Jing, WANG Teng, LIU Jian, HU Kai, PENG Xin, HUANG Yamin, WEN Yuanqiao. Multimodal Visual Detection for Underwater Sonar Target Images [J]. Computer Science, 2026, 53(2): 227-235. |
| [11] | LIU Chenhong, LI Fenglian, YANG Jia, WANG Suzhe, CHEN Guijun. Boundary-focused Multi-scale Feature Fusion Network for Stroke Lesion Segmentation [J]. Computer Science, 2026, 53(2): 264-272. |
| [12] | XI Penghui, WU Xiazhen, JIANG Wencong, FANG Liangda, HE Chaobo, GUAN Quanlong. Review of Personalized Educational Resource Recommendations [J]. Computer Science, 2026, 53(2): 1-15. |
| [13] | HUANG Miaomiao, WANG Huiying, WANG Meixia, WANG Yejiang , ZHAO Yuhai. Review of Graph Embedding Learning Research:From Simple Graph to Complex Graph [J]. Computer Science, 2026, 53(1): 58-76. |
| [14] | WANG Cheng, JIN Cheng. KAN-based Unsupervised Multivariate Time Series Anomaly Detection Network [J]. Computer Science, 2026, 53(1): 89-96. |
| [15] | XUE Jingyan, XIA Jianan, HUO Ruili, LIU Jie, ZHOU Xuezhong. Review of Retinal Image Analysis Methods for OCT/OCTA Based on Deep Learning [J]. Computer Science, 2026, 53(1): 128-140. |
|
||