4.5 Article

AMalNet: A deep learning framework based on graph convolutional networks for malware detection

期刊

COMPUTERS & SECURITY
卷 93, 期 -, 页码 -

出版社

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2020.101792

关键词

Word embedding; Graph convolutional networks; Independently recurrent neural networks; Android Malware detection; Static analysis

资金

  1. Research Innovation Project of Graduate Student in Xinjiang Uygur Autonomous Region [XJ2019G065]
  2. Xinjiang Uygur Autonomous Region Cyber Security and Informatization Project [XJWX-1-Z-2019-1021]
  3. Cernet Next Generation Internet Technology Innovation Project [NGII20170420, NGII20190412]

向作者/读者索取更多资源

The increasing popularity of Android apps attracted widespread attention from malware authors. Traditional malware detection systems suffer from some shortcomings; computationally expensive, insufficient performance or not robust enough. To address this challenge, we (1) build a novel and highly reliable deep learning framework, named AMalNet, to learn multiple embedding representations for Android malware detection and family attribution, (2) introduce a version of Graph Convolutional Networks (GCNs) for modeling high-level graphical semantics, which automatically identifies and learns the semantic and sequential patterns, (3) use an Independently Recurrent Neural Network (IndRNN) to decode the deep semantic information, making full use of remote dependent information between nodes to independently extract features. The experimental results on multiple benchmark datasets indicated that the AMalNet framework outperforms other state-of-the-art techniques significantly. (C) 2020 Published by Elsevier Ltd.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Health Care Sciences & Services

FSOU-Net: Feature supplement and optimization U-Net for 2D medical image segmentation

Yongtao Wang, Shengwei Tian, Long Yu, Weidong Wu, Dezhi Zhang, Junwen Wang, Junlong Cheng

Summary: To improve the feature expression ability and segmentation performance of U-Net, we proposed a feature supplement and optimization U-Net (FSOU-Net). The proposed method utilizes shallow feature supplement module and deep feature optimization module to enhance the representation ability of features. Experimental results demonstrate the superiority of the proposed model in medical image segmentation.

TECHNOLOGY AND HEALTH CARE (2023)

Correction Computer Science, Information Systems

Medical image segmentation based on dual-channel integrated cross-layer residual algorithm (Sept, 10.1007/s11042-021-11326-9, 2022)

Hongfeng You, Long Yu, Shengwei Tian, Xiang Ma, Yan Xing

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Correction Computer Science, Information Systems

Underwater target detection with an attention mechanism and improved scale (vol 80, pg 33747, 2021)

Xiangyu Wei, Long Yu, Shengwei Tian, Pengcheng Feng, Xin Ning

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Engineering, Biomedical

Skin disease migration segmentation network based on multi-scale channel attention

Bin Yu, Long Yu, Shengwei Tian, Weidong Wu, Zhang Dezhi, Xiaojing Kang

Summary: This research proposes a new multi-scale channel attention module (MS-CA), which is applied to an image segmentation model for accurate diagnosis and treatment planning of skin lesions. Experimental results show that the MS-CA model achieves better segmentation results compared to existing methods.

COMPUTER METHODS IN BIOMECHANICS AND BIOMEDICAL ENGINEERING-IMAGING AND VISUALIZATION (2023)

Article Engineering, Biomedical

Semi-supervised medical image classification with adaptive threshold pseudo-labeling and unreliable sample contrastive loss

Zhen Peng, Shengwei Tian, Long Yu, Dezhi Zhang, Weidong Wu, Shaofeng Zhou

Summary: Semi-supervised learning is significant in medical imaging tasks, but pseudo-labeling-based methods face two problems in medical image datasets: bias towards the majority class and loss of useful information. To address these issues, we propose FullMatch, an SSL framework that utilizes all unlabeled data. Our method includes adaptive threshold pseudo-labeling (ATPL) that generates pseudo-labels based on the model's learning status and does not discard unlabeled data below the thresholds. We also introduce unreliable sample contrastive loss (USCL) to leverage useful information from low-confidence unlabeled data. Experimental results demonstrate the superiority of our method over state-of-the-art SSL methods.

BIOMEDICAL SIGNAL PROCESSING AND CONTROL (2023)

Article Biochemical Research Methods

ISLMI:Predicting lncRNA-miRNA Interactions Based on Information Injection and Second-Order Graph Convolution Network

Jinmiao Song, Shengwei Tian, Long Yu, Qimeng Yang, Yuanxu Wang, Qiguo Dai, Xiaodong Duan

Summary: Studies have shown that IncRNA-miRNA interactions have important effects on gene expression and biological activities. In this research, a new prediction model called ISLMI was proposed, which used information injection and a second order graph convolution network (SOGCN) to enhance the performance of predicting lncRNA-miRNA interactions. The model achieved reliable performance in 5-fold cross-validation and significantly improved the prediction accuracy.

IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS (2023)

Article Engineering, Electrical & Electronic

UACENet: Uncertain area attention and cross-image context extraction network for polyp segmentation

Zhi Wang, Feng Gao, Long Yu, Shengwei Tian

Summary: Accurate segmentation of polyps from colonoscopy images is crucial for early screening and diagnosis of colorectal cancer. This study proposes a novel network that combines uncertain area attention, cross-image context extraction, and adaptive fusion to improve polyp segmentation. The proposed method achieves state-of-the-art performance on multiple public datasets.

INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY (2023)

Article Radiology, Nuclear Medicine & Medical Imaging

FaxMatch: Multi-Curriculum Pseudo-Labeling for semi-supervised medical image classification

Zhen Peng, Dezhi Zhang, Shengwei Tian, Weidong Wu, Long Yu, Shaofeng Zhou, Shanhang Huang

Summary: In this study, a new algorithm called Multi-Curriculum Pseudo-Labeling (MCPL) is proposed to address the issue of data imbalance in medical image tasks. By evaluating the learning status of the model for each class and automatically adjusting the thresholds, adaptive pseudo-label generation for each class is achieved. Experimental results demonstrate that our method outperforms fully supervised baseline and other existing methods in medical image classification tasks.

MEDICAL PHYSICS (2023)

Article Computer Science, Information Systems

Flow Topology-Based Graph Convolutional Network for Intrusion Detection in Label-Limited IoT Networks

Xiaoheng Deng, Jincai Zhu, Xinjun Pei, Lan Zhang, Zhen Ling, Kaiping Xue

Summary: This paper proposes a Flow Topology based Graph Convolutional Network (FT-GCN) approach for label-limited IoT network intrusion detection. By leveraging flow traffic patterns and flow topological structure, FT-GCN is deployed at edge servers in IoT networks to detect intrusions. It constructs an interval-constrained traffic graph (ICTG) considering the time correlation of traffic flows, and enhances key statistical features of traffic flows using a Node-Level Spatial (NLS) attention mechanism. Intrusion identification in IoT networks is achieved by learning the combined representation of statistical flow features and flow topological structure with the cost-effective Topology Adaptive Graph Convolutional Networks (TAGCN).

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2023)

Article Engineering, Biomedical

FixMatch-LS: Semi-supervised skin lesion classification with label smoothing

Shaofeng Zhou, Shenwei Tian, Long Yu, Weidong Wu, Dezhi Zhang, Zhen Peng, Zhicheng Zhou, Junwen Wang

Summary: Recent research in semi-supervised learning focuses on consistency regularization using data augmentation, while the more general method of pseudolabelling is limited by noisy training. Medical datasets have a long-tail distribution, and combining these limitations, we propose FixMatch-LS and its variant FixMatch-LS-v2 for medical image classification. We introduce label smoothing to adjust the pseudolabel threshold and reduce the influence of noisy pseudolabels, and emphasize the importance of consistency for pseudolabelling to improve pseudolabel quality. The framework is validated on skin lesion diagnoses from the ISIC 2018 and ISIC 2019 challenges, achieving AUCs of 91.63%, 93.70%, 94.46%, and 95.44% on different proportions of labelled data from ISIC 2018.

BIOMEDICAL SIGNAL PROCESSING AND CONTROL (2023)

Article Computer Science, Information Systems

CyberEntRel: Joint extraction of cyber entities and relations using deep learning

Kashan Ahmed, Syed Khaldoon Khurshid, Sadaf Hina

Summary: This paper mainly introduces the construction of the cyber threat intelligence knowledge graph and the information extraction technique. By using joint extraction technique, it solves the problem of traditional techniques becoming ineffective due to the increasing size of CTI data. Experimental results show that this technique outperforms state-of-the-art models in knowledge triple extraction on CTI data and improves the F1 score.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Enhance membership inference attacks in federated learning

Xinlong He, Yang Xu, Sicong Zhang, Weida Xu, Jiale Yan

Summary: This paper proposes a new membership inference attack method in federated learning, which utilizes data poisoning and sequence prediction confidence. The attack is effective and results in minimal overall model performance degradation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters

Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu

Summary: In this paper, the authors propose a deep learning based dynamic malware detection method called CTIMD, which integrates threat knowledge from CTIs into the learning process of API call sequences with runtime parameters. Experimental results show that CTIMD outperforms existing methods in terms of performance.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

SuM: Efficient shadow stack protection on ARM Cortex-M

Wonwoo Choi, Minjae Seo, Seongman Lee, Brent Byunghoon Kang

Summary: This paper proposes SUM, a backward-edge control flow protection scheme for ARM Cortex-M processors. It combines MPU and the overlooked hardware feature FaultMask to achieve efficient and robust protection. The empirical evaluation shows minimal runtime overhead for the proposed solution.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Which factors predict susceptibility to phishing? An empirical study

Liliana Ribeiro, Ines Sousa Guedes, Carla Sofia Cardoso

Summary: Phishing susceptibility is influenced by individual and contextual factors. The study found that individuals who perceive themselves as capable of detecting phishing and those who use online services more frequently are more susceptible to phishing. However, technology competencies and other individual variables do not predict phishing susceptibility.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Optimization-based adversarial perturbations against twin support vector machines

Wenjie Wang, Yuanhai Shao, Yiju Wang

Summary: In this paper, we investigate the adversarial perturbations of twin support vector machines (TWSVMs) and propose an optimization framework, which provides explicit solutions to increase the interpretability of the conclusion and convenience for calculation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability

Snofy D. Dunston, V. Mary Anita Rajam

Summary: This paper proposes a novel adversarial attack technique that can synthesize adversarial images to mislead deep learning models, and also studies interpretability plots. The research findings show that the proposed attack technique influences the interpretability plots, regardless of the success of the attack.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Protocol clustering of unknown traffic based on embedding of protocol specification

Junchen Li, Guang Cheng, Zongyao Chen, Peng Zhao

Summary: Protocol Reverse Engineering (PRE) is a direct approach for analyzing unknown traffic. This paper proposes a method for clustering unknown traffic based on private protocol labels, and the experimental results demonstrate its advantages on real-world network traffic.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

When explainability turns into a threat- using xAI to fool a fake news detection method

Rafal Kozik, Massimo Ficco, Aleksandra Pawlicka, Marek Pawlicki, Francesco Palmieri, Michal Choras

Summary: The inclusion of Explainability of Artificial Intelligence (xAI) has become a mandatory requirement for designing and implementing reliable, interpretable, and ethical AI solutions. However, it has been shown that xAI can enable successful adversarial attacks in the domain of fake news detection, leading to a decrease in AI security. This paper presents an attack scheme that uses an explainable solution to reshape the structure of the original message, allowing the adversary to manipulate the model's prediction while keeping the message's meaning intact.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Ensuring secure interoperation of access control in a multidomain environment

Benyuan Yang, Lili Luo, Zhimeng Wang

Summary: Interoperation is widely used in practical industrial applications, but merging local access control policies may lead to security violations. Dealing with these issues in a multidomain environment is critical, but finding the maximum secure interoperation among individual systems poses a challenge due to the large number of entities and access involved.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification

Binghui Zou, Chunjie Cao, Longjuan Wang, Sizheng Fu, Tonghua Qiao, Jingzhang Sun

Summary: The ongoing struggle between security researchers and malware has led to the exploration of using convolutional neural networks and capsule networks for classification and identification of malware. However, training these networks requires a significant amount of data and parameters, and the research on capsule networks is still in its early stages, posing challenges.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model

Hongsong Chen, Xingyu Li, Wenmao Liu

Summary: Multivariate time-series anomaly detection is crucial for maintaining normal operation of physical equipment. Recent advances have been made in this field, but two challenges have limited the model's ability to generalize. To address these challenges, a multivariate time-series anomaly detection model consisting of a characterization network and a forecasting network is proposed. Experimental results demonstrate that this method outperforms baseline methods in terms of detection performance and robustness.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FLAD: Adaptive Federated Learning for DDoS attack detection

Roberto Doriguzzi-Corin, Domenico Siracusa

Summary: This paper discusses the application of federated learning in the field of cybersecurity and proposes an adaptive mechanism-based federated learning solution for DDoS attack detection in dynamic cybersecurity scenarios. Through experiments, it is demonstrated that the proposed solution outperforms state-of-the-art federated learning algorithms in terms of convergence time and accuracy.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Municipality2HTTPS: A study on HTTPS protocol's usage in Italian municipalities' websites

Antonio Giovanni Schiavone

Summary: The usage of HTTPS protocol is crucial for secure communication with websites, ensuring the confidentiality, integrity, and authenticity of online data transmissions. The Municipality2HTTPS research project analyzed the implementation of HTTPS in Italian municipalities' websites and identified areas for improvement.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Hello me, meet the real me: Voice synthesis attacks on voice assistants

Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis

Summary: Voice Assistants (VAs) are widely used in smart devices, but are vulnerable to attacks, as shown by experiments with popular VAs revealing successful attack rates exceeding 30% and statistical variations among vendors, calling for additional countermeasures to protect user information.

COMPUTERS & SECURITY (2024)