|
[1]
|
Komatwar, R. and Kokare, M. (2021) Retracted Article: A Survey on Malware Detection and Classification. Journal of Applied Security Research, 16, 390-420. [Google Scholar] [CrossRef]
|
|
[2]
|
国家互联网应急中心. 2021年上半年我国互联网网络安全监测数据分析报告[R].
https://www.cert.org.cn/publish/main/upload/File/first-half%20%20year%20cyberseurity%20report%202021.pdf
|
|
[3]
|
Qi, P., Zhang, Z., Wang, W., et al. (2021) Malware Detection by Exploiting Deep Learning over Binary Programs. 2020 25th International Conference on Pattern Recognition (ICPR) IEEE, Milan, 10-15 January 2021, 9068-9075. [Google Scholar] [CrossRef]
|
|
[4]
|
Gibert, D., Mateu, C., Planes, J., et al. (2018) Classification of Malware by Using Structural Entropy on Convolutional Neural Networks. Proceedings of the AAAI Conference on Artificial Intelligence, 32, 7759-7764. [Google Scholar] [CrossRef]
|
|
[5]
|
Ye, Y., Chen, L., Hou, S., et al. (2018) DeepAM: A Heterogeneous Deep Learning Framework for Intelligent Malware Detection. Knowledge and Information Systems, 54, 265-285.
|
|
[6]
|
Wang, S., Zhou, G., Lu, J., et al. (2019) A Novel Malware Detection and Classification Method Based on Capsule Network. In: Sun, X.M., Pan, Z.Q. and Bertino, E., Eds., International Conference on Artificial Intelligence and Security, Springer, Cham, 573-584. [Google Scholar] [CrossRef]
|
|
[7]
|
Albahar, M.A., ElSayed, M.S. and Jurcut, A. (2022) A Modified ResNeXt for Android Malware Identification and Classification. Computational Intelligence and Neuroscience, 2022, Article ID: 8634784. [Google Scholar] [CrossRef] [PubMed]
|
|
[8]
|
张柏翰, 凌捷. 改进的基于DNN的恶意软件检测方法[J]. 计算机工程与应用, 2021, 57(10): 81-87.
|
|
[9]
|
Sun, R., Yuan, X., He, P., et al. (2017) Learning Fast and Slow: Propedeutica for Real-Time Malware Detection. IEEE Transactions on Neural Networks and Learning Systems, 33, 2518-2529.
|
|
[10]
|
Hu, X., Sun, R., Xu, K., et al. (2020) Exploit Internal Structural Information for IoT Malware Detection Based on Hierarchical Transformer Model. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, 29 December-1 January 2021, 927-934. [Google Scholar] [CrossRef]
|
|
[11]
|
Anderson, H.S. and Roth, P. (2018) Ember: An Open Dataset for Training Static PE Malware Machine Learning Models.
|
|
[12]
|
Abbasi, E., Moghaddam, M.R.A. and Kowsari, E. (2022) A Systematic and Critical Review on Development of Machine Learning Based-Ensemble Models for Prediction of Adsorption Process Efficiency. Journal of Cleaner Production, 379, Article ID: 134588. [Google Scholar] [CrossRef]
|
|
[13]
|
金逸灵, 陈兴蜀, 王玉龙. 基于LSTM-CNN的容器内恶意软件静态检测[J]. 计算机应用研究, 2020, 37(12): 3704-3707+3711. [Google Scholar] [CrossRef]
|
|
[14]
|
傅依娴, 芦天亮, 马泽良. 基于One-Hot的CNN恶意代码检测技术[J]. 计算机应用与软件, 2020, 37(1): 304-308+333.
|
|
[15]
|
Abdi, H. and Williams, L.J. (2010) Principal Component Analysis. Wiley Interdisciplinary Reviews: Computational Statistics, 2, 433-459. [Google Scholar] [CrossRef]
|
|
[16]
|
Vaswani, A., Shazeer, N., Parmar, N., et al. (2017) Attention Is All You Need. 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, 4-9 December 2017, 30.
|
|
[17]
|
Dosovitskiy, A., Beyer, L., Kolesnikov, A., et al. (2020) An Image Is Worth 16x16 Words: Transformers for Image Recognition at Scale.
|
|
[18]
|
Hu, J., Shen, L. and Sun, G. (2018) Squeeze-and-Excitation Networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, 18-23 June 2018, 7132-7141. [Google Scholar] [CrossRef]
|
|
[19]
|
He, K., Zhang, X., Ren, S., et al. (2016) Deep Residual Learning for Image Recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, 27-30 June 2016, 770-778. [Google Scholar] [CrossRef]
|