{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:37:55Z","timestamp":1743003475298,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031092817"},{"type":"electronic","value":"9783031092824"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-09282-4_31","type":"book-chapter","created":{"date-parts":[[2022,5,28]],"date-time":"2022-05-28T13:05:49Z","timestamp":1653743149000},"page":"368-379","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Malware Detection Using Pseudo Semi-Supervised Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5576-1777","authenticated-orcid":false,"given":"Upinder","family":"Kaur","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9325-6384","authenticated-orcid":false,"given":"Xin","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1871-9887","authenticated-orcid":false,"given":"Richard M.","family":"Voyles","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6458-4365","authenticated-orcid":false,"given":"Byung-Cheol","family":"Min","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,29]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Almeshekah, M.H., Spafford, E.H.: Planning and integrating deception into computer security defenses. In: Proceedings of the 2014 New Security Paradigms Workshop, pp. 127\u2013138 (2014)","DOI":"10.1145\/2683467.2683482"},{"key":"31_CR2","unstructured":"Anderson, H.S., Roth, P.: EMBER: an open dataset for training static PE malware machine learning models. CoRR abs\/1804.04637 (2018). http:\/\/arxiv.org\/abs\/1804.04637"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Athiwaratkun, B., Stokes, J.W.: Malware classification with LSTM and GRU language models and a character-level CNN. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2482\u20132486 (2017)","DOI":"10.1109\/ICASSP.2017.7952603"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Bisio, F., Gastaldo, P., Zunino, R., Decherchi, S.: Semi-supervised machine learning approach for unknown malicious software detection. In: 2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings, pp. 52\u201359. IEEE (2014)","DOI":"10.1109\/INISTA.2014.6873597"},{"issue":"11","key":"31_CR5","doi-asserted-by":"publisher","first-page":"3363","DOI":"10.1109\/TGRS.2006.877950","volume":"44","author":"L Bruzzone","year":"2006","unstructured":"Bruzzone, L., Chi, M., Marconcini, M.: A novel transductive svm for semisupervised classification of remote-sensing images. IEEE Trans. Geosci. Remote Sens. 44(11), 3363\u20133373 (2006)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"31_CR6","unstructured":"Fujiwara, Y., Irie, G.: Efficient label propagation. In: International Conference on Machine Learning, pp. 784\u2013792 (2014)"},{"issue":"1","key":"31_CR7","doi-asserted-by":"publisher","first-page":"409","DOI":"10.3233\/JIFS-179096","volume":"37","author":"H Huang","year":"2019","unstructured":"Huang, H., Deng, H., Sheng, Y., Ye, X.: Accelerating convolutional neural network-based malware traffic detection through ant-colony clustering. J. Intell. Fuzzy Syst. 37(1), 409\u2013423 (2019)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"31_CR8","unstructured":"Lee, D.H.: Pseudo-label: the simple and efficient semi-supervised learning method for deep neural networks. In: Workshop on Challenges in Representation Learning, ICML, vol. 3 (2013)"},{"key":"31_CR9","unstructured":"Miyato, T., Dai, A.M., Goodfellow, I.: Adversarial training methods for semi-supervised text classification. arXiv preprint arXiv:1605.07725 (2016)"},{"key":"31_CR10","doi-asserted-by":"publisher","unstructured":"Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security, VizSec 2011. Association for Computing Machinery, New York (2011). https:\/\/doi.org\/10.1145\/2016904.2016908","DOI":"10.1145\/2016904.2016908"},{"key":"31_CR11","unstructured":"Oliver, A., Odena, A., Raffel, C., Cubuk, E.D., Goodfellow, I.J.: Realistic evaluation of deep semi-supervised learning algorithms. Curran Associates Inc. (2018)"},{"key":"31_CR12","unstructured":"Raff, E., Barker, J., Sylvester, J., Brandon, R., Catanzaro, B., Nicholas, C.: Malware detection by eating a whole exe. In: AAAI Workshop on Artificial Intelligence for Cyber Security (2018)"},{"key":"31_CR13","doi-asserted-by":"publisher","unstructured":"Raff, E., Sylvester, J., Nicholas, C.: Learning the PE header, malware detection with minimal domain knowledge. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp. 121\u2013132, AISec 2017. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3128572.3140442","DOI":"10.1145\/3128572.3140442"},{"issue":"1","key":"31_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-016-0283-1","volume":"14","author":"E Raff","year":"2016","unstructured":"Raff, E., et al.: An investigation of byte n-gram features for malware classification. J. Comput. Virol. Hacking Tech. 14(1), 1\u201320 (2016). https:\/\/doi.org\/10.1007\/s11416-016-0283-1","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"31_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-75496-1_1","volume-title":"Information Security","author":"T Raffetseder","year":"2007","unstructured":"Raffetseder, T., Kruegel, C., Kirda, E.: Detecting system emulators. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 1\u201318. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-75496-1_1"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Rezaei, T., Manavi, F., Hamzeh, A.: A PE header-based method for malware detection using clustering and deep embedding techniques. J. Inf. Secur. Appl. 60, 102876 (2021)","DOI":"10.1016\/j.jisa.2021.102876"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Rieck, K., Trinius, P., Willems, C., Holz, T.: Automatic analysis of malware behavior using machine learning. J. Comput. Secur. 19(4), 639\u2013668 (2011). http:\/\/dblp.uni-trier.de\/db\/journals\/jcs\/jcs19.html#RieckTWH11","DOI":"10.3233\/JCS-2010-0410"},{"key":"31_CR18","doi-asserted-by":"publisher","unstructured":"Santos, I., Sanz, B., Laorden, C., Brezo, F., Bringas, P.G.: Opcode-sequence-based semi-supervised unknown malware detection. In: Herrero, \u00c1., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 50\u201357. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21323-6_7","DOI":"10.1007\/978-3-642-21323-6_7"},{"key":"31_CR19","doi-asserted-by":"crossref","unstructured":"Saxe, J., Berlin, K.: Deep neural network based malware detection using two dimensional binary program features. In: 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), pp. 11\u201320 (2015)","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"31_CR20","doi-asserted-by":"publisher","unstructured":"Shi, W., Gong, Y., Ding, C., Ma, Z., Tao, X., Zheng, N.: Transductive semi-supervised deep learning using min-max features. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11209, pp. 311\u2013327. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01228-1_19","DOI":"10.1007\/978-3-030-01228-1_19"},{"key":"31_CR21","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929\u20131958, 102876 (2014)"},{"key":"31_CR22","unstructured":"Tarvainen, A., Valpola, H.: Mean teachers are better role models: weight-averaged consistency targets improve semi-supervised deep learning results. In: Advances in Neural Information Processing Systems, pp. 1195\u20131204 (2017)"},{"key":"31_CR23","doi-asserted-by":"crossref","unstructured":"Venkatraman, S., Alazab, M.: Use of data visualisation for zero-day malware detection. Secur. Commun. Netw. 2018 (2018)","DOI":"10.1155\/2018\/1728303"},{"key":"31_CR24","doi-asserted-by":"crossref","unstructured":"Venkatraman, S., Alazab, M., Vinayakumar, R.: A hybrid deep learning image-based analysis for effective malware detection. J. Inf. Secur. Appl. 47, 377\u2013389 (2019)","DOI":"10.1016\/j.jisa.2019.06.006"},{"key":"31_CR25","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Venkatraman, S.: Robust intelligent malware detection using deep learning. IEEE Access 7, 46717\u201346738 (2019)","DOI":"10.1109\/ACCESS.2019.2906934"},{"key":"31_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, X., Zhu, P., Tian, J., Zhang, J.: An effective semi-supervised model for intrusion detection using feature selection based LapSVM. In: 2017 International Conference on Computer, Information and Telecommunication Systems (CITS), pp. 283\u2013286. IEEE (2017)","DOI":"10.1109\/CITS.2017.8035323"},{"key":"31_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Ringeval, F., Dong, B., Coutinho, E., Marchi, E., Sch\u00fcller, B.: Enhanced semi-supervised learning for multimodal emotion recognition. In: 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 5185\u20135189. IEEE (2016)","DOI":"10.1109\/ICASSP.2016.7472666"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-09282-4_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,28]],"date-time":"2022-05-28T13:09:38Z","timestamp":1653743378000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-09282-4_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031092817","9783031092824"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-09282-4_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"29 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPRAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icprai2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icprai2022.sciencesconf.org\/1.6.If","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"152","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"98","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}