{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T21:12:45Z","timestamp":1770153165139,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819564187","type":"print"},{"value":"9789819564194","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6419-4_6","type":"book-chapter","created":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:58:08Z","timestamp":1770109088000},"page":"99-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["MEMC: A Lightweight Image-Based Malware Classifier Based on Improved Shuffle and Coordination Attention"],"prefix":"10.1007","author":[{"given":"Linquan","family":"Huang","sequence":"first","affiliation":[]},{"given":"Chuanqi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,4]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104082","volume":"148","author":"AJ Rose","year":"2025","unstructured":"Rose, A.J., Schubert-Kabban, C.M., Graham, S.R., Henry, W.C., Rondeau, C.M.: Malware classification through abstract syntax trees and L-moments. Comput. Secur. 148, 104082 (2025)","journal-title":"Comput. Secur."},{"issue":"1","key":"6_CR2","doi-asserted-by":"publisher","first-page":"23","DOI":"10.3390\/make7010023","volume":"7","author":"J Arrowsmith","year":"2025","unstructured":"Arrowsmith, J., Susnjak, T., Jang-Jaccard, J.: Multimodal deep learning for android malware classification. Mach. Learn. Knowl. Extr. 7(1), 23 (2025)","journal-title":"Mach. Learn. Knowl. Extr."},{"key":"6_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100529","volume":"47","author":"M Gopinath","year":"2023","unstructured":"Gopinath, M., Sethuraman, S.C.: A comprehensive survey on deep learning based malware detection techniques. Comput Sci Rev. 47, 100529 (2023)","journal-title":"Comput Sci Rev"},{"key":"6_CR4","first-page":"423","volume-title":"ML4CS","author":"C Yun","year":"2024","unstructured":"Yun, C., Zhou, L., Xing, S., Yang, N., Zhao, P., Chen, Z.: LMCF-FS: A novel lightweight malware classification framework driven by feature selection. In: ML4CS, pp. 423\u2013437 (2024)"},{"key":"6_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2025.104507","volume":"156","author":"S Andriani","year":"2025","unstructured":"Andriani, S., Galantucci, S., Iannacone, A., Maci, A., Pirlo, G.: CNN-AutoMIC: combining convolutional neural network and autoencoder to learn non-linear features for KNN-based malware image classification. Comput. Secur. 156, 104507 (2025)","journal-title":"Comput. Secur."},{"key":"6_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2025.104495","volume":"156","author":"D Gibert","year":"2025","unstructured":"Gibert, D., Totosis, N., Patsakis, C., Le, Q., Zizzo, G.: Assessing the impact of packing on static machine learning-based malware detection and classification systems [J]. Comput. Secur. 156, 104495 (2025)","journal-title":"Comput. Secur."},{"issue":"4","key":"6_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/cpe.7928","volume":"36","author":"MD Shelar","year":"2024","unstructured":"Shelar, M.D., Srinivasa Rao, S.: Enhanced capsule network-based executable files malware detection and classification-deep learning approach. Concurr. Comput. Pract. Exp. 36(4), 1\u201318 (2024)","journal-title":"Concurr. Comput. Pract. Exp."},{"issue":"1","key":"6_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3688833","volume":"34","author":"H Zhao","year":"2025","unstructured":"Zhao, H., Wu, Y., Zou, D., Yang, L., Jin, H.: MalSensor: fast and robust windows malware classification. ACM Trans. Softw. Eng. Methodol. 34(1), 1\u201328 (2025)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"6_CR9","first-page":"4","volume-title":"VizSEC","author":"S Lakshmanan Nataraj","year":"2011","unstructured":"Lakshmanan Nataraj, S., Karthikeyan, G., Jacob, B.S., Manjunath.: Malware images: visualization and automatic classification. In: VizSEC, p. 4 (2011)"},{"key":"6_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2025.113855","volume":"323","author":"Muhammed Mutlu Yapici","year":"2025","unstructured":"Muhammed Mutlu Yapici: A novel image based approach for mobile android malware detection and classification. Knowl.-Based Syst. 323, 113855 (2025)","journal-title":"Knowl.-Based Syst."},{"key":"6_CR11","first-page":"92","volume-title":"EICC","author":"C Reilly","year":"2023","unstructured":"Reilly, C., O'Shaughnessy, S., Thorpe, C.: Robustness of image-based malware classification models trained with generative adversarial networks. In: EICC, pp. 92\u201399 (2023)"},{"key":"6_CR12","volume":"83","author":"F Wang","year":"2024","unstructured":"Wang, F., et al: MalSort: lightweight and efficient image-based malware classification using masked self-supervised framework with Swin transformer. J. Inf. Secur. Appl. 83, 103784 (2024)","journal-title":"J. Inf. Secur. Appl."},{"issue":"4","key":"6_CR13","doi-asserted-by":"publisher","first-page":"3961","DOI":"10.1109\/JIOT.2024.3485765","volume":"12","author":"Y Zhang","year":"2025","unstructured":"Zhang, Y., Zhu, Y., Liu, J., Wei, Y., Jiang, C.: An interpretability optimization method for deep learning networks based on grad-CAM. IEEE Internet Things J. 12(4), 3961\u20133970 (2025)","journal-title":"IEEE Internet Things J."},{"key":"6_CR14","first-page":"1","volume-title":"ICC","author":"Y Qiao","year":"2020","unstructured":"Qiao, Y., Zhang, B., Zhang, W.: Malware classification method based on word vector of bytes and multilayer perception. In: ICC, pp. 1\u20136 (2020)"},{"key":"6_CR15","first-page":"121","volume-title":"AISec@CCS","author":"E Raff","year":"2017","unstructured":"Raff, E., Sylvester, J., Nicholas, C.: Learning the PE header, malware detection with minimal domain knowledge. In: AISec@CCS, pp. 121\u2013132 (2017)"},{"key":"6_CR16","first-page":"3","volume-title":"ICIST","author":"A Nakrosis","year":"2022","unstructured":"Nakrosis, A., Lagzdinyte-Budnike, I., Paulauskaite-Taraseviciene, A., Paulikas, G., Dapkus, P.: Deep learning-based malware detection using PE headers. In: ICIST, pp. 3\u201318 (2022)"},{"key":"6_CR17","first-page":"1","volume-title":"ARES","author":"A Aldini","year":"2024","unstructured":"Aldini, A., Petrelli, T.: Image-based detection and classification of android malware through CNN models. In: ARES, pp. 1\u201311 (2024)"},{"issue":"2","key":"6_CR18","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1109\/TC.2022.3160357","volume":"72","author":"F Zhong","year":"2023","unstructured":"Zhong, F., Chen, Z., Minghui, X., Zhang, G., Dongxiao, Y., Cheng, X.: Malware-on-the-brain: illuminating malware byte codes with images for malware classification. IEEE Trans. Comput. 72(2), 438\u2013451 (2023)","journal-title":"IEEE Trans. Comput."},{"key":"6_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102420","volume":"110","author":"M Xiao","year":"2021","unstructured":"Xiao, M., Guo, C., Shen, G., Cui, Y., Jiang, C.: Image-based malware classification using section distribution information. Comput. Secur. 110, 102420 (2021)","journal-title":"Comput. Secur."},{"key":"6_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103084","volume":"126","author":"H Deng","year":"2023","unstructured":"Deng, H., Guo, C., Shen, G., Cui, Y., Ping, Y.: MCTVD: a malware classification method based on three-channel visualization and deep learning. Comput. Secur. 126, 103084 (2023)","journal-title":"Comput. Secur."},{"key":"6_CR21","unstructured":"Royi Ronen, Marian Radu, Corina Feuerstein, Elad Yom-Tov, Mansour Ahmadi. Microsoft Malware Classification Challenge. CoRR abs\/1802.10135, (2018)"},{"issue":"8","key":"6_CR22","doi-asserted-by":"publisher","first-page":"259","DOI":"10.3390\/fi16080259","volume":"16","author":"N Okazaki","year":"2024","unstructured":"Okazaki, N., et al.: Optimal weighted voting-based collaborated malware detection for zero-day malware: a case study on VirusTotal and MalwareBazaar. Future Internet. 16(8), 259 (2024)","journal-title":"Future Internet"},{"key":"6_CR23","unstructured":"MalwareBazaar: Retrieved from https:\/\/bazaar.abuse.ch\/, (2025)"},{"key":"6_CR24","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/3427228.3427261","volume-title":"ACSAC","author":"S Sebasti\u00e1n","year":"2020","unstructured":"Sebasti\u00e1n, S., Caballero, J.: AVclass2: massive malware tag extraction from AV labels. In: ACSAC, pp. 42\u201353 (2020)"},{"key":"6_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.112635","volume":"170","author":"A Amelio","year":"2025","unstructured":"Amelio, A., et al.: A fine-grained approach for visual interpretability of convolutional neural networks. Appl. Soft Comput. 170, 112635 (2025)","journal-title":"Appl. Soft Comput."},{"key":"6_CR26","first-page":"13713","volume-title":"CVPR","author":"Q Hou","year":"2021","unstructured":"Hou, Q., Zhou, D., Feng, J.: Coordinate attention for efficient Mobile network design. In: CVPR, pp. 13713\u201313722 (2021)"},{"key":"6_CR27","first-page":"122","volume-title":"ECCV","author":"N Ma","year":"2018","unstructured":"Ma, N., Zhang, X., Zheng, H.-T., Sun, J.: ShuffleNet V2: practical guidelines for efficient CNN architecture design. In: ECCV, pp. 122\u2013138 (2018)"},{"key":"6_CR28","first-page":"1011","volume-title":"ICMLA","author":"ERS De Rezende","year":"2017","unstructured":"De Rezende, E.R.S., Ruppert, G.C.S., Carvalho, T.J., Ramos, F., de Geus, P.L.: Malicious software classification using transfer learning of ResNet-50 deep neural network [C]. In: ICMLA, pp. 1011\u20131014 (2017)"},{"key":"6_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102515","volume":"112","author":"A Tekerek","year":"2022","unstructured":"Tekerek, A., Yapici, M.M.: A novel malware classification and augmentation model based on convolutional neural network. Comput. Secur. 112, 102515 (2022)","journal-title":"Comput. Secur."},{"key":"6_CR30","volume":"69","author":"R Chaganti","year":"2022","unstructured":"Chaganti, R., Ravi, V., Pham, T.D.: Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification. J. Inf. Secur. Appl. 69, 103306 (2022)","journal-title":"J. Inf. Secur. Appl."},{"key":"6_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107138","volume":"171","author":"D Vasan","year":"2020","unstructured":"Vasan, D., Alazab, M., Wassan, S., Naeem, H., Safaei, B., Qin, Z.: IMCFN: image-based malware classification using fine-tuned convolutional neural network architecture [J]. Comput. Netw. 171, 107138 (2020)","journal-title":"Comput. Netw."}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6419-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:58:10Z","timestamp":1770109090000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6419-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819564187","9789819564194"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6419-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"4 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/nss-socialsec2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}