{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T11:02:13Z","timestamp":1756810933559,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T00:00:00Z","timestamp":1697673600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T00:00:00Z","timestamp":1697673600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61806138"],"award-info":[{"award-number":["No. 61806138"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Central Government Guides Local Science and Technology Development Fund","award":["No. YDZJSX2021A038"],"award-info":[{"award-number":["No. YDZJSX2021A038"]}]},{"DOI":"10.13039\/501100018611","name":"International Science and Technology Cooperation Program of Shanxi Province","doi-asserted-by":"publisher","award":["No. 201903D421048"],"award-info":[{"award-number":["No. 201903D421048"]}],"id":[{"id":"10.13039\/501100018611","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10489-023-05049-7","type":"journal-article","created":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T16:01:38Z","timestamp":1697731298000},"page":"28865-28878","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A multi-objective sequential three-way decision approach for real-time malware detection"],"prefix":"10.1007","volume":"53","author":[{"given":"Zhuoxuan","family":"Lan","sequence":"first","affiliation":[]},{"given":"Binquan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Wen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7388-3180","authenticated-orcid":false,"given":"Zhihua","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Xiao-Zhi","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,19]]},"reference":[{"issue":"12","key":"5049_CR1","doi-asserted-by":"publisher","first-page":"155014771774784","DOI":"10.1177\/1550147717747847","volume":"13","author":"C She","year":"2017","unstructured":"She C, Ma Y, Wang J, Jia L (2017) An improved malicious code intrusion detection method based on target tree for space information network. Int J Distrib Sens Netw 13(12):1550147717747847","journal-title":"Int J Distrib Sens Netw"},{"key":"5049_CR2","doi-asserted-by":"crossref","unstructured":"Zhang Y, Liu Z, Jiang Y (2020)  The classification and detection of malware using soft relevance evaluation.\u00a0IEEE Trans Reliab\u00a071(1):309\u2013320","DOI":"10.1109\/TR.2020.3020954"},{"key":"5049_CR3","doi-asserted-by":"crossref","unstructured":"Zhu X, Li Q, Chen Z, Zhang G, Shan P (2020) Research on security detection technology for internet of things terminal based on Firmware Code genes.\u00a0IEEE Access\u00a08:150226\u2013150241","DOI":"10.1109\/ACCESS.2020.3017088"},{"key":"5049_CR4","doi-asserted-by":"publisher","unstructured":"Wong MY, Lie D (2016) IntelliDroid: a targeted input generator for the dynamic analysis of android malware.\u00a0NDSS 16(2016). https:\/\/doi.org\/10.14722\/ndss.2016.23118","DOI":"10.14722\/ndss.2016.23118"},{"key":"5049_CR5","doi-asserted-by":"crossref","unstructured":"Liu Y, Tantithamthavorn C, Li L, Liu Y (2022) Deep Learn Android Malware Defenses: A\u00a0systematic literature review[J].\u00a0ACM Comput Surv 55(8):1\u201336","DOI":"10.1145\/3544968"},{"key":"5049_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100529","volume":"47","author":"SC Sethuraman","year":"2023","unstructured":"Sethuraman SC (2023) A comprehensive survey on deep learning based malware detection techniques. Comput Sci Rev 47:100529","journal-title":"Comput Sci Rev"},{"key":"5049_CR7","doi-asserted-by":"publisher","first-page":"102037","DOI":"10.1016\/j.cose.2020.102037","volume":"99","author":"S Jha","year":"2020","unstructured":"Jha S, Prashar D, Long HV, Taniar D (2020) Recurrent neural network for detecting malware. Comput Secur 99:102037","journal-title":"Comput Secur"},{"issue":"2","key":"5049_CR8","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MNET.011.2000331","volume":"35","author":"Z Cui","year":"2021","unstructured":"Cui Z, Zhao Y, Cao Y, Cai X, Zhang W, Chen J (2021) Malicious code detection under 5G HetNets based on a multi-objective RBM Model. IEEE Network 35(2):82\u201387","journal-title":"IEEE Network"},{"issue":"5","key":"5049_CR9","doi-asserted-by":"publisher","first-page":"3770","DOI":"10.1109\/JIOT.2021.3100063","volume":"9","author":"B Yuan","year":"2022","unstructured":"Yuan B, Wang J, Wu P, Qing X (2022) IoT Malware classification based on Lightweight Convolutional neural networks. IEEE Internet Things J 9(5):3770\u20133783","journal-title":"IEEE Internet Things J"},{"key":"5049_CR10","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.ins.2016.09.037","volume":"374","author":"M Nauman","year":"2016","unstructured":"Nauman M, Azam N, Yao J (2016) A three-way decision making approach to malware analysis using probabilistic rough sets. Inf Sci 374:193\u2013209","journal-title":"Inf Sci"},{"key":"5049_CR11","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1016\/j.ijar.2022.11.007","volume":"152","author":"X Yang","year":"2023","unstructured":"Yang X, Li Y, Li T (2023) A review of sequential three-way decision and multi-granularity learning. Int J Approximate Reasoning 152:414\u2013433","journal-title":"Int J Approximate Reasoning"},{"issue":"2","key":"5049_CR12","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.ijar.2007.05.019","volume":"49","author":"Y Yao","year":"2008","unstructured":"Yao Y (2008) Probabilistic rough set approximations. Int J Approximate Reasoning 49(2):255\u2013271","journal-title":"Int J Approximate Reasoning"},{"key":"5049_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105350","volume":"192","author":"Q Zhang","year":"2020","unstructured":"Zhang Q, Pang G, Wang G (2020) A novel sequential three-way decisions model based on penalty function. Knowl Based Syst 192:105350","journal-title":"Knowl Based Syst"},{"key":"5049_CR14","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.knosys.2017.07.031","volume":"134","author":"X Yang","year":"2017","unstructured":"Yang X, Li T, Fujita H, Liu D, Yao Y (2017) A unified model of sequential three-way decisions and multilevel incremental processing. Knowl Based Syst 134:172\u2013188","journal-title":"Knowl Based Syst"},{"key":"5049_CR15","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) ImageNet classification deep convolutional\u00a0neural networks[J]. Adv Neural Inf Proces Syst 25"},{"issue":"7","key":"5049_CR16","doi-asserted-by":"publisher","first-page":"3330","DOI":"10.1109\/TCYB.2019.2894498","volume":"50","author":"L Wang","year":"2020","unstructured":"Wang L, Qian X, Zhang Y, Shen J, Cao X (2020) Enhancing sketch-based image Retrieval by CNN semantic re-ranking. IEEE Trans Cybernetics 50(7):3330\u20133342","journal-title":"IEEE Trans Cybernetics"},{"key":"5049_CR17","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.jpdc.2019.03.010","volume":"129","author":"Z Cui","year":"2019","unstructured":"Cui Z, Du L, Wang P, Cai X, Zhang W (2019) Malicious code detection based on CNNs and multi-objective algorithm. J Parallel Distrib Comput 129:50\u201358","journal-title":"J Parallel Distrib Comput"},{"issue":"2","key":"5049_CR18","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/TSMC.2020.3018757","volume":"52","author":"Y Yu","year":"2022","unstructured":"Yu Y, Cao Z, Liu Z, Geng W, Yu J, Zhang W (2022) A Two-Stream CNN with simultaneous detection and segmentation for robotic grasping. IEEE Trans Syst Man Cybernetics: Syst 52(2):1167\u20131181","journal-title":"IEEE Trans Syst Man Cybernetics: Syst"},{"issue":"6","key":"5049_CR19","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1016\/j.ins.2010.11.019","volume":"181","author":"Y Yao","year":"2011","unstructured":"Yao Y (2011) The superiority of three-way decisions in probabilistic rough set models. Inf Sci 181(6):1080\u20131096","journal-title":"Inf Sci"},{"key":"5049_CR20","doi-asserted-by":"crossref","unstructured":"Yao Y (2015) Rough sets and three-way decisions[C]. In Rough Sets and Knowledge Technology: 10th International Conference, RSKT 2015, Held as Part of the International Joint Conference on Rough Sets, IJCRS 2015, Tianjin, China, November 20-23, 2015, Proceedings 10. Springer International Publishing, pp 62\u201373","DOI":"10.1007\/978-3-319-25754-9_6"},{"issue":"12","key":"5049_CR21","doi-asserted-by":"publisher","first-page":"9645","DOI":"10.1109\/JIOT.2020.3040019","volume":"8","author":"X Cai","year":"2021","unstructured":"Cai X, Geng S, Wu D, Cai J, Chen J (2021) A multicloud-model-based many-objective intelligent algorithm for efficient task scheduling in internet of things. IEEE Internet Things J 8(12):9645\u20139653","journal-title":"IEEE Internet Things J"},{"key":"5049_CR22","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-41299-8_3","volume-title":"Rough sets and Knowledge Technology","author":"Y Yao","year":"2013","unstructured":"Yao Y (2013) Granular Computing and Sequential three-way decisions. Rough sets and Knowledge Technology. Springer, Berlin, pp 16\u201327"},{"key":"5049_CR23","doi-asserted-by":"crossref","unstructured":"Li B, Li J, Tang K, Yao X (2015) Many-objective evolutionary algorithms: A survey[J]. ACM Comput Surv (CSUR) 48(1):1\u201335","DOI":"10.1145\/2792984"},{"issue":"1","key":"5049_CR24","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s13042-021-01367-9","volume":"13","author":"Q Zhang","year":"2022","unstructured":"Zhang Q, Zhi X, Dai Y, Wang G (2022) Democratic three-way decisions based on voting mechanism. Int J Mach Learn Cybernet 13(1):99\u2013114","journal-title":"Int J Mach Learn Cybernet"},{"issue":"2","key":"5049_CR25","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb K, Pratap A, Agarwal S, Meyarivan T (2002) A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans Evol Comput 6(2):182\u2013197","journal-title":"IEEE Trans Evol Comput"},{"key":"5049_CR26","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.ins.2017.08.066","volume":"420","author":"Q Zhang","year":"2017","unstructured":"Zhang Q, Xia D, Wang G (2017) Three-way Decis model two types Classif errors. Inform Sci 420:431\u2013453","journal-title":"Inform Sci"},{"key":"5049_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106526","volume":"212","author":"Q Zhang","year":"2021","unstructured":"Zhang Q, Huang Z, Wang G (2021) A novel sequential three-way decision model with autonomous error correction. Knowl Based Syst 212:106526","journal-title":"Knowl Based Syst"},{"key":"5049_CR28","unstructured":"Zitzler E, Laumanns M, Thiele L (2001) SPEA2: improving the strength Pareto evolutionary algorithm. TIK-Report, 103"},{"issue":"6","key":"5049_CR29","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1109\/TEVC.2007.892759","volume":"11","author":"Q Zhang","year":"2007","unstructured":"Zhang Q, Li H (2007) MOEA\/D: a Multiobjective Evolutionary Algorithm based on decomposition. IEEE Trans Evol Comput 11(6):712\u2013731","journal-title":"IEEE Trans Evol Comput"},{"issue":"7","key":"5049_CR30","doi-asserted-by":"publisher","first-page":"3187","DOI":"10.1109\/TII.2018.2822680","volume":"14","author":"Z Cui","year":"2018","unstructured":"Cui Z, Xue F, Cai X, Cao Y, Wang Gg, Chen J (2018) Detection of malicious code variants based on deep learning. IEEE Trans Industr Inf 14(7):3187\u20133196","journal-title":"IEEE Trans Industr Inf"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-023-05049-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-023-05049-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-023-05049-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,29]],"date-time":"2023-11-29T14:25:17Z","timestamp":1701267917000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-023-05049-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,19]]},"references-count":30,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["5049"],"URL":"https:\/\/doi.org\/10.1007\/s10489-023-05049-7","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2023,10,19]]},"assertion":[{"value":"26 September 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}}]}}