{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T07:49:33Z","timestamp":1776152973825,"version":"3.50.1"},"reference-count":34,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Engineering Applications of Artificial Intelligence"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.engappai.2026.114580","type":"journal-article","created":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T13:11:36Z","timestamp":1774357896000},"page":"114580","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Multi-view based network for malware classification"],"prefix":"10.1016","volume":"174","author":[{"given":"Lijie","family":"Chu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4382-8323","authenticated-orcid":false,"given":"Yiqian","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuexi","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Jinge","family":"Xing","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2094-6405","authenticated-orcid":false,"given":"Changjian","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"15","key":"10.1016\/j.engappai.2026.114580_bib2","doi-asserted-by":"crossref","first-page":"4581","DOI":"10.3390\/s25154581","article-title":"An explainable hybrid CNN\u2013transformer architecture for visual malware classification","volume":"25","author":"Alshomrani","year":"2025","journal-title":"Sensors"},{"key":"10.1016\/j.engappai.2026.114580_bib3","article-title":"A survey on adversarial attacks for malware analysis","author":"Aryal","year":"2024","journal-title":"IEEE Access"},{"issue":"20","key":"10.1016\/j.engappai.2026.114580_bib4","doi-asserted-by":"crossref","first-page":"4081","DOI":"10.3390\/electronics13204081","article-title":"Enhanced image-based malware classification using transformer-based convolutional neural networks (CNNs)","volume":"13","author":"Ashawa","year":"2024","journal-title":"Electronics"},{"issue":"8","key":"10.1016\/j.engappai.2026.114580_bib5","doi-asserted-by":"crossref","first-page":"3133","DOI":"10.1007\/s00521-020-05195-w","article-title":"VisDroid: Android malware classification based on local and global image features, bag of visual words and machine learning techniques","volume":"33","author":"Bakour","year":"2021","journal-title":"Neural Comput & Applic"},{"key":"10.1016\/j.engappai.2026.114580_bib6","article-title":"Automated behavioral analysis of malware A case study of WannaCry ransomware","author":"Chen","year":"2017","journal-title":"arXiv, Sep. 25"},{"key":"10.1016\/j.engappai.2026.114580_bib7","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.diin.2018.09.006","article-title":"A malware classification method based on memory dump grayscale image","volume":"27","author":"Dai","year":"2018","journal-title":"Digit. Invest."},{"key":"10.1016\/j.engappai.2026.114580_bib8","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2019.102526","article-title":"The rise of machine learning for detection and classification of malware: research developments, trends and challenges","volume":"153","author":"Gibert","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.engappai.2026.114580_bib9","series-title":"2017 IEEE Symposium Series on Computational Intelligence (SSCI)","first-page":"1","article-title":"Malware classification using static analysis based features","author":"Hassen","year":"2017"},{"issue":"5","key":"10.1016\/j.engappai.2026.114580_bib10","doi-asserted-by":"crossref","first-page":"945","DOI":"10.1587\/transinf.E92.D.945","article-title":"Automated malware analysis system and its sandbox for revealing malware's internal and external activities","volume":"E92-D","author":"Inoue","year":"2009","journal-title":"IEICE Trans. Info Syst."},{"key":"10.1016\/j.engappai.2026.114580_bib11","article-title":"On loss functions for deep neural networks in classification","author":"Janocha","year":"2017","journal-title":"arXiv preprint arXiv:1702.05659"},{"key":"10.1016\/j.engappai.2026.114580_bib12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2020.05.026","article-title":"Malware-detection method with a convolutional recurrent neural network using opcode sequences","volume":"535","author":"Jeon","year":"2020","journal-title":"Inf. Sci."},{"key":"10.1016\/j.engappai.2026.114580_bib13","article-title":"MalFormer: a novel vision transformer model for robust malware analysis","author":"Jeong","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2026.114580_bib14","series-title":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","first-page":"1","article-title":"Malware classification with deep convolutional neural networks","author":"Kalash","year":"2018"},{"key":"10.1016\/j.engappai.2026.114580_bib15","article-title":"Bilinear attention networks","volume":"31","author":"Kim","year":"2018","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.engappai.2026.114580_bib16","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2023.110676","article-title":"SDIF-CNN: stacking deep image features using fine-tuned convolution neural network models for real-world malware detection and classification","volume":"146","author":"Kumar","year":"2023","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.engappai.2026.114580_bib17","series-title":"Intelligence and Security Informatics, Vol. 5376","first-page":"204","article-title":"Unknown malcode detection using OPCODE representation","volume":"vol 5376","author":"Moskovitch","year":"2008"},{"key":"10.1016\/j.engappai.2026.114580_bib18","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2020.102154","article-title":"Malware detection in industrial internet of things based on hybrid image visualization and deep learning model","volume":"105","author":"Naeem","year":"2020","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.engappai.2026.114580_bib19","series-title":"Proceedings of the 8th International Symposium on Visualization for Cyber Security","first-page":"1","article-title":"Malware images: visualization and automatic classification","author":"Nataraj","year":"2011"},{"key":"10.1016\/j.engappai.2026.114580_bib20","series-title":"Proceedings of the Genetic and Evolutionary Computation Conference","first-page":"434","article-title":"Adversarial attacks to image classification systems using evolutionary algorithms","author":"Nesmachnow","year":"2025"},{"key":"10.1016\/j.engappai.2026.114580_bib21","doi-asserted-by":"crossref","first-page":"871","DOI":"10.1016\/j.cose.2018.04.005","article-title":"Malware identification using visualization images and deep learning","volume":"77","author":"Ni","year":"2018","journal-title":"Comput. Secur."},{"issue":"5","key":"10.1016\/j.engappai.2026.114580_bib22","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MSP.2011.98","article-title":"Obfuscation: the hidden malware","volume":"9","author":"O'Kane","year":"2011","journal-title":"IEEE Security & Privacy"},{"key":"10.1016\/j.engappai.2026.114580_bib23","series-title":"12th Latin-American Symposium on Dependable and Secure Computing","first-page":"156","article-title":"Enhancing malware family classification in the microsoft challenge dataset via transfer learning","author":"Palma Salas","year":"2023"},{"issue":"2","key":"10.1016\/j.engappai.2026.114580_bib24","first-page":"570","article-title":"Malware detection approaches based on operational codes (OpCodes) of executable programs: a review","volume":"11","author":"Saleh","year":"2023","journal-title":"Int. J. E Enterpren. Innovat."},{"issue":"1","key":"10.1016\/j.engappai.2026.114580_bib25","doi-asserted-by":"crossref","first-page":"10033","DOI":"10.1609\/aaai.v33i01.330110033","article-title":"MIGAN: malware image synthesis using GANs","volume":"33","author":"Singh","year":"2019","journal-title":"AAAI"},{"key":"10.1016\/j.engappai.2026.114580_bib26","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2020.107138","article-title":"IMCFN: image-Based malware classification using fine-tuned convolutional neural network architecture","volume":"171","author":"Vasan","year":"2020","journal-title":"Comput. Netw."},{"issue":"6","key":"10.1016\/j.engappai.2026.114580_bib28","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1109\/TKDE.2010.31","article-title":"Bridging domains using world wide knowledge for transfer learning","volume":"22","author":"Xiang","year":"2010","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.engappai.2026.114580_bib29","series-title":"Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy","first-page":"127","article-title":"Malware analysis of imaged binary samples by convolutional neural network with attention mechanism","author":"Yakura","year":"2018"},{"key":"10.1016\/j.engappai.2026.114580_bib30","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.future.2018.07.052","article-title":"Classification of ransomware families with machine learning based on N -gram of opcodes","volume":"90","author":"Zhang","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.engappai.2026.114580_bib31","doi-asserted-by":"crossref","DOI":"10.1016\/j.cmpb.2023.108003","article-title":"Transvae-dta: transformer and variational autoencoder network for drug-target binding affinity prediction","volume":"244","author":"Zhou","year":"2024","journal-title":"Comput. Methods Progr. Biomed."},{"issue":"1","key":"10.1016\/j.engappai.2026.114580_bib32","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/JPROC.2020.3004555","article-title":"A comprehensive survey on transfer learning","volume":"109","author":"Zhuang","year":"2020","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.engappai.2026.114580_bib33","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103606","article-title":"FACILE: a capsule network with fewer capsules and richer hierarchical information for malware image classification","volume":"137","author":"Zou","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.engappai.2026.114580_bib34","doi-asserted-by":"crossref","DOI":"10.1109\/TDSC.2025.3596831","article-title":"JPEG-domain malware detection with pretrained lightweight vision transformer model","author":"Zou","year":"2025","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.engappai.2026.114580_bib35","unstructured":"BIG Malware Dataset from Microsoft. Accessed: April. 1, 2024. [Online]. Available: https:\/\/www.kaggle.com\/datasets\/muhammad4hmed\/malwaremicrosoftbig."},{"key":"10.1016\/j.engappai.2026.114580_bib36","unstructured":"Microsoft malware classification challenge (BIG 2015).\u201d Accessed: April. 1, 2024. [Online]. Available: https:\/\/kaggle.com\/competitions\/malware-classification."}],"container-title":["Engineering Applications of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197626008614?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197626008614?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T06:54:59Z","timestamp":1776149699000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0952197626008614"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":34,"alternative-id":["S0952197626008614"],"URL":"https:\/\/doi.org\/10.1016\/j.engappai.2026.114580","relation":{},"ISSN":["0952-1976"],"issn-type":[{"value":"0952-1976","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Multi-view based network for malware classification","name":"articletitle","label":"Article Title"},{"value":"Engineering Applications of Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.engappai.2026.114580","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"114580"}}