{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T22:29:34Z","timestamp":1771021774791,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,12]],"date-time":"2018-03-12T00:00:00Z","timestamp":1520812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,12]]},"DOI":"10.1145\/3194452.3194459","type":"proceedings-article","created":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T12:24:55Z","timestamp":1527596695000},"page":"81-85","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":54,"title":["Malicious Code Detection based on Image Processing Using Deep Learning"],"prefix":"10.1145","author":[{"given":"Rajesh","family":"Kumar","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China"}]},{"given":"Zhang","family":"Xiaosong","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China"}]},{"given":"Riaz Ullah","family":"Khan","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China"}]},{"given":"Ijaz","family":"Ahad","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China"}]},{"given":"Jay","family":"Kumar","sequence":"additional","affiliation":[{"name":"Quaid-e-Azam University Islamabad, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2018,3,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Vision reseach lab malimg dataset http:\/\/old.vision.ece.ucsb.edu\/spam\/malimg.shtml.  Vision reseach lab malimg dataset http:\/\/old.vision.ece.ucsb.edu\/spam\/malimg.shtml."},{"key":"e_1_3_2_1_2_1","volume-title":"Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv preprint arXiv:1603.04467.","author":"Abadi M.","year":"2016","unstructured":"Abadi , M. , Agarwal , A. , Barham , P. , Brevdo , E. , Chen , Z. , Citro , C. , Corrado , G.S. , Davis , A. , Dean , J. , Devin , M. and Ghemawat , S. , 2016 . Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv preprint arXiv:1603.04467. Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C., Corrado, G.S., Davis, A., Dean, J., Devin, M. and Ghemawat, S., 2016. Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv preprint arXiv:1603.04467."},{"key":"e_1_3_2_1_3_1","article-title":"Static Code Analysis of Permission-based Features for Android Malware Classification Using Apriori Algorithm with Particle Swarm Optimization","author":"Adebayo O.S.","year":"2015","unstructured":"Adebayo , O.S. and Aziz , N.A. , 2015 . Static Code Analysis of Permission-based Features for Android Malware Classification Using Apriori Algorithm with Particle Swarm Optimization . Journal of Information Assurance & Security, 10(4). Adebayo, O.S. and Aziz, N.A., 2015. Static Code Analysis of Permission-based Features for Android Malware Classification Using Apriori Algorithm with Particle Swarm Optimization. Journal of Information Assurance & Security, 10(4).","journal-title":"Journal of Information Assurance & Security, 10(4)."},{"key":"e_1_3_2_1_4_1","first-page":"312","article-title":"Systems, apparatus, and methods for detecting malware","volume":"8","author":"Alme C.","year":"2012","unstructured":"Alme , C. , Mcafee , Inc. , 2012 . Systems, apparatus, and methods for detecting malware . U.S. Patent 8 , 312 ,546. Alme, C., Mcafee, Inc., 2012. Systems, apparatus, and methods for detecting malware. U.S. Patent 8,312,546.","journal-title":"U.S. Patent"},{"key":"e_1_3_2_1_5_1","volume-title":"April. An Overview of the State-of-the-Art of Cloud Computing Cyber-Security. In International Conference on Codes, Cryptology, and Information Security (pp. 56--67)","author":"Bennasar H.","unstructured":"Bennasar , H. , Bendahmane , A. and Essaaidi , M ., 2017 , April. An Overview of the State-of-the-Art of Cloud Computing Cyber-Security. In International Conference on Codes, Cryptology, and Information Security (pp. 56--67) . Springer, Cham. Bennasar, H., Bendahmane, A. and Essaaidi, M., 2017, April. An Overview of the State-of-the-Art of Cloud Computing Cyber-Security. In International Conference on Codes, Cryptology, and Information Security (pp. 56--67). Springer, Cham."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.338"},{"key":"e_1_3_2_1_7_1","volume-title":"Computer Science and Information Technology, 2009. IMCSIT'09. International Multiconference on (pp. 735--741)","author":"Gavrilu\u0163 D.","unstructured":"Gavrilu\u0163 , D. , Cimpoe\u015fu , M. , Anton , D. and Ciortuz , L ., 2009, October. Malware detection using machine learning . In Computer Science and Information Technology, 2009. IMCSIT'09. International Multiconference on (pp. 735--741) . IEEE. Gavrilu\u0163, D., Cimpoe\u015fu, M., Anton, D. and Ciortuz, L., 2009, October. Malware detection using machine learning. In Computer Science and Information Technology, 2009. IMCSIT'09. International Multiconference on (pp. 735--741). IEEE."},{"key":"e_1_3_2_1_8_1","volume-title":"Computer Science and Information Technology, 2009. IMCSIT'09. International Multiconference on (pp. 735--741)","author":"Gavrilu\u0163 D.","unstructured":"Gavrilu\u0163 , D. , Cimpoe\u015fu , M. , Anton , D. and Ciortuz , L ., 2009, October. Malware detection using machine learning . In Computer Science and Information Technology, 2009. IMCSIT'09. International Multiconference on (pp. 735--741) . IEEE. Gavrilu\u0163, D., Cimpoe\u015fu, M., Anton, D. and Ciortuz, L., 2009, October. Malware detection using machine learning. In Computer Science and Information Technology, 2009. IMCSIT'09. International Multiconference on (pp. 735--741). IEEE."},{"key":"e_1_3_2_1_9_1","unstructured":"Goodfellow I.J. Shlens J. and Szegedy C. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572.  Goodfellow I.J. Shlens J. and Szegedy C. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046689"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Nguyen A. Yosinski J. and Clune J. 2015. Deep Neural Networks Are Easily Fooled: High Confidence Predictions for Unrecognizable Images-Nguyen_Deep_Neural_Networks_2015_CVPR.  Nguyen A. Yosinski J. and Clune J. 2015. Deep Neural Networks Are Easily Fooled: High Confidence Predictions for Unrecognizable Images-Nguyen_Deep_Neural_Networks_2015_CVPR.","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"}],"event":{"name":"ICCAI 2018: 2018 International Conference on Computing and Artificial Intelligence","location":"Chengdu China","acronym":"ICCAI 2018","sponsor":["Sichuan University"]},"container-title":["Proceedings of the 2018 International Conference on Computing and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3194452.3194459","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3194452.3194459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:46Z","timestamp":1750213606000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3194452.3194459"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,12]]},"references-count":12,"alternative-id":["10.1145\/3194452.3194459","10.1145\/3194452"],"URL":"https:\/\/doi.org\/10.1145\/3194452.3194459","relation":{},"subject":[],"published":{"date-parts":[[2018,3,12]]},"assertion":[{"value":"2018-03-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}