{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:54Z","timestamp":1750220334142,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,10]],"date-time":"2021-12-10T00:00:00Z","timestamp":1639094400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,10]]},"DOI":"10.1145\/3510513.3510521","type":"proceedings-article","created":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T10:18:16Z","timestamp":1652177896000},"page":"47-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Iot Malware Classification Method Based On Visual Local Features"],"prefix":"10.1145","author":[{"given":"Bingchu","family":"Jin","sequence":"first","affiliation":[{"name":"Economics&amp;Technology Research Institute,State Grid Shanxi Electric Power Company, China"}]},{"given":"Zesheng","family":"Hu","sequence":"additional","affiliation":[{"name":"Economics&amp;Technology Research Institute,State Grid Shanxi Electric Power Company, China"}]},{"given":"Yongle","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Information and Computer Science,Taiyuan University of Technology, Shanxi, China, China"}]},{"given":"Jianhua","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation,Beijing Jiaotong University, Beijing, China, China"}]},{"given":"Mingrui","family":"Quan","sequence":"additional","affiliation":[{"name":"State Grid Shanxi Electric Power Company, China"}]},{"given":"Yawei","family":"Zhao","sequence":"additional","affiliation":[{"name":"Economics&amp;Technology Research Institute,State Grid Shanxi Electric Power Company, China"}]},{"given":"Jia","family":"Zhang","sequence":"additional","affiliation":[{"name":"Economics&amp;Technology Research Institute,State Grid Shanxi Electric Power Company, China"}]}],"member":"320","published-online":{"date-parts":[[2022,5,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Machine Learning Aided Static Malware Analysis: A Survey and Tutorial","author":"Shalaginov A","year":"2018","unstructured":"Shalaginov A , Banin S , Dehghantanha A , Machine Learning Aided Static Malware Analysis: A Survey and Tutorial . 2018 . Shalaginov A , Banin S , Dehghantanha A , Machine Learning Aided Static Malware Analysis: A Survey and Tutorial. 2018."},{"key":"e_1_3_2_1_2_1","unstructured":"Kaspersky Lab: Internet of things security threat has changed from concept to reality [EB\/OL]. [2017-06-22]. https:\/\/www.gkzhan. com\/news\/ detail \/101407.html.  Kaspersky Lab: Internet of things security threat has changed from concept to reality [EB\/OL]. [2017-06-22]. https:\/\/www.gkzhan. com\/news\/ detail \/101407.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Kaspersky Lab: the number of Internet of things malware has more than doubled since last year [EB\/OL]. [2017-07-04]. https:\/\/deve loper. aliyun .com\/article\/171328.  Kaspersky Lab: the number of Internet of things malware has more than doubled since last year [EB\/OL]. [2017-07-04]. https:\/\/deve loper. aliyun .com\/article\/171328."},{"key":"e_1_3_2_1_4_1","unstructured":"Tencent released the 2018 IOT security threat analysis report[EB\/OL].[2019-01-03].https:\/\/smart.huanqiu.com\/a rticle\/9CaKrnKgBmQ.  Tencent released the 2018 IOT security threat analysis report[EB\/OL].[2019-01-03].https:\/\/smart.huanqiu.com\/a rticle\/9CaKrnKgBmQ."},{"key":"e_1_3_2_1_5_1","unstructured":"Significant Internet of things security trend in 2020 [EB\/OL].[2020-03-19].https:\/\/www.aqniu.com\/vendor\/65 415.html.  Significant Internet of things security trend in 2020 [EB\/OL].[2020-03-19].https:\/\/www.aqniu.com\/vendor\/65 415.html."},{"key":"e_1_3_2_1_6_1","volume-title":"Using Multi-features and Ensemble Learning Method for Imbalanced Malware Classification[C]\/\/ 2016 IEEE Trustcom\/BigDataSE\/I SPA","author":"Zhang Y","year":"2017","unstructured":"Zhang Y , Huang Q , Ma X , Using Multi-features and Ensemble Learning Method for Imbalanced Malware Classification[C]\/\/ 2016 IEEE Trustcom\/BigDataSE\/I SPA . IEEE , 2017 . Zhang Y , Huang Q , Ma X , Using Multi-features and Ensemble Learning Method for Imbalanced Malware Classification[C]\/\/ 2016 IEEE Trustcom\/BigDataSE\/I SPA. IEEE, 2017."},{"key":"e_1_3_2_1_7_1","volume-title":"ISBN 978-1-59327-290-6[M]","author":"Michael Sikorski","year":"2012","unstructured":"Michael Sikorski and Andrew Honig. Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Software , ISBN 978-1-59327-290-6[M] . No Starch Press. 2012 . Michael Sikorski and Andrew Honig. Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Software, ISBN 978-1-59327-290-6[M]. No Starch Press.2012."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2420"},{"key":"e_1_3_2_1_9_1","volume-title":"International Conference on International Workshop on Formal Methods for Security Engineering.","author":"Bhodia N","year":"2019","unstructured":"Bhodia N , Prajapati P , Troia F D , Transfer Learning for Image-Based Malware Classification[C]\/\/ International Conference on International Workshop on Formal Methods for Security Engineering. 2019 . Bhodia N , Prajapati P , Troia F D , Transfer Learning for Image-Based Malware Classification[C]\/\/ International Conference on International Workshop on Formal Methods for Security Engineering. 2019."},{"key":"e_1_3_2_1_10_1","volume-title":"2019 14th Asia Joint Conference on Information Security (AsiaJCIS).","author":"Kumar N","year":"2019","unstructured":"Kumar N , Mukhopadhyay S , Gupta M , Malware Classification using Early Stage Behavioral Analysis[C]\/\/ 2019 14th Asia Joint Conference on Information Security (AsiaJCIS). 2019 . Kumar N , Mukhopadhyay S , Gupta M , Malware Classification using Early Stage Behavioral Analysis[C]\/\/ 2019 14th Asia Joint Conference on Information Security (AsiaJCIS). 2019."},{"key":"e_1_3_2_1_11_1","volume-title":"Soft Computing","author":"Abdurrahman","year":"2020","unstructured":"Abdurrahman , Pekta, Tankut , Deep learning for effective Android malware detection using API call graph embeddings[J] . Soft Computing , 2020 . Abdurrahman, Pekta, Tankut, Deep learning for effective Android malware detection using API call graph embeddings[J]. Soft Computing, 2020."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338840.3355684"},{"key":"e_1_3_2_1_13_1","volume-title":"Lightweight IoT Malware Visualization Analysis via Two-Bits Networks[M]\/\/ Wireless Algorithms, Systems, and Applications","author":"Wen H","year":"2019","unstructured":"Wen H , Zhang W , Hu Y , Lightweight IoT Malware Visualization Analysis via Two-Bits Networks[M]\/\/ Wireless Algorithms, Systems, and Applications . Springer , Cham , 2019 . Wen H , Zhang W , Hu Y , Lightweight IoT Malware Visualization Analysis via Two-Bits Networks[M]\/\/ Wireless Algorithms, Systems, and Applications. Springer, Cham, 2019."},{"key":"e_1_3_2_1_14_1","volume-title":"Power theft detection data generation method based on generative countermeasure network [J]. Power grid technology","author":"Dewen Wang","year":"2020","unstructured":"Dewen Wang , Kaihua Yang. Power theft detection data generation method based on generative countermeasure network [J]. Power grid technology , 2020 , 44(2). Dewen Wang, Kaihua Yang. Power theft detection data generation method based on generative countermeasure network [J]. Power grid technology, 2020, 44(2)."},{"key":"e_1_3_2_1_15_1","volume-title":"The Journal of Supercomputing","author":"Yong Z","year":"2020","unstructured":"Yong Z , Shao Y M , Xi Z , EDGAN : motion deblurring algorithm based on enhanced generative adversarial networks[J] . The Journal of Supercomputing , 2020 . Yong Z , Shao Y M , Xi Z , EDGAN: motion deblurring algorithm based on enhanced generative adversarial networks[J]. The Journal of Supercomputing, 2020."},{"key":"e_1_3_2_1_16_1","volume-title":"2020 39th Chinese Control Conference (CCC). IEEE","author":"Mu J","year":"2020","unstructured":"Mu J , Zhou Y , Cao S , Enhanced Evolutionary Generative Adversarial Networks[C]\/\/ 2020 39th Chinese Control Conference (CCC). IEEE , 2020 . Mu J , Zhou Y , Cao S , Enhanced Evolutionary Generative Adversarial Networks[C]\/\/ 2020 39th Chinese Control Conference (CCC). IEEE, 2020."},{"key":"e_1_3_2_1_17_1","unstructured":"MALSHARE A community driven public malware repository [EB\/OL]. https:\/\/malshare.com.  MALSHARE A community driven public malware repository [EB\/OL]. https:\/\/malshare.com."},{"key":"e_1_3_2_1_18_1","unstructured":"VirusSign A service that automatically collects malware samples and provide controlled access to the files [EB\/OL]. http:\/\/www. virusign.com.  VirusSign A service that automatically collects malware samples and provide controlled access to the files [EB\/OL]. http:\/\/www. virusign.com."},{"key":"e_1_3_2_1_19_1","unstructured":"Linux cloud computing network [EB\/OL]. [2012-08-05].https:\/\/www.cnblogs.com\/bakari\/archive\/2012\/08\/05\/2623637.html.  Linux cloud computing network [EB\/OL]. [2012-08-05].https:\/\/www.cnblogs.com\/bakari\/archive\/2012\/08\/05\/2623637.html."}],"event":{"name":"ICNCC 2021: 2021 The 10th International Conference on Networks, Communication and Computing","acronym":"ICNCC 2021","location":"Beijing China"},"container-title":["2021 The 10th International Conference on Networks, Communication and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510513.3510521","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510513.3510521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:19Z","timestamp":1750191139000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510513.3510521"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,10]]},"references-count":19,"alternative-id":["10.1145\/3510513.3510521","10.1145\/3510513"],"URL":"https:\/\/doi.org\/10.1145\/3510513.3510521","relation":{},"subject":[],"published":{"date-parts":[[2021,12,10]]},"assertion":[{"value":"2022-05-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}