{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T14:28:19Z","timestamp":1759847299551,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T00:00:00Z","timestamp":1689379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,15]]},"DOI":"10.1145\/3583133.3596362","type":"proceedings-article","created":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T23:30:33Z","timestamp":1690241433000},"page":"1753-1759","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["An Evolutionary based Generative Adversarial Network Inspired Approach to Defeating Metamorphic Malware"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0786-2618","authenticated-orcid":false,"given":"Kehinde O.","family":"Babaagba","sequence":"first","affiliation":[{"name":"Edinburgh Napier University, Edinburgh, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1063-5693","authenticated-orcid":false,"given":"Jordan","family":"Wylie","sequence":"additional","affiliation":[{"name":"Edinburgh Napier University, Edinburgh, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,7,24]]},"reference":[{"volume-title":"Applications of Evolutionary Computation, Antonio M","author":"Aydogan Emre","key":"e_1_3_2_1_1_1","unstructured":"Emre Aydogan and Sevil Sen . 2015. Automatic Generation of Mobile Malwares Using Genetic Programming . In Applications of Evolutionary Computation, Antonio M . Mora and Giovanni Squillero (Eds.). Springer International Publishing , Cham , 745--756. Emre Aydogan and Sevil Sen. 2015. Automatic Generation of Mobile Malwares Using Genetic Programming. In Applications of Evolutionary Computation, Antonio M. Mora and Giovanni Squillero (Eds.). Springer International Publishing, Cham, 745--756."},{"key":"e_1_3_2_1_2_1","volume-title":"Babaagba and Mayowa Ayodele","author":"Kehinde","year":"2023","unstructured":"Kehinde O. Babaagba and Mayowa Ayodele . 2023 . Evolutionary Based Transfer Learning Approach to Improving Classification of Metamorphic Malware. In Applications of Evolutionary Computation, Jo\u00e3o Correia, Stephen Smith, and Raneem Qaddoura (Eds.). Springer Nature Switzerland , Cham, 161--176. Kehinde O. Babaagba and Mayowa Ayodele. 2023. Evolutionary Based Transfer Learning Approach to Improving Classification of Metamorphic Malware. In Applications of Evolutionary Computation, Jo\u00e3o Correia, Stephen Smith, and Raneem Qaddoura (Eds.). Springer Nature Switzerland, Cham, 161--176."},{"volume-title":"Dependability in Sensor, Cloud, and Big Data Systems and Applications, Guojun Wang, Md Zakirul Alam Bhuiyan, Sabrina De Capitani di Vimercati","author":"Babaagba Kehinde O.","key":"e_1_3_2_1_3_1","unstructured":"Kehinde O. Babaagba , Zhiyuan Tan , and Emma Hart . 2019. Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme . In Dependability in Sensor, Cloud, and Big Data Systems and Applications, Guojun Wang, Md Zakirul Alam Bhuiyan, Sabrina De Capitani di Vimercati , and Yizhi Ren (Eds.). Springer Singapore , Singapore , 369--382. Kehinde O. Babaagba, Zhiyuan Tan, and Emma Hart. 2019. Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme. In Dependability in Sensor, Cloud, and Big Data Systems and Applications, Guojun Wang, Md Zakirul Alam Bhuiyan, Sabrina De Capitani di Vimercati, and Yizhi Ren (Eds.). Springer Singapore, Singapore, 369--382."},{"volume-title":"Applications of Evolutionary Computation, Pedro A","author":"Babaagba Kehinde O.","key":"e_1_3_2_1_4_1","unstructured":"Kehinde O. Babaagba , Zhiyuan Tan , and Emma Hart . 2020. Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites . In Applications of Evolutionary Computation, Pedro A . Castillo, Juan Luis Jim\u00e9nez Laredo, and Francisco Fern\u00e1ndez de Vega (Eds.). Springer International Publishing , Cham , 117--132. Kehinde O. Babaagba, Zhiyuan Tan, and Emma Hart. 2020. Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites. In Applications of Evolutionary Computation, Pedro A. Castillo, Juan Luis Jim\u00e9nez Laredo, and Francisco Fern\u00e1ndez de Vega (Eds.). Springer International Publishing, Cham, 117--132."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC48606.2020.9185668"},{"volume-title":"Classification and regression trees. Wadsworth & Brooks\/Cole Advanced Books & Software","author":"Breiman Leo","key":"e_1_3_2_1_6_1","unstructured":"Leo Breiman , Jerome H Friedman , Richard A Olshen , and Charles J Stone . 1984. Classification and regression trees. Wadsworth & Brooks\/Cole Advanced Books & Software , Monterey, CA . Leo Breiman, Jerome H Friedman, Richard A Olshen, and Charles J Stone. 1984. Classification and regression trees. Wadsworth & Brooks\/Cole Advanced Books & Software, Monterey, CA."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.31"},{"key":"e_1_3_2_1_8_1","unstructured":"CrowdStrike. [n. d.]. 2022 Global Threat Report. https:\/\/www.crowdstrike.com\/global-threat-report\/  CrowdStrike. [n. d.]. 2022 Global Threat Report. https:\/\/www.crowdstrike.com\/global-threat-report\/"},{"volume-title":"2013 IEEE International Conference on Acoustics, Speech and Signal Processing. 3422--3426","author":"Dahl G. E.","key":"e_1_3_2_1_9_1","unstructured":"G. E. Dahl , J. W. Stokes , L. Deng , and D. Yu . 2013. Large-scale malware classification using random projections and neural networks . In 2013 IEEE International Conference on Acoustics, Speech and Signal Processing. 3422--3426 . G. E. Dahl, J. W. Stokes, L. Deng, and D. Yu. 2013. Large-scale malware classification using random projections and neural networks. In 2013 IEEE International Conference on Acoustics, Speech and Signal Processing. 3422--3426."},{"volume-title":"Exploring Deep Learning in Semantic Question Matching. In 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS '18)","author":"Dhakal A.","key":"e_1_3_2_1_10_1","unstructured":"A. Dhakal , A. Poudel , S. Pandey , S. Gaire , and H. P. Baral . 2018 . Exploring Deep Learning in Semantic Question Matching. In 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS '18) . 86--91. A. Dhakal, A. Poudel, S. Pandey, S. Gaire, and H. P. Baral. 2018. Exploring Deep Learning in Semantic Question Matching. In 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS '18). 86--91."},{"key":"e_1_3_2_1_11_1","volume-title":"Smith","author":"Eiben Agoston Endre","year":"2003","unstructured":"Agoston Endre Eiben and Jim E . Smith . 2003 . What is an Evolutionary Algorithm? In Introduction to Evolutionary Computing. Springer Publishing Company , Incorporated, 15--35. arXiv:arXiv:1011.1669v3 Agoston Endre Eiben and Jim E. Smith. 2003. What is an Evolutionary Algorithm? In Introduction to Evolutionary Computing. Springer Publishing Company, Incorporated, 15--35. arXiv:arXiv:1011.1669v3"},{"volume-title":"Advances in Computation and Intelligence","author":"Fang Yongsheng","key":"e_1_3_2_1_12_1","unstructured":"Yongsheng Fang and Jun Li. 2010. A Review of Tournament Selection in Genetic Programming . In Advances in Computation and Intelligence , Zhihua Cai, Chengyu Hu, Zhuo Kang, and Yong Liu (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 181--192. Yongsheng Fang and Jun Li. 2010. A Review of Tournament Selection in Genetic Programming. In Advances in Computation and Intelligence, Zhihua Cai, Chengyu Hu, Zhuo Kang, and Yong Liu (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 181--192."},{"volume-title":"Advances in Neural Information Processing Systems 27","author":"Goodfellow Ian","key":"e_1_3_2_1_13_1","unstructured":"Ian Goodfellow , Jean Pouget-Abadie , Mehdi Mirza , Bing Xu , David Warde-Farley , Sherjil Ozair , Aaron Courville , and Yoshua Bengio . 2014. Generative Adversarial Nets . In Advances in Neural Information Processing Systems 27 , Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger (Eds.). Curran Associates, Inc. , 2672--2680. Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative Adversarial Nets. In Advances in Neural Information Processing Systems 27, Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 2672--2680."},{"volume-title":"Supervised Sequence Labelling","author":"Graves Alex","key":"e_1_3_2_1_14_1","unstructured":"Alex Graves . 2012. Supervised Sequence Labelling . Springer Berlin Heidelberg , Berlin, Heidelberg , 5--13. Alex Graves. 2012. Supervised Sequence Labelling. Springer Berlin Heidelberg, Berlin, Heidelberg, 5--13."},{"volume-title":"CHAPTER 14-Neural Networks for Identification of Nonlinear Systems: An Overview","author":"PRAMOD","key":"e_1_3_2_1_15_1","unstructured":"PRAMOD GUPTA and NARESH K. SINHA. 2000. CHAPTER 14-Neural Networks for Identification of Nonlinear Systems: An Overview . In Soft Computing and Intelligent Systems, NARESH K. SINHA and MADAN M. GUPTA (Eds.). Academic Press , San Diego , 337--356. PRAMOD GUPTA and NARESH K. SINHA. 2000. CHAPTER 14-Neural Networks for Identification of Nonlinear Systems: An Overview. In Soft Computing and Intelligent Systems, NARESH K. SINHA and MADAN M. GUPTA (Eds.). Academic Press, San Diego, 337--356."},{"key":"e_1_3_2_1_17_1","volume-title":"Fahmy","author":"Gomaa Wael H.","year":"2013","unstructured":"Wael H. Gomaa and Aly A . Fahmy . 2013 . A Survey of Text Similarity Approaches. International Journal of Computer Applications ( 2013). Wael H. Gomaa and Aly A. Fahmy. 2013. A Survey of Text Similarity Approaches. International Journal of Computer Applications (2013)."},{"key":"e_1_3_2_1_18_1","volume-title":"Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. CoRR abs\/1702.05983","author":"Hu Weiwei","year":"2017","unstructured":"Weiwei Hu and Ying Tan . 2017. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. CoRR abs\/1702.05983 ( 2017 ). arXiv:1702.05983 http:\/\/arxiv.org\/abs\/1702.05983 Weiwei Hu and Ying Tan. 2017. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. CoRR abs\/1702.05983 (2017). arXiv:1702.05983 http:\/\/arxiv.org\/abs\/1702.05983"},{"volume-title":"Support Vector Machines - An Introduction","author":"Kecman V.","key":"e_1_3_2_1_19_1","unstructured":"V. Kecman . 2005. Support Vector Machines - An Introduction . Springer Berlin Heidelberg, Berlin , Heidelberg , 1--47. V. Kecman. 2005. Support Vector Machines - An Introduction. Springer Berlin Heidelberg, Berlin, Heidelberg, 1--47."},{"key":"e_1_3_2_1_20_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2014","unstructured":"Diederik P. Kingma and Jimmy Ba . 2014 . Adam : A Method for Stochastic Optimization. CoRR abs\/1412.6980 (2014). Diederik P. Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization. CoRR abs\/1412.6980 (2014)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2015.070426"},{"key":"e_1_3_2_1_22_1","volume-title":"A Critical Review of Recurrent Neural Networks for Sequence Learning. ArXiv abs\/1506.00019","author":"Lipton Zachary Chase","year":"2015","unstructured":"Zachary Chase Lipton . 2015. A Critical Review of Recurrent Neural Networks for Sequence Learning. ArXiv abs\/1506.00019 ( 2015 ). Zachary Chase Lipton. 2015. A Critical Review of Recurrent Neural Networks for Sequence Learning. ArXiv abs\/1506.00019 (2015)."},{"key":"e_1_3_2_1_23_1","volume-title":"Malware Detection with LSTM using Opcode Language. arXiv:1906.04593","author":"R. Lu.","year":"2019","unstructured":"R. Lu. 2019. Malware Detection with LSTM using Opcode Language. arXiv:1906.04593 ( 2019 ). arXiv:arXiv:1906.04593 R. Lu. 2019. Malware Detection with LSTM using Opcode Language. arXiv:1906.04593 (2019). arXiv:arXiv:1906.04593"},{"key":"e_1_3_2_1_24_1","volume-title":"Kehinde Oluwatoyin Babaagba, and Zhiyuan Tan","author":"McLaren Ross A. J.","year":"2023","unstructured":"Ross A. J. McLaren , Kehinde Oluwatoyin Babaagba, and Zhiyuan Tan . 2023 . A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs. In Machine Learning, Optimization, and Data Science, Giuseppe Nicosia, Varun Ojha, Emanuele La Malfa, Gabriele La Malfa, Panos Pardalos, Giuseppe Di Fatta, Giovanni Giuffrida, and Renato Umeton (Eds.). Springer Nature Switzerland , Cham, 32--46. Ross A. J. McLaren, Kehinde Oluwatoyin Babaagba, and Zhiyuan Tan. 2023. A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs. In Machine Learning, Optimization, and Data Science, Giuseppe Nicosia, Varun Ojha, Emanuele La Malfa, Gabriele La Malfa, Panos Pardalos, Giuseppe Di Fatta, Giovanni Giuffrida, and Renato Umeton (Eds.). Springer Nature Switzerland, Cham, 32--46."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Robert Nisbet Gary Miner and Ken Yale. 2018. Chapter 9 - Classification. In Handbook of Statistical Analysis and Data Mining Applications (Second Edition) (2 ed.) Robert Nisbet Gary Miner and Ken Yale (Eds.). Academic Press Boston 169--186.  Robert Nisbet Gary Miner and Ken Yale. 2018. Chapter 9 - Classification. In Handbook of Statistical Analysis and Data Mining Applications (Second Edition) (2 ed.) Robert Nisbet Gary Miner and Ken Yale (Eds.). Academic Press Boston 169--186.","DOI":"10.1016\/B978-0-12-416632-5.00009-8"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9564-7"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484355"},{"volume-title":"2015 10th International Conference on Malicious and Unwanted Software (MALWARE). 11--20","author":"Saxe J.","key":"e_1_3_2_1_28_1","unstructured":"J. Saxe and K. Berlin . 2015. Deep neural network based malware detection using two dimensional binary program features . In 2015 10th International Conference on Malicious and Unwanted Software (MALWARE). 11--20 . J. Saxe and K. Berlin. 2015. Deep neural network based malware detection using two dimensional binary program features. In 2015 10th International Conference on Malicious and Unwanted Software (MALWARE). 11--20."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-012-0171-2"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTSS.2013.6588052"},{"volume-title":"2022 IEEE Conference on Dependable and Secure Computing (DSC). 1--9.","author":"Turnbull Leigh","key":"e_1_3_2_1_31_1","unstructured":"Leigh Turnbull , Zhiyuan Tan , and Kehinde O. Babaagba . 2022. A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling . In 2022 IEEE Conference on Dependable and Secure Computing (DSC). 1--9. Leigh Turnbull, Zhiyuan Tan, and Kehinde O. Babaagba. 2022. A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling. In 2022 IEEE Conference on Dependable and Secure Computing (DSC). 1--9."},{"key":"e_1_3_2_1_32_1","volume-title":"Automatically Evading Classifiers: A Case Study on PDF Malware Classifier. In 23rd Annual Network and Distributed System Security Symposium, NDSS","author":"Xu Weilin","year":"2016","unstructured":"Weilin Xu , Yanjun Qi , and David Evans . 2016 . Automatically Evading Classifiers: A Case Study on PDF Malware Classifier. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA. The Internet Society. Weilin Xu, Yanjun Qi, and David Evans. 2016. Automatically Evading Classifiers: A Case Study on PDF Malware Classifier. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA. The Internet Society."},{"key":"e_1_3_2_1_33_1","volume-title":"Lui","author":"Zheng Min","year":"2013","unstructured":"Min Zheng , Patrick P. C. Lee , and John C. S . Lui . 2013 . ADAM : An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems. In Detection of Intrusions and Malware, and Vulnerability Assessment, Ulrich Flegel, Evangelos Markatos, and William Robertson (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 82--101. Min Zheng, Patrick P. C. Lee, and John C. S. Lui. 2013. ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems. In Detection of Intrusions and Malware, and Vulnerability Assessment, Ulrich Flegel, Evangelos Markatos, and William Robertson (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 82--101."}],"event":{"name":"GECCO '23 Companion: Companion Conference on Genetic and Evolutionary Computation","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"location":"Lisbon Portugal","acronym":"GECCO '23 Companion"},"container-title":["Proceedings of the Companion Conference on Genetic and Evolutionary Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583133.3596362","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583133.3596362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:55Z","timestamp":1750182535000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583133.3596362"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,15]]},"references-count":32,"alternative-id":["10.1145\/3583133.3596362","10.1145\/3583133"],"URL":"https:\/\/doi.org\/10.1145\/3583133.3596362","relation":{},"subject":[],"published":{"date-parts":[[2023,7,15]]},"assertion":[{"value":"2023-07-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}