{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:55:50Z","timestamp":1771707350450,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T00:00:00Z","timestamp":1700697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Hong Kong Metropolitan University","doi-asserted-by":"publisher","award":["RIF\/2021\/05"],"award-info":[{"award-number":["RIF\/2021\/05"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,23]]},"DOI":"10.1145\/3647444.3652455","type":"proceedings-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T13:48:36Z","timestamp":1715608116000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Lightweight Generative Adversarial Network for Imbalanced Malware Image Classification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7992-9901","authenticated-orcid":false,"given":"Kwok Tai","family":"Chui","sequence":"first","affiliation":[{"name":"School of Science and Technology, Hong Kong Metropolitan University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Number of malware attacks per year 2015-2022 Statista https:\/\/www.statista.com\/statistics\/873097\/malware-attacks-per-year-worldwide\/ last accessed 2023\/09\/10 (2023)"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1108\/LHTN-01-2023-0009"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.21609\/jsi.v19i1.1196"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3208891"},{"key":"e_1_3_2_1_5_1","first-page":"103308","volume":"69","author":"Son T. T.","year":"2022","unstructured":"Son, T. T., Lee, C., Le-Minh, H., Aslam, N., Dat, V. C.: An enhancement for image-based malware classification using machine learning with low dimension normalized input images. Journal of Information Security and Applications 69, 103308 (2022)","journal-title":"Applications"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/23080477.2022.2152933"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3675"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03569-4"},{"issue":"1","key":"e_1_3_2_1_9_1","first-page":"1","volume":"14","author":"Guendouz M.","year":"2022","unstructured":"Guendouz, M., Amine, A.: A New Wrapper-Based Feature Selection Technique with Fireworks Algorithm for Android Malware Detection. International Journal of Software Science and Computational Intelligence 14(1), 1\u201319 (2022)","journal-title":"Computational Intelligence"},{"key":"e_1_3_2_1_10_1","volume-title":"Zhang","author":"Liu C.","year":"2022","unstructured":"Liu, C., Li, B., Zhao, J., Zhen, Z., Liu, X., Zhang, Q.: Fewm-hgcl: Few-shot malware variants detection via heterogeneous graph contrastive learning. IEEE Transactions on Dependable and Secure Computing (2022)"},{"key":"e_1_3_2_1_11_1","first-page":"118724","volume":"212","author":"Garc\u00eda D. E.","year":"2023","unstructured":"Garc\u00eda, D. E., DeCastro-Garc\u00eda, N., Casta\u00f1eda, A. L. M.: An effectiveness analysis of transfer learning for the concept drift problem in malware detection. Expert Systems with Applications 212, 118724 (2023)","journal-title":"Applications"},{"key":"e_1_3_2_1_12_1","first-page":"131","volume-title":"Proceedings of the European Conference on Computer Vision","author":"Ma N.","unstructured":"Ma, N., Zhang, X., Zheng, H. T., Sun, J.: Shufflenet v2: Practical guidelines for efficient CNN architecture design. In: Proceedings of the European Conference on Computer Vision, pp. 116\u2013131. Springer, Munich, Germany (2018)"},{"key":"e_1_3_2_1_13_1","first-page":"1324","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","author":"Howard A.","unstructured":"Howard, A., Sandler, M., Chu, G., Chen, L. C., Chen, B., Tan, M., ... Adam, H.: Searching for mobilenetv3. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1314\u20131324. IEEE, Seoul, South Korea (2019)"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-023-00465-2"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102515"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7170"},{"issue":"19","key":"e_1_3_2_1_17_1","first-page":"9403","volume":"12","author":"Mazaed Alotaibi F.","year":"2022","unstructured":"Mazaed Alotaibi, F., Fawad.: A Multifaceted Deep Generative Adversarial Networks Model for Mobile Malware Detection. Applied Sciences 12(19), 9403 (2022)","journal-title":"Mobile Malware Detection. Applied Sciences"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22010264"},{"key":"e_1_3_2_1_19_1","first-page":"7","volume-title":"Proceedings of the 8th International Symposium on Visualization for Cyber Security","author":"Nataraj L.","unstructured":"Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B. S.: Malware images: visualization and automatic classification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security, pp. 1\u20137. ACM, Pittsburgh, PA, USA (2011)"},{"key":"e_1_3_2_1_20_1","first-page":"105382","volume":"144","author":"Chen Y.","year":"2022","unstructured":"Chen, Y., Yang, X. H., Wei, Z., Heidari, A. A., Zheng, N., Li, Z., ... Guan, Q.: Generative adversarial networks in medical image augmentation: A review. Computers in Biology and Medicine 144, 105382 (2022)","journal-title":"Medicine"},{"key":"e_1_3_2_1_21_1","first-page":"1","volume":"2023","author":"Chui K. T.","year":"2023","unstructured":"Chui, K. T., Gupta, B. B., Jhaveri, R. H., Chi, H. R., Arya, V., Almomani, A., Nauman, A.: Multiround transfer learning and modified generative adversarial network for lung cancer detection. International Journal of Intelligent Systems 2023, 1\u201314 (2023)","journal-title":"Intelligent Systems"},{"key":"e_1_3_2_1_22_1","first-page":"7153","volume":"15","author":"Qin J.","year":"2022","unstructured":"Qin, J., Liu, Z., Ran, L., Xie, R., Tang, J., Guo, Z.: A target sar image expansion method based on conditional wasserstein deep convolutional GAN for automatic target recognition. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 15, 7153\u20137170 (2022)","journal-title":"Remote Sensing"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10030285"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21196412"},{"key":"e_1_3_2_1_25_1","volume-title":"Gupta","author":"Stergiou C. L.","year":"2020","unstructured":"Stergiou, C. L., Plageras, A. P., Psannis, K. E., Gupta, B. B.: Secure machine learning scenario from big data in cloud computing via internet of things network. Handbook of Computer Networks and Cyber Security: Principles and Paradigms. 1st edn. Springer, Germany (2020)","edition":"1"},{"key":"e_1_3_2_1_26_1","volume-title":"Li","author":"Qiao Q.","year":"2022","unstructured":"Qiao, Q., Feng, R., Chen, S., Zhang, F., Li, X.: Multi-label Classification for Android Malware Based on Active Learning. IEEE Transactions on Dependable and Secure Computing (2022)"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.317220"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.331082"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2022.10.017"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.11.027"},{"issue":"5","key":"e_1_3_2_1_31_1","first-page":"224","volume":"18","author":"Gupta B. B.","year":"2009","unstructured":"Gupta, B. B., Joshi, R. C., Misra, M.: Defending against distributed denial of service attacks: issues and challenges. Information Security Journal: A Global Perspective 18(5), 224\u2013247 (2009)","journal-title":"Global Perspective"}],"event":{"name":"ICIMMI 2023: International Conference on Information Management & Machine Intelligence","location":"Jaipur India","acronym":"ICIMMI 2023"},"container-title":["Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3652455","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3647444.3652455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:22:43Z","timestamp":1758216163000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3652455"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,23]]},"references-count":31,"alternative-id":["10.1145\/3647444.3652455","10.1145\/3647444"],"URL":"https:\/\/doi.org\/10.1145\/3647444.3652455","relation":{},"subject":[],"published":{"date-parts":[[2023,11,23]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}