{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T21:39:03Z","timestamp":1774993143162,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T00:00:00Z","timestamp":1706832000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,2,2]]},"DOI":"10.1145\/3651671.3651735","type":"proceedings-article","created":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T18:55:50Z","timestamp":1717786550000},"page":"185-193","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Building Visual Malware Dataset using VirusShare Data and Comparing Machine Learning Baseline Model to CoAtNet for Malware Classification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5141-337X","authenticated-orcid":false,"given":"Roberto","family":"Bruzzese","sequence":"first","affiliation":[{"name":"INGEGNERIA INFORMATICA, AUTOMATICA E GESTIONALE, La Sapienza University, Italy"}]}],"member":"320","published-online":{"date-parts":[[2024,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ahmed Bensaoud Nawaf Abudawaood and Jugal Kalita \u00a0(2020) \u00a0Classifying Malware Images with Convolutional Neural Network Models \u00a0"},{"key":"e_1_3_2_1_2_1","volume-title":"ISSN 2079-9292","author":"Awan Mazhar","unstructured":"Awan, Mazhar Javed\u00a0and\u00a0Masood, Osama Ahmed\u00a0and\u00a0Mohammed, Mazin Abed\u00a0and\u00a0Yasin, Awais\u00a0and\u00a0Mohd. Zain, Azlan\u00a0and\u00a0Damasevicius, Robertas\u00a0and\u00a0Abdulkareem, Karrar Hameed,\u00a0\u00a0(2021), Image\u2010based malware classification using VGG19 network and spatial convolutional attention.\u00a0Electronics (Switzerland), 10 (19). pp. 1-19. ISSN 2079-9292"},{"key":"e_1_3_2_1_3_1","volume-title":"Guillotin, T., Jamal, F., Wakim, B., and Roy., P.","author":"Bailly A.","year":"2022","unstructured":"Bailly, A., Blanc, C., lie Francis, Guillotin, T., Jamal, F., Wakim, B., and Roy., P. (2022). Effects of dataset size and interactions on the prediction performance of logistic regression and deep learning models. In Computer Methods and Programs in Biomedicine."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00338"},{"key":"e_1_3_2_1_5_1","volume-title":"(30","author":"Bensaoud A.","year":"2020","unstructured":"Bensaoud, A., Abudawaood, N., and Kalita, J. (30 Oct. 2020). Classifying malware images with convolutional neural network models. In International Journal of Network Security."},{"key":"e_1_3_2_1_6_1","unstructured":"Bhattacharya. A. (2020). How to use smote for dealing with imbalanced image dataset for solving classification problems. In https:\/\/medium.com\/swlh\/how-to-use-smote-for-dealing-with-imbalanced-image-dataset-for-solving-classification-problems-3aba7d2b9cad."},{"key":"e_1_3_2_1_7_1","volume-title":"Machine Learning Mastery.","author":"Brownlee J.","year":"2020","unstructured":"Brownlee., J. (2020). Imbalanced classification with python, choose better metrics, balance skewed classes, and apply cost-sensitive learning. In Machine Learning Mastery."},{"key":"e_1_3_2_1_8_1","volume-title":"Advances in Neural Information Processing Systems.","author":"Dai Z.","year":"2021","unstructured":"Dai, Z., Liu, H., Le, Q. V., and Tan, M. (2021). Coatnet: Marrying convolution and attention for all data sizes. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Danish\u00a0Vasan\u00a0 \u00a0\u00a0Mamoun\u00a0Alazab\u00a0 \u00a0\u00a0Sobia\u00a0Wassan\u00a0 \u00a0\u00a0Babak\u00a0Safaei\u00a0 \u00a0\u00a0Qin\u00a0Zheng\u00a0 \u00a0(2020) \u00a0Image-Based malware classification using ensemble of CNN architectures (IMCEC) \u00a0Computers & Security Volume 92 \u00a0May 2020 101748","DOI":"10.1016\/j.cose.2020.101748"},{"key":"e_1_3_2_1_10_1","volume-title":"IEEE Applied Imagery Pattern Recognition Workshop (AIPR)","author":"David Kornish Justin Geary","unstructured":"David Kornish,\u00a0Justin Geary,\u00a0Victor Sansing,\u00a0Soundararajan Ezekiel,\u00a0Larry Pearlstein,\u00a0\u00a0Laurent Njilla,\u00a0(2018),\u00a0Malware Classification using Deep Convolutional Neural Networks,\u00a0\u00a0\u00a0(2018) IEEE Applied Imagery Pattern Recognition Workshop (AIPR)"},{"key":"e_1_3_2_1_11_1","unstructured":"Espoir K. Kabanga \u00a0Chang Hoon Kim (2018)\u00a0Malware Images Classification Using Convolutional Neural Network \u00a0 Journal of Computer and Communications\u00a0 \u00a0\u00a0Vol.6 No.1 January 2018"},{"key":"e_1_3_2_1_12_1","unstructured":"Fabio Di Troia \u00a0(2020) \u00a0Machine Learning Classification for Advanced Malware Detection A thesis submitted to Kingston University"},{"key":"e_1_3_2_1_13_1","unstructured":"Fengguo Wei Yuping Li Sankardas Roy Xinming Ou Wu Zhou. 2017. Deep ground truth analysis of current android malware. In DIMVA."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-12-8"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Giacomo Iadarola Fabio Martinelli Francesco Mercaldo and Antonella Santone \u00a0(2020) \u00a0Image-based Malware Family Detection: An Assessment between Feature Extraction and Classification Techniques \u00a0 AI4EIoTs 2020","DOI":"10.5220\/0009817804990506"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-018-0323-0"},{"key":"e_1_3_2_1_17_1","volume-title":"Sorel-20m: A large scale benchmark dataset for malicious pe detection","author":"Harang R.","year":"2020","unstructured":"Harang, R. and Rudd., E. M. (2020). Sorel-20m: A large scale benchmark dataset for malicious pe detection."},{"key":"e_1_3_2_1_18_1","volume-title":"'18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyMarch 2018Pages 127\u2013134","author":"Hiromu Yakura Shinnosuke Shinozaki","unstructured":"Hiromu Yakura,\u00a0Shinnosuke Shinozaki,\u00a0\u00a0Reon Nishimura,\u00a0\u00a0Yoshihiro Oyama,\u00a0\u00a0Jun Sakuma,\u00a0(2018),\u00a0Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism,\u00a0\u00a0CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyMarch 2018Pages 127\u2013134"},{"key":"e_1_3_2_1_19_1","volume-title":"Neural malware analysis with attention mechanism. Computers & Security","author":"Hiromu Yakura Shinnosuke Shinozaki","year":"2019","unstructured":"Hiromu Yakura, Shinnosuke Shinozaki, Reon Nishimura, Yoshihiro Oyama, and Jun Sakuma. 2019. Neural malware analysis with attention mechanism. Computers & Security (2019)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-020-01588-1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.57"},{"key":"e_1_3_2_1_22_1","unstructured":"Hussein Sadraldeen Al-Musawi \u00a0(2021) \u00a0Visual Malware Detection by Deep Learning Techniques in Windows System."},{"key":"e_1_3_2_1_23_1","volume-title":"MSc in Cyber Security","author":"Spark C.","year":"2022","unstructured":"ILLES, D. and Spark., C. (2022). On the impact of dataset size and class imbalance in evaluatingmachine learning-based windows malware detection techniques. In MSc in Cyber Security (The Open University) Professional Project Project Report"},{"key":"e_1_3_2_1_24_1","unstructured":"Jhu-Sin Luo \u00a0Dan Lo (2018) \u00a0Malware Image Classification using Machine Learning with Local Binary Pattern \u00a0Malware Image Classification using Machine Learning with Local Binary Pattern (kennesaw.edu) MASTER OF SCIENCE IN C.S. T HESES"},{"key":"e_1_3_2_1_25_1","volume-title":"\u00a0Malware Binary Image Classification Using Convolutional Neural Networks,\u00a0\u00a0International Conference on Cyber Warfare and Security\u00a017(1):469-478","author":"John Kiger Vahid Heydari","year":"2022","unstructured":"John Kiger,shen shyang ho,\u00a0Vahid Heydari, (2022),\u00a0Malware Binary Image Classification Using Convolutional Neural Networks,\u00a0\u00a0International Conference on Cyber Warfare and Security\u00a017(1):469-478"},{"key":"e_1_3_2_1_26_1","volume-title":"Motif: A large malware reference dataset with ground truth family labels","author":"Joyce R. J.","year":"2021","unstructured":"Joyce, R. J., Amlani, D., Nicholas, C., Raff, E., and Hamilton., B. A. (2021). Motif: A large malware reference dataset with ground truth family labels."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. Association for Computing Machinery New York, NY, United States.","author":"Kantchelian A.","year":"2015","unstructured":"Kantchelian, A., Tschantz, M. C., Afroz, S., Shankar, B. M. V., Bachwani, R., Joseph, A. D., and Tygar., J. D. (2015). Better malware ground truth: Techniques for weighting anti-virus vendor labels. In AISec \u201915: Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. Association for Computing Machinery New York, NY, United States."},{"key":"e_1_3_2_1_28_1","unstructured":"Konstantinos Kosmidis \u00a0(2016) \u00a0Machine Learning and Images for Malware Detection and Classification Project: MaLiC \u00a0 SCHOOL OF SCIENCE & TECHNOLOGY A thesis submitted for the degree of Master of Science (MSc) in Communications and Cybersecurity"},{"key":"e_1_3_2_1_29_1","volume-title":"'11: Proceedings of the 4th ACM workshop on Security and AI","author":"Nataraj\u00a0 Vinod Yegneswaran","unstructured":"L. Nataraj\u00a0,Vinod Yegneswaran,\u00a0Phillip Porras,\u00a0Jian Zhang,\u00a0(2011),\u00a0A Comparative Assessment of Malware Classification using Binary Texture Analysis and Dynamic Analysis,\u00a0AISec '11: Proceedings of the 4th ACM workshop on Security and AI"},{"key":"e_1_3_2_1_30_1","volume-title":"Visualization and Automatic Classification,\u00a0 VizSec '11: Proceedings of the 8th International Symposium on Visualization for Cyber SecurityJuly 2011Article No.: 4Pages 1\u20137","author":"Nataraj\u00a0 S. Karthikeyan","unstructured":"L. Nataraj\u00a0,S. Karthikeyan,\u00a0G. Jacob,\u00a0\u00a0B. S. Manjunath,\u00a0(2011),\u00a0Malware Images: Visualization and Automatic Classification,\u00a0 VizSec '11: Proceedings of the 8th International Symposium on Visualization for Cyber SecurityJuly 2011Article No.: 4Pages 1\u20137"},{"key":"e_1_3_2_1_31_1","unstructured":"Li Chen Ravi Sahita Jugal Parikh Marc Marino \u00a0(2020) Stamina:scalable deep learning approach for malware classification."},{"key":"e_1_3_2_1_32_1","volume-title":"Collecting millions of android apps and their metadata for the research community. arXiv preprint arXiv:1709.05281","author":"Li Li Jun Gao","year":"2017","unstructured":"Li Li, Jun Gao, M\u00e9d\u00e9ric Hurier, Pingfan Kong, Tegawend\u00e9 F Bissyand\u00e9, Alexandre Bartel, Jacques Klein, and Yves Le Traon. 2017. Androzoo++: Collecting millions of android apps and their metadata for the research community. arXiv preprint arXiv:1709.05281 (2017)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"e_1_3_2_1_34_1","volume-title":"Conference: Winter Simulation Conference 2019 At: National Harbor, Maryland. IEEE.","author":"LuJiang Y.","year":"2019","unstructured":"LuJiang, Y. and Li., L. (2019). Generative adversarial network for improving deep learning based malware classification. In Conference: Winter Simulation Conference 2019 At: National Harbor, Maryland. IEEE."},{"key":"e_1_3_2_1_35_1","volume-title":"Yang Wang, and Farkhund Iqbal.","author":"Mahmoud Kalash Mrigank Rochan","year":"2018","unstructured":"Mahmoud Kalash, Mrigank Rochan, Noman Mohammed, Neil DB Bruce, Yang Wang, and Farkhund Iqbal. 2018. Malware classification with deep convolutional neural networks. In NTMS. IEEE, 1\u20135."},{"key":"e_1_3_2_1_36_1","unstructured":"MD. HARIS UDDIN SHARIF NASMIN JIWANI KETAN GUPTA MEHMOOD ALI MOHAMMED DR.MERAJ FARHEEN ANSARI\u00a0(2023) \u00a0A DEEP LEARNING BASED TECHNIQUE FOR THE CLASSIFICATION OF MALWARE IMAGES \u00a0 of Theoretical and Applied Information Technology 15th February 2023. Vol.101. No 3\u00a0"},{"key":"e_1_3_2_1_37_1","unstructured":"Mugdha Jain \u00a0(2019) \u00a0Image-Based Malware Classification with Convolutional Neural Networks and Extreme Learning Machines \u00a0MASTER'S THESES AND GRADUATE RESEARCH"},{"issue":"2","key":"e_1_3_2_1_38_1","first-page":"42","article-title":"\u00a0Image Based Malware Classification with Multimodal Deep Learning,\u00a0\u00a0INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE M.U","volume":"10","author":"Mustafa Umut Demirezen","year":"2021","unstructured":"Mustafa Umut Demirezen,\u00a0(2021),\u00a0Image Based Malware Classification with Multimodal Deep Learning,\u00a0\u00a0INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE M.U. Demirezen, Vol.10, No.2, pp.42-59","journal-title":"Demirezen"},{"key":"e_1_3_2_1_39_1","volume-title":"I.","author":"Noever D. A.","year":"2021","unstructured":"Noever, D. A. and Noever., S. E. M. (2021). Virus-mnist: A benchmark malware dataset. Pointer, I. (2019). Programming PyTorch for Deep Learning: Creating and Deploying Deep Learning Applications. O'Reilly Media; 1st edition, 1st edition.","edition":"1"},{"key":"e_1_3_2_1_40_1","volume-title":"Stand-alone self-attention in vision models. In","author":"Ramachandran P.","year":"2019","unstructured":"Ramachandran, P., Parmar, N., Vaswani, A., Levskaya, I. B. A., and Shlens., J. (2019). Stand-alone self-attention in vision models. In"},{"key":"e_1_3_2_1_41_1","volume-title":"33rd International Conference on Neural Information Processing Systems. Curran Associates Inc","unstructured":"Proceedings of the 33rd International Conference on Neural Information Processing Systems. Curran Associates Inc. Red Hook, NY, US"},{"key":"e_1_3_2_1_42_1","volume-title":"HAR: Hardness Aware Reweighting for Imbalanced Datasets. In 2021 IEEE International Conference on Big Data (Big Data). IEEE, 735\u2013745","author":"Rahul Duggal Scott Freitas","year":"2021","unstructured":"Rahul Duggal, Scott Freitas, Sunny Dhamnani, Duen Horng Chau, and Jimeng Sun. 2021. HAR: Hardness Aware Reweighting for Imbalanced Datasets. In 2021 IEEE International Conference on Big Data (Big Data). IEEE, 735\u2013745"},{"key":"e_1_3_2_1_43_1","volume-title":"Microsoft malware classification challenge. arXiv preprint arXiv:1802.10135","author":"Royi Ronen Marian Radu","year":"2018","unstructured":"Royi Ronen, Marian Radu, Corina Feuerstein, Elad Yom-Tov, and Mansour Ahmadi. 2018. Microsoft malware classification challenge. arXiv preprint arXiv:1802.10135 (2018)."},{"key":"e_1_3_2_1_44_1","unstructured":"Royi Ronen Marian Radu Corina Feuerstein Elad Yom-Tov Mansour Ahmadi \u00a0\u00a0(2018) \u00a0Microsoft Malware Classification Challenge"},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 31st ACM International Conference on Information and Knowledge Management (CIKM \u201922)","author":"Scott Freitas Rahul Duggal","year":"2022","unstructured":"Scott Freitas, Rahul Duggal, Duen Horng Chau . (2022). MalNet: A Large-Scale Image Database of Malicious Software. In Proceedings of the 31st ACM International Conference on Information and Knowledge Management (CIKM \u201922), October 17\u201321, 2022, Atlanta, GA,"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_11"},{"key":"e_1_3_2_1_47_1","volume-title":"Annual Computer Security Applications Conference. Association for Computing Machinery New York, NY, United States.","author":"Sebastian S.","year":"2020","unstructured":"Sebastian, S. and Caballero., J. (2020). Avclass2: Massive malware tag extraction from av labels. In ACSAC \u201920: Annual Computer Security Applications Conference. Association for Computing Machinery New York, NY, United States."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.13089\/JKIISC.2016.26.1.197"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-2074"},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision. IEEE.","author":"Shen Z.","year":"2021","unstructured":"Shen, Z., Zhang, M., Zhao, H., Yi, S., and Li., H. (2021). Efficient attention: Attention with linear complexities. In Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision. IEEE."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Tan Gao\u00a0 \u00a0Lan Zhao\u00a0 \u00a0Xudong Li\u00a0 \u00a0Wen Chen\u00a0 (2021) \u00a0Malware detection based on semi-supervised learning with malware visualization.\u00a0","DOI":"10.3934\/mbe.2021300"},{"key":"e_1_3_2_1_52_1","unstructured":"Tran The\u00a0Son\u00a0 \u00a0Chando\u00a0Lee\u00a0 \u00a0Hoa\u00a0Le-Minh\u00a0 \u00a0Nauman\u00a0Aslam\u00a0 \u00a0Moshin Raza \u00a0Nguyen Quoc Long (2020) \u00a0An Evaluation of Image-Based Malware Classification Using Machine Learning \u00a0 In book: Advances in Computational Collective Intelligence"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01270"},{"key":"e_1_3_2_1_54_1","volume-title":"Towards Data Science.","author":"Verzino G.","year":"2021","unstructured":"Verzino., G. (2021). Why balancing classes is over-hyped. In Towards Data Science."},{"key":"e_1_3_2_1_55_1","volume-title":"Virustotal-free online virus, malware and url scanner. Online: https:\/\/www.virustotal.com\/gui\/home\/upload","author":"Virus Total","year":"2022","unstructured":"Virus Total. (2022) Virustotal-free online virus, malware and url scanner. Online: https:\/\/www.virustotal.com\/gui\/home\/upload (2022)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00020"},{"key":"e_1_3_2_1_57_1","volume-title":"Imbalanced malware images classification: a cnn based approach","author":"Yue S.","year":"2017","unstructured":"Yue, S. and Wang., T. (2017). Imbalanced malware images classification: a cnn based approach."},{"key":"e_1_3_2_1_58_1","volume-title":"International Symposium on Biometric and Security Technologies (ISBAST). IEEE.","author":"Zainudeen S.","year":"2014","unstructured":"Zainudeen, S., Shaid, M., and Maarof, M. A. (2014). Malware behavior image for malware variant identification. In International Symposium on Biometric and Security Technologies (ISBAST). IEEE."},{"key":"e_1_3_2_1_59_1","volume-title":"SEC\u201920: Proceedings of the 29th USENIX Conference on Security Symposium. USENIX Association United States.","author":"Zhu S.","year":"2020","unstructured":"Zhu, S., Shi, J., Yang, L., Qin, B., Zhang, Z., Song, L., and Wang., G. (2020). Measuring and modeling the label dynamics of online anti-malware engines. In SEC\u201920: Proceedings of the 29th USENIX Conference on Security Symposium. USENIX Association United States."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.494"}],"event":{"name":"ICMLC 2024: 2024 16th International Conference on Machine Learning and Computing","location":"Shenzhen China","acronym":"ICMLC 2024"},"container-title":["Proceedings of the 2024 16th International Conference on Machine Learning and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651671.3651735","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3651671.3651735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:19:10Z","timestamp":1755861550000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651671.3651735"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,2]]},"references-count":60,"alternative-id":["10.1145\/3651671.3651735","10.1145\/3651671"],"URL":"https:\/\/doi.org\/10.1145\/3651671.3651735","relation":{},"subject":[],"published":{"date-parts":[[2024,2,2]]},"assertion":[{"value":"2024-06-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}