{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:48Z","timestamp":1750309608794,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707800","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:30:17Z","timestamp":1747247417000},"page":"2032-2039","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Balancing the Scales: Using GANs and Class Balance for Superior Malware Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2723-2410","authenticated-orcid":false,"given":"Attaullah Bolzano","family":"Buriro","sequence":"first","affiliation":[{"name":"Ca' Foscari University of Venice and Faculty of Engineering, Free University of Bolzano-Bozen, Bolzano, Bolzano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5409-5039","authenticated-orcid":false,"given":"Flaminia Venice","family":"Luccio","sequence":"additional","affiliation":[{"name":"Ca' Foscari University of Venice, Venice, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2150-952X","authenticated-orcid":false,"given":"Muhammad Azfar Bolzano","family":"Yaqub","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Free University of Bozen-Bolzano, Bolzano, Italy, Bolzano, Bolzano, Italy"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/AECT47998.2020.9194155"},{"key":"e_1_3_2_1_2_1","volume-title":"Ember: an open dataset for training static pe malware machine learning models. arXiv preprint arXiv:1804.04637","author":"Anderson Hyrum S","year":"2018","unstructured":"Hyrum S Anderson and Phil Roth. 2018. Ember: an open dataset for training static pe malware machine learning models. arXiv preprint arXiv:1804.04637 (2018)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigComp51126.2021.00048"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/app13042508"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468218.3469039"},{"key":"e_1_3_2_1_6_1","volume-title":"Electronics & Mobile Communication Conference (UEMCON). IEEE, 0660\u20130665","author":"Burks Roland","year":"2019","unstructured":"Roland Burks, Kazi Aminul Islam, Yan Lu, and Jiang Li. 2019. Data augmentation with generative models for improved malware detection: A comparative study. In 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 0660\u20130665."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSC49826.2021.9346277"},{"key":"e_1_3_2_1_9_1","volume-title":"Generative adversarial nets. Advances in neural information processing systems 27","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. Advances in neural information processing systems 27 (2014)."},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX Security Symposium. 139\u2013154","author":"Gu Guofei","year":"2008","unstructured":"Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee. 2008. Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection. In USENIX Security Symposium. 139\u2013154."},{"key":"e_1_3_2_1_11_1","volume-title":"Leveraging LSTM and GAN for Modern Malware Detection. arXiv preprint arXiv:2405.04373","author":"Gupta Ishita","year":"2024","unstructured":"Ishita Gupta, Sneha Kumari, Priya Jha, and Mohona Ghosh. 2024. Leveraging LSTM and GAN for Modern Malware Detection. arXiv preprint arXiv:2405.04373 (2024)."},{"key":"e_1_3_2_1_12_1","volume-title":"Mar","author":"Guyon Isabelle","year":"2003","unstructured":"Isabelle Guyon and Andr\u00e9 Elisseeff. 2003. An introduction to variable and feature selection. Journal of machine learning research 3, Mar (2003), 1157\u20131182."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"e_1_3_2_1_14_1","volume-title":"Feature selection: Evaluation, application, and small sample performance","author":"Jain Anil","year":"1997","unstructured":"Anil Jain and Douglas Zongker. 1997. Feature selection: Evaluation, application, and small sample performance. IEEE transactions on pattern analysis and machine intelligence 19, 2 (1997), 153\u2013158."},{"key":"e_1_3_2_1_15_1","volume-title":"The class imbalance problem: A systematic study. Intelligent data analysis 6, 5","author":"Japkowicz Nathalie","year":"2002","unstructured":"Nathalie Japkowicz and Shaju Stephen. 2002. The class imbalance problem: A systematic study. Intelligent data analysis 6, 5 (2002), 429\u2013449."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78621-2_7"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-021-00381-3"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2019.8899533"},{"volume-title":"Performance analysis of machine learning and pattern recognition algorithms for malware classification","author":"Narayanan Barath Narayanan","key":"e_1_3_2_1_19_1","unstructured":"Barath Narayanan Narayanan, Ouboti Djaneye-Boundjou, and Temesguen M Kebede. 2016. Performance analysis of machine learning and pattern recognition algorithms for malware classification. In IEEE National aerospace and electronics conference and Ohio innovation summit. IEEE, 338\u2013342."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-014-1511-6"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.04.005"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCECE53908.2022.9793102"},{"key":"e_1_3_2_1_23_1","volume-title":"ICCCE 2020: Proceedings of the 3rd International Conference on Communications and Cyber Physical Engineering. Springer, 217\u2013223","author":"Reddy Raghunath","year":"2020","unstructured":"Raghunath Reddy, M Kumara Swamy, and D Ajay Kumar. 2020. Feature and sample size selection for malware classification process. In ICCCE 2020: Proceedings of the 3rd International Conference on Communications and Cyber Physical Engineering. Springer, 217\u2013223."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3010330"},{"key":"e_1_3_2_1_25_1","unstructured":"Michael Sikorski and Andrew Honig. 2012. Practical malware analysis: the hands-on guide to dissecting malicious software. no starch press."},{"key":"e_1_3_2_1_26_1","volume-title":"Improving Android Malware Detection Through Data Augmentation Using Wasserstein Generative Adversarial Networks. arXiv preprint arXiv:2403.00890","author":"Stalin Kawana","year":"2024","unstructured":"Kawana Stalin and Mikias Berhanu Mekoya. 2024. Improving Android Malware Detection Through Data Augmentation Using Wasserstein Generative Adversarial Networks. arXiv preprint arXiv:2403.00890 (2024)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45215-7_5"},{"key":"e_1_3_2_1_28_1","volume-title":"Andrew KC Wong, and Mohamed S Kamel","author":"Sun Yanmin","year":"2009","unstructured":"Yanmin Sun, Andrew KC Wong, and Mohamed S Kamel. 2009. Classification of imbalanced data: A review. International journal of pattern recognition and artificial intelligence 23, 04 (2009), 687\u2013719."},{"key":"e_1_3_2_1_29_1","volume-title":"Generating videos with scene dynamics. Advances in neural information processing systems 29","author":"Vondrick Carl","year":"2016","unstructured":"Carl Vondrick, Hamed Pirsiavash, and Antonio Torralba. 2016. Generating videos with scene dynamics. Advances in neural information processing systems 29 (2016)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.12.014"},{"key":"e_1_3_2_1_31_1","volume-title":"Lr-gan: Layered recursive generative adversarial networks for image generation. arXiv preprint arXiv:1703.01560","author":"Yang Jianwei","year":"2017","unstructured":"Jianwei Yang, Anitha Kannan, Dhruv Batra, and Devi Parikh. 2017. Lr-gan: Layered recursive generative adversarial networks for image generation. arXiv preprint arXiv:1703.01560 (2017)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00020"}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Catania International Airport Catania Italy","acronym":"SAC '25"},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707800","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:32Z","timestamp":1750298252000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707800"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":32,"alternative-id":["10.1145\/3672608.3707800","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707800","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}