{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:24:49Z","timestamp":1771025089894,"version":"3.50.1"},"reference-count":35,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T00:00:00Z","timestamp":1762041600000},"content-version":"vor","delay-in-days":305,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.070101","type":"journal-article","created":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T09:00:15Z","timestamp":1758618015000},"page":"5531-5553","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":2,"title":["HERL-ViT: A Hybrid Enhanced Vision Transformer Based on Regional-Local Attention for Malware Detection"],"prefix":"10.32604","volume":"85","author":[{"given":"Boyan","family":"Cui","sequence":"first","affiliation":[]},{"given":"Huijuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yongjun","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Hongce","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Quanbo","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Dongran","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xuehua","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence; 2011 Oct 21; Chicago, IL, USA","first-page":"21","article-title":"A comparative assessment of malware classification using binary texture analysis and dynamic analysis","author":"Nataraj"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"10975","DOI":"10.1007\/s11042-019-08310-9","article-title":"Malware visualization methods based on deep convolution neural networks","volume":"79","author":"Ren","year":"2020","journal-title":"Multimed Tools Appl"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"Bhodia N, Prajapati P, Di Troia F, Stamp M. Transfer learning for image-based malware classification. arXiv:1903.11551. 2019.","DOI":"10.5220\/0007701407190726"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.jpdc.2019.03.010","article-title":"Malicious code detection based on CNNs and multi-objective algorithm","volume":"129","author":"Cui","year":"2019","journal-title":"J Parallel Distrib Comput"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"107138","DOI":"10.1016\/j.comnet.2020.107138","article-title":"IMCFN: image-based malware classification using fine-tuned convolutional neural network architecture","volume":"171","author":"Vasan","year":"2020","journal-title":"Comput Netw"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1968","DOI":"10.1016\/j.jksuci.2022.02.026","article-title":"Mal-Detect: an intelligent visualization approach for malware detection","volume":"34","author":"Falana","year":"2022","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"ref7","first-page":"4754","article-title":"Dynamic prototype network based on sample adaptation for few-shot malware detection","volume":"35","author":"Chai","year":"2023","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1826","DOI":"10.3390\/make5040088","article-title":"Android malware classification based on fuzzy hashing visualization","volume":"5","author":"Rodriguez-Bazan","year":"2023","journal-title":"Mach Learn Knowl Extr"},{"key":"ref9","series-title":"2023 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT); 2023 Nov 23\u201325; Malang, Indonesia","first-page":"308","article-title":"CNN vs. transformer variants: malware classification using binary malware images","author":"Rahman"},{"key":"ref10","first-page":"103306","article-title":"Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification","volume":"69","author":"Chaganti","year":"2022","journal-title":"J Inf Secur Appl"},{"key":"ref11","series-title":"2024 10th International Symposium on System Security, Safety, and Reliability (ISSSR); 2024 Mar 16\u201317; Xiamen, China","first-page":"104","article-title":"pH-CNN for PE malware classification by means of enhanced images","author":"Li"},{"key":"ref12","first-page":"22","article-title":"Classification of malware images using fine-tunned ViT","volume":"7","author":"Katar","year":"2024","journal-title":"Sakarya Univ J Comput Inf Sci"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"102761","DOI":"10.1016\/j.cose.2022.102761","article-title":"Feature fusion-based malicious code detection with dual attention mechanism and BiLSTM","volume":"119","author":"Shen","year":"2022","journal-title":"Comput Secur"},{"key":"ref14","first-page":"286","article-title":"Neural network-based binary function similarity detection","volume":"48","author":"Fang","year":"2021","journal-title":"Comput Sci"},{"key":"ref15","first-page":"654","article-title":"Malicious code clustering based on graph convolutional networks","volume":"56","author":"Liu","year":"2019","journal-title":"J Sichuan Univ"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"103121","DOI":"10.1109\/ACCESS.2022.3206445","article-title":"Self-supervised vision transformers for malware detection","volume":"10","author":"Seneviratne","year":"2022","journal-title":"IEEE Access"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"102501","DOI":"10.1016\/j.cose.2021.102501","article-title":"Obfuscated malware detection using deep generative model based on global\/local features","volume":"112","author":"Kim","year":"2022","journal-title":"Comput Secur"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"6839","DOI":"10.3390\/app13116839","article-title":"A malware detection and extraction method for the related information using the ViT attention mechanism on Android operating system","volume":"13","author":"Jo","year":"2023","journal-title":"Appl Sci"},{"key":"ref19","series-title":"Proceedings of the 2023 13th International Conference on Communication and Network Security; 2023 Dec 6\u20138; Fuzhou China","article-title":"AntiMal: an approach of malware detection employing swin transformer","author":"Lyu"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"69337","DOI":"10.1109\/ACCESS.2023.3293530","article-title":"Global-local attention-based butterfly vision transformer for visualization-based malware classification","volume":"11","author":"Belal","year":"2023","journal-title":"IEEE Access"},{"key":"ref21","series-title":"ICASSP 2024\u20142024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP); 2024 Apr 14\u201319; Seoul, Republic of Korea","first-page":"2440","article-title":"PVitNet: an effective approach for Android malware detection using pyramid feature processing and vision transformer","author":"Yang"},{"key":"ref22","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, et al. Intriguing properties of neural networks. arXiv:1312.6199. 2013."},{"key":"ref23","unstructured":"Goodfellow IJ, Shlens J, Szegedy C. Explaining and harnessing adversarial examples. arXiv:1412.6572. 2014."},{"key":"ref24","series-title":"2017 IEEE Symposium on Security and Privacy (SP); 2017 May 22\u201326; San Jose, CA, USA","first-page":"39","article-title":"Towards evaluating the robustness of neural networks","author":"Carlini"},{"key":"ref25","series-title":"Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR); 2016 Jun 27\u201330; Las Vegas, NV, USA","first-page":"2574","article-title":"DeepFool: a simple and accurate method to fool deep neural networks","author":"Moosavi-Dezfooli"},{"key":"ref26","series-title":"Proceedings of the International Symposium on Quality of Service; 2019 Jun 24\u201325; Phoenix, AZ, USA","article-title":"ATMPA: attacking machine learning-based malware visualization detection methods via adversarial examples","author":"Liu"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.3390\/sym13061081","article-title":"AdvAndMal: adversarial training for Android malware detection and family classification","volume":"13","author":"Wang","year":"2021","journal-title":"Symmetry"},{"key":"ref28","doi-asserted-by":"crossref","unstructured":"Grosse K, Papernot N, Manoharan P, Backes M, McDaniel P. Adversarial perturbations against deep neural networks for malware classification. arXiv:1606.04435. 2016.","DOI":"10.1109\/SP.2016.41"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1109\/TII.2022.3192901","article-title":"Adversarial ELF malware detection method using model interpretation","volume":"19","author":"Qiao","year":"2023","journal-title":"IEEE Trans Ind Inf"},{"key":"ref30","series-title":"Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering; 2024 Apr 14\u201320; Lisbon, Portugal","first-page":"1","article-title":"A comprehensive study of learning-based Android malware detectors under challenging environments","author":"Gao"},{"key":"ref31","series-title":"Intelligent Data Engineering and Automated Learning\u2014IDEAL 2022; 2022 Nov 24\u201326; Manchester, UK","first-page":"289","article-title":"A vision transformer enhanced with patch encoding for malware classification","author":"Park"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.future.2021.06.032","article-title":"Visualization and deep-learning-based malware variant detection using OpCode-level features","volume":"125","author":"Darem","year":"2021","journal-title":"Future Gener Comput Syst"},{"key":"ref33","first-page":"551","article-title":"Lightweight malicious code classification method based on improved SqueezeNet","volume":"78","author":"Li","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref34","first-page":"103313","article-title":"IMCLNet: a lightweight deep neural network for Image-based malware classification","volume":"70","author":"Zou","year":"2022","journal-title":"J Inf Secur Appl"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10586-024-04755-2","article-title":"A lightweight machine learning methods for malware classification","volume":"28","author":"Farfoura","year":"2024","journal-title":"Clust Comput"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-3\/TSP_CMC_70101\/TSP_CMC_70101.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:24:36Z","timestamp":1763346276000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n3\/64197"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":35,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.070101","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-07-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-22","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-23","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}