[1]CUI Zhihua,LAN Zhuoxuan,ZHANG Jingbo,et al.Malicious code detection model based on high-dimensional multi-objective sequential three-way decision[J].CAAI Transactions on Intelligent Systems,2024,19(1):97-105.[doi:10.11992/tis.202306013]
Copy

Malicious code detection model based on high-dimensional multi-objective sequential three-way decision

References:
[1] YANG Yanming, XIA Xin, LO D, et al. A survey on deep learning for software engineering[EB/OL]. (2020?11?30)[2023?06?07]. https://arxiv.org/abs/2011.14597.pdf.
[2] YUAN Baoguo, WANG Junfeng, WU Peng, et al. IoT malware classification based on lightweight convolutional neural networks[J]. IEEE Internet of things journal, 2022, 9(5): 3770–3783.
[3] LIU Yue, TANTITHAMTHAVORN C, LI Li, et al. Deep learning for android malware defenses: a systematic literature review[J]. ACM computing surveys, 2021, 55(8): 153.
[4] ZHANG Yongchao, LIU Zhe, JIANG Yu. The classification and detection of malware using soft relevance evaluation[J]. IEEE transactions on reliability, 2022, 71(1): 309–320.
[5] YAO Yiyu. Granular computing and sequential three-way decisions[C]//International Conference on Rough Sets and Knowledge Technology. Berlin, Heidelberg: Springer, 2013: 16?27.
[6] YAO Yiyu. The superiority of three-way decisions in probabilistic rough set models[J]. Information sciences, 2011, 181(6): 1080–1096.
[7] YAO Yiyu. Probabilistic rough set approximations[J]. International journal of approximate reasoning, 2008, 49(2): 255–271.
[8] GOEL R, MEHMOOD I, UGAIL H. A study of deep learning-based face recognition models for sibling identification[J]. Sensors, 2021, 21(15): 5068.
[9] CUI Zhihua, ZHAO Peng, HU Zhaoming, et al. An improved matrix factorization based model for many-objective optimization recommendation[J]. Information sciences, 2021, 579: 1–14.
[10] XIE Lijie, HU Zhaoming, CAI Xingjuan, et al. Explainable recommendation based on knowledge graph and multi-objective optimization[J]. Complex & intelligent systems, 2021, 7(3): 1241–1252.
[11] KUO W C, LIN Yupin. Malware detection method based on CNN[C]// International Computer Symposium. Singapore: Springer, 2019: 608?617.
[12] CUI Zhihua, XUE Fei, CAI Xingjuan, et al. Detection of malicious code variants based on deep learning[J]. IEEE transactions on industrial informatics, 2018, 14(7): 3187–3196.
[13] WANG Changguang, ZHAO Ziqiu, WANG Fangwei, et al. A novel malware detection and family classification scheme for IoT based on DEAM and DenseNet[J]. Security and communication networks, 2021, 2021: 1–16.
[14] ALMAHMOUD M, ALZU’BI D, YASEEN Q. ReDroidDet: android malware detection based on recurrent neural network[J]. Procedia computer science, 2021, 184: 841–846.
[15] CUI Zhihua, ZHAO Yaru, CAO Yang, et al. Malicious code detection under 5G HetNets based on a multi-objective RBM model[J]. IEEE network, 2021, 35(2): 82–87.
[16] YE Xiaoqing, LIU Dun. An interpretable sequential three-way recommendation based on collaborative topic regression[J]. Expert systems with applications, 2021, 168: 114454.
[17] 袁国鑫, 于洪. 一种基于邮件头信息的三支决策邮件过滤方法[J]. 计算机科学, 2017, 44(9): 74–77,114
YUAN Guoxin, YU Hong. Method of three-way decision spam filtering based on head information of E-mail[J]. Computer science, 2017, 44(9): 74–77,114
[18] 武慧琼, 张素兰, 张继福, 等. 一种基于三支决策的花卉图像分类[J]. 小型微型计算机系统, 2019, 40(7): 1558–1563
WU Huiqiong, ZHANG Sulan, ZHANG Jifu, et al. Classification method of flower images based on three-way decisions[J]. Journal of Chinese computer systems, 2019, 40(7): 1558–1563
[19] DAI Jin, SHAO Shuai, WANG Zu, et al. An novel image recognition method based on three-way decision[J]. MATEC web of conferences, 2018, 176: 01035.
[20] 孙勇, 李华雄. 基于多粒度序贯三支决策的代价敏感目标检测方法[J]. 山西大学学报(自然科学版), 2020, 43(4): 914–926
SUN Yong, LI Huaxiong. Cost-sensitive multi-granularity sequential three-way decision for object detection[J]. Journal of Shanxi University (natural science edition), 2020, 43(4): 914–926
[21] 于洪, 王国胤, 姚一豫. 决策粗糙集理论研究现状与展望[J]. 计算机学报, 2015, 38(8): 1628–1639
YU Hong, WANG Guoyin, YAO Yiyu. Current research and future perspectives on decision-theoretic rough sets[J]. Chinese journal of computers, 2015, 38(8): 1628–1639
[22] DEB K, PRATAP A, AGARWAL S, et al. A fast and elitist multiobjective genetic algorithm: NSGA-II[J]. IEEE transactions on evolutionary computation, 2002, 6(2): 182–197.
[23] DEB K, JAIN H. An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, part I: solving problems with box constraints[J]. IEEE transactions on evolutionary computation, 2014, 18(4): 577–601.
[24] CHENG Ran, JIN Yaochu, OLHOFER M, et al. A reference vector guided evolutionary algorithm for many-objective optimization[J]. IEEE transactions on evolutionary computation, 2016, 20(5): 773–791.
[25] YANG Shengxiang, LI Miqing, LIU Xiaohui, et al. A grid-based evolutionary algorithm for many-objective optimization[J]. IEEE transactions on evolutionary computation, 2013, 17(5): 721–736.
[26] BADER J, ZITZLER E. HypE: an algorithm for fast hypervolume-based many-objective optimization[J]. Evolutionary computation, 2011, 19(1): 45–76.
[27] CUI Zhihua, DU Lei, WANG Penghong, et al. Malicious code detection based on CNNs and multi-objective algorithm[J]. Journal of parallel and distributed computing, 2019, 129: 50–58.
Similar References:

Memo

-

Last Update: 1900-01-01

Copyright © CAAI Transactions on Intelligent Systems