{"id":"https:\/\/openalex.org\/W4312325617","doi":"https:\/\/doi.org\/10.1109\/dsa56465.2022.00162","title":"Malware API Sequence Detection Model based on Pre-trained BERT in Professional domain","display_name":"Malware API Sequence Detection Model based on Pre-trained BERT in Professional domain","publication_year":2022,"publication_date":"2022-08-01","ids":{"openalex":"https:\/\/openalex.org\/W4312325617","doi":"https:\/\/doi.org\/10.1109\/dsa56465.2022.00162"},"language":"en","primary_location":{"id":"doi:10.1109\/dsa56465.2022.00162","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1109\/dsa56465.2022.00162","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S4363608127","display_name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5086687768","display_name":"Rongheng Xu","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rongheng Xu","raw_affiliation_strings":["Hangzhou Danzi University,Hangzhou,China","Hangzhou Danzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Hangzhou Danzi University,Hangzhou,China","institution_ids":[]},{"raw_affiliation_string":"Hangzhou Danzi University, Hangzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5100624323","display_name":"Jilin Zhang","orcid":"https:\/\/orcid.org\/0000-0003-0241-0727"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jilin Zhang","raw_affiliation_strings":["Hangzhou Danzi University,Hangzhou,China","Hangzhou Danzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Hangzhou Danzi University,Hangzhou,China","institution_ids":[]},{"raw_affiliation_string":"Hangzhou Danzi University, Hangzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5100452308","display_name":"Zhou Li","orcid":"https:\/\/orcid.org\/0000-0002-9401-1012"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li Zhou","raw_affiliation_strings":["Hangzhou Danzi University,Hangzhou,China","Hangzhou Danzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Hangzhou Danzi University,Hangzhou,China","institution_ids":[]},{"raw_affiliation_string":"Hangzhou Danzi University, Hangzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https:\/\/openalex.org\/A5086687768"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.4909,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.61042654,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1059","last_page":"1060"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T11241","display_name":"Advanced Malware Detection Techniques","score":0.995199978351593,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1711","display_name":"Signal Processing"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T11241","display_name":"Advanced Malware Detection Techniques","score":0.995199978351593,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1711","display_name":"Signal Processing"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T10400","display_name":"Network Security and Intrusion Detection","score":0.9775000214576721,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/computer-science","display_name":"Computer science","score":0.8368542790412903},{"id":"https:\/\/openalex.org\/keywords\/malware","display_name":"Malware","score":0.766446590423584},{"id":"https:\/\/openalex.org\/keywords\/artificial-intelligence","display_name":"Artificial intelligence","score":0.542005717754364},{"id":"https:\/\/openalex.org\/keywords\/the-internet","display_name":"The Internet","score":0.5415113568305969},{"id":"https:\/\/openalex.org\/keywords\/software","display_name":"Software","score":0.5228388905525208},{"id":"https:\/\/openalex.org\/keywords\/machine-learning","display_name":"Machine learning","score":0.4797443151473999},{"id":"https:\/\/openalex.org\/keywords\/field","display_name":"Field (mathematics)","score":0.47465780377388},{"id":"https:\/\/openalex.org\/keywords\/scrambling","display_name":"Scrambling","score":0.4414632320404053},{"id":"https:\/\/openalex.org\/keywords\/computer-security","display_name":"Computer security","score":0.2871146500110626},{"id":"https:\/\/openalex.org\/keywords\/world-wide-web","display_name":"World Wide Web","score":0.26133036613464355},{"id":"https:\/\/openalex.org\/keywords\/operating-system","display_name":"Operating system","score":0.1427823007106781}],"concepts":[{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.8368542790412903},{"id":"https:\/\/openalex.org\/C541664917","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q14001","display_name":"Malware","level":2,"score":0.766446590423584},{"id":"https:\/\/openalex.org\/C154945302","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11660","display_name":"Artificial intelligence","level":1,"score":0.542005717754364},{"id":"https:\/\/openalex.org\/C110875604","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q75","display_name":"The Internet","level":2,"score":0.5415113568305969},{"id":"https:\/\/openalex.org\/C2777904410","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7397","display_name":"Software","level":2,"score":0.5228388905525208},{"id":"https:\/\/openalex.org\/C119857082","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q2539","display_name":"Machine learning","level":1,"score":0.4797443151473999},{"id":"https:\/\/openalex.org\/C9652623","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q190109","display_name":"Field (mathematics)","level":2,"score":0.47465780377388},{"id":"https:\/\/openalex.org\/C182548165","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q2261483","display_name":"Scrambling","level":2,"score":0.4414632320404053},{"id":"https:\/\/openalex.org\/C38652104","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3510521","display_name":"Computer security","level":1,"score":0.2871146500110626},{"id":"https:\/\/openalex.org\/C136764020","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q466","display_name":"World Wide Web","level":1,"score":0.26133036613464355},{"id":"https:\/\/openalex.org\/C111919701","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q9135","display_name":"Operating system","level":1,"score":0.1427823007106781},{"id":"https:\/\/openalex.org\/C202444582","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q837863","display_name":"Pure mathematics","level":1,"score":0},{"id":"https:\/\/openalex.org\/C33923547","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q395","display_name":"Mathematics","level":0,"score":0},{"id":"https:\/\/openalex.org\/C11413529","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q8366","display_name":"Algorithm","level":1,"score":0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109\/dsa56465.2022.00162","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1109\/dsa56465.2022.00162","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S4363608127","display_name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https:\/\/openalex.org\/W69312893","https:\/\/openalex.org\/W2349686135","https:\/\/openalex.org\/W84934912","https:\/\/openalex.org\/W936781193","https:\/\/openalex.org\/W2353936545","https:\/\/openalex.org\/W2153933599","https:\/\/openalex.org\/W4297633779","https:\/\/openalex.org\/W2287132719","https:\/\/openalex.org\/W2384550941","https:\/\/openalex.org\/W1508106439"],"abstract_inverted_index":{"With":[0,60],"the":[1,4,22,33,61,81,106,116,124,132,141],"development":[2,62],"of":[3,56,63,108,119],"Internet,":[5],"Internet":[6],"information":[7],"security":[8],"is":[9,20,51],"becoming":[10],"more":[11,13],"and":[12,26,49,69,135],"important.":[14],"As":[15],"far":[16],"as":[17,39,100],"malware":[18],"detection":[19,35],"concerned,":[21],"increasingly":[23],"serious":[24],"distortion":[25],"scrambling":[27],"have":[28],"brought":[29],"great":[30],"challenges":[31],"to":[32,44,76,130,140],"traditional":[34,112],"methodstraditional":[36],"methods":[37,72,113],"such":[38],"feature":[40],"database":[41],"are":[42,73,94],"difficult":[43],"effectively":[45],"detect":[46],"non-input":[47],"viruses,":[48],"there":[50],"a":[52],"very":[53],"high":[54],"cost":[55],"experts":[57],"in":[58,80,97],"detection.":[59],"artificial":[64],"intelligence":[65],"technology,":[66],"machine":[67],"learning":[68,71],"deep":[70],"widely":[74,95],"used":[75,96],"deal":[77],"with":[78],"tasks":[79],"computer":[82],"field.":[83],"In":[84],"dynamic":[85],"detection,":[86],"API":[87,120,138],"call":[88],"sequences":[89,104],"generated":[90],"by":[91],"malicious":[92,109],"software":[93,98],"classification":[99],"features,":[101],"because":[102],"these":[103],"represent":[105],"behaviors":[107],"software.":[110],"However,":[111],"cannot":[114],"capture":[115],"global":[117,133],"relationship":[118,134],"sequences.":[121],"We":[122],"use":[123],"BERT":[125],"model":[126],"based":[127],"on":[128],"transformer":[129],"learn":[131],"add":[136],"Windows":[137],"corpus":[139],"pre-training":[142],"model.":[143]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}