[1] |
Nataraj L,Karthikeyan S,Jacob G,et al.Malware images:Visualization and automatic classification[C]∥Proc of the 8th International Symposium on Visualization for Cyber Security,2011:41-47.
|
[2] |
Kancherla K,Mukkamala S.Image visualization based malware detection[C]∥Proc of IEEE Symposium on Computational Intelligence in Cyber Security(CICS),2013:40-44.
|
[3] |
Ni S, Qian Q,Zhang R.Malware identification using visua- lization images and deep learning[J].Computers & Security,2018,77:871-885.
|
[4] |
Zhang Jing-lian,Peng Yan-bing.Research on malicious code classification based on feature fusion [J].Computer Engineering,2019,45(8):281-295.(in Chinese)
|
[5] |
Sun Bo-wen, Zhang Peng,Cheng Ming-yu,et al.Malicious code detection method based on code image enhancement[J].Journal of Tsinghua University(Natural Science Edition),2020,60(5):386-392.(in Chinese)
|
[6] |
Pendlebury F,Pierazzi F,Jordaney R,et al.TESSERACT:Eliminating experimental bias in malware classification across space and time[C]∥Proc of the 28th USENIX Security Symposium,2019:729-746.
|
[7] |
Homayoun S, Dehghantanha A, Ahmadzadeh M, et al.DRTHIS:Deep ransomware threat hunting and intelligence system at the fog layer[J].Future Generation Computer Systems,2018,7:94-104.
|
[8] |
Saxe J,Berlin K.Deep neural network based malware detection using two dimensional binary program features[C]∥Proc of the 10th International Conference on Malicious & Unwanted Software,2015:11-20.
|
[9] |
Al-Dujaili A,Huang A,Hemberg E,et al.Adversarial deep learning for robust detection of binary encoded malware[C]∥Proc of 2018 IEEE Security and Privacy Workshops,2018:76-82.
|
[10] |
Kim J Y,Bu S J,Cho S B.Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders[J].Information Sciences,2018,460-461:83-102.
|
[11] |
Salimans T,Goodfellow I,Zaremba W,et al.Improved techniques for training GANs[C]∥Proc of the 30th International Conference on Neural Information Processing Systems,2016:2234-2242.
|
[12] |
Cui Z, Xue F, Cai X, et al. Detection of malicious code variants based on deep learning [J]. IEEE Transactions on Industrial Informatics, 2018, 14(7):3187-3196.
|
[13] |
Wang Dong, Yang Ke, Xuan Jia-xing, et al. Research on multi classification method of malicious code family based on one dimension convolutional neural network[J]. Computer Applications and Software, 2021, 38(12):333-336. (in Chinese)
|
[14] |
Antoniou A,Storkey A J,Edwards H.Data augmentation generative adversarial networks[C]∥Proc of the 6th International Conference on Learning Representations,2018:1-10.
|
[15] |
Karras T,Laine S,Aila T.A style-based generator architecture for generative adversarial networks[C]∥Proc of IEEE/CVF Conference on Computer Vision and Pattern Recognition,2019:4396-4405.
|
[16] |
Ledig C,Theis L,Huszar F,et al.Photo-realistic single image super-resolution using a generative adversarial network[C]∥Proc of the 27th IEEE Conference on Computer Vision and Pattern Recognition,2017:105-114.
|
[17] |
Radford A,Metz L,Chintala S.Unsupervised representation learning with deep convolutional generative adversarial networks[J].arXiv:1511.06434, 2015.
|
[18] |
Simonyan K, Zisserman A.Very deep convolutional networks for large-scale image recognition[C]∥Proc of the 3rd International Conference on Learning Representations,2015:1-10.
|
[19] |
Hinton G, Salakhutdinov R. Reducing the dimensionality of data with neural networks [J].Science,2006,313(5786):504-507.
|
[20] |
Ronen R,Radu M,Feuerstein C,et al.Microsoft malware classification challenge [J].arXiv:1802.10135,2018.
|
[21] |
Lee D-H. Pseudo-label:The simple and efficient semi- supervised learning method for deep neural networks[C]∥Proc of ICML 2013 Workshop:Challenges in Representation Learning,2013:1-6.
|
[22] |
Rasmus A,Berglund M,Honkala M,et al.Semi-supervised learning with ladder networks[C]∥Proc of the 29th International Conference on Neural Information Processing Systems,2015:3546-3554.
|
|
附中文参考文献:
|
[4] |
张景莲,彭艳兵.基于特征融合的恶意代码分类研究[J].计算机工程,2019,45(8):281-295.
|
[5] |
孙博文,张鹏,成茗宇,等.基于代码图像增强的恶意代码检测方法[J].清华大学学报(自然科学版),2020,60(5):386-392.
|
[13] |
王栋, 杨珂, 玄佳兴, 等. 基于一维卷积神经网络的恶意代码家族多分类方法研究[J]. 计算机应用与软件, 2021, 38(12):333-336.
|