Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (5): 1-20.doi: 10.11959/j.issn.2096-109x.2023064
• Comprehensive Review •
Jinwei WANG1,2,3, Zhengjia CHEN1,2, Xue XIE4,5, Xiangyang LUO6, Bin MA7
Revised:
2023-08-10
Online:
2023-10-01
Published:
2023-10-01
Supported by:
CLC Number:
Jinwei WANG, Zhengjia CHEN, Xue XIE, Xiangyang LUO, Bin MA. Review of malware detection and classification visualization techniques[J]. Chinese Journal of Network and Information Security, 2023, 9(5): 1-20.
"
文献与年份 | 静态/动态/混合 | 特征 | 机器学习算法 | 分类 | 数据集 |
2001年[ | 静态 | DLL、字符串序列、字节序列 | NB | 机器学习 | 自定义数据集 |
2004年[ | 静态 | 字节序列 | NB、DT、SVM | 机器学习 | SourceForge、VX Heavens |
2006年[ | 静态 | 字节序列 | NB、DT、SVM | 机器学习 | SourceForge、VX Heavens |
2009年[ | 静态 | 可变长指令序列 | DT、RF | 机器学习 | VX Heavens |
2010年[ | 动态 | 稀疏向量模型 | KNN、NB、J48 DT、SVM | 机器学习 | 自定义数据集 |
2011年[ | 动态 | 行为信息 | — | — | 自定义数据集 |
2011年[ | 动态 | 指令轨迹 | SVM | 机器学习 | 自定义数据集 |
2013年[ | 静态 | 函数调用图细粒度 | KNN、SVM | 机器学习 | Offensive Computing |
2013年[ | 混合 | 函数长度频率、字符串信息矢量化、API | SVM、IB1、DT、RF | 机器学习 | 自定义数据集 |
2016年[ | 静态 | API | SAE | 深度学习 | Comodo Cloud、SecurityCenter |
2017年[ | 静态 | PE头、熵、DLL | SVM | 机器学习 | WINE |
2019年[ | 静态 | PE头 | DT、RF、KNN、LR、NB等 | 机器学习 | VirusShare |
2020年[ | 混合 | 静态签名、样本灰度图、行为路径树 | KNN、LMNN | 机器学习 | VirusSign、MalShare等 |
2021年[ | 动态 | 行为信息、API | BGRU | 深度学习 | VirusShare |
"
文献与年份 | 图像类型 | 特征 | 机器学习算法 | 分类准确率/检测准确率 | 数据集 |
2011年[ | 灰度 | GIST | KNN | 98%/- | 自定义数据集 |
2012年[ | 热图 | 内核 | SVM | -/98.07% | Offensive Computing |
2013年[ | 灰度 | 图像强度、小波与Gabor特征 | SVM | - | Offensive Computing |
2017年[ | 灰度 | 操作码序列、函数频率 | DT、LR 、NB、KNN、RF | 98.9%/- | ESET NOD32/VX Hea-vens收集 |
2018年[ | 彩色 | 纹理特征、颜色特征、字节序列 | RF、KNN、SVM | 97.47%/- | 自定义数据集 |
2018年[ | 灰度 | GIST、DSIFT或LBP | KNN、RF | NDB:95.3%/- | Natarj/Antiy Databases |
Antiy:94.98%/- | (NDB和Antiy) | ||||
2018年[ | 灰度 | GIST、SIFT、GLCM等 | RF、XGBoost、SVM | - | BIG2015 |
2019年[ | 灰度 | GIST和DSIFT | KNN、SVM、NB | 98%/- | Malimg |
2019年[ | 灰度 | 操作码序列和纹理特征 | MLP、LR、RF | 85%/- | malwaredb |
2020年[ | 灰度 | HOG | 深度森林 | 96%/- | BIG2015 |
2020年[ | 灰度 | GLCM、操作码序列、灰度直方图 | RF | 97.04%/- | BIG2015 |
"
文献与年份 | 图像类型 | 特征 | 深度学习模型 | 分类准确率/检测准确率 | 数据集 |
2018年[ | 灰度 | 操作码序列 | MalNet (CNN (BaseNet、VGGNet)、LSTM) | 99.8%/99.36% | BIG2015 |
2018年[ | 灰度 | - | VGG16改进 | Malimg:98.52%/- | Malimg、BIG2015 |
BIG2015:99.97%/- | |||||
2019年[ | 灰度 | 汇编指令词向量 | Lenet5改进 | 98.56%/- | BIG2015 |
2019年[ | 灰度 | 字节序列,注意力图 | 添加注意力机制的自定义CNN | - | VX Heaven |
2020年[ | 彩色 | - | VGG16改进 | 96.16%/- | Malimg |
2020年[ | 彩色 | 彩色映射 | VGG16 | Malimg:98.82%/- | Malimg |
IoT-android:97.35%/- | 、IoT- android mobile dataset | ||||
2021年[ | 彩色 | 操作码频率 | RNN、自定义CNN | 98.8%/- | BIG2015 |
2021年[ | 彩色 | 操作码频率、空间填充曲线 | VGG16 | 98.50%/- | BIG2015 |
2021年[ | 彩色 | 空间填充曲线 | VGG19 | 98.24%/99.02% | Kaspersky |
2021年[ | 彩色 | - | Alexnet | 97.8%/- | Malimg |
2021年[ | 彩色 | 区段特征 | DSCAM | 98.38%/- | VirusShare |
2021年[ | Markov图像 | 纹理特征 | DenseNet改进 | Malimg:99.94%/- | Malimg、BIG2015 |
BIG2015:98.98%/- | |||||
2021年[ | 灰度 | - | ANN | 99.13%%/- | Malimg |
2022年[ | 彩色 | - | Mal-Detect(DCNN、DGAN) | 96.77%/- | MaleVis、Mallmg 和Virushare |
2023年[ | 彩色 | 二进制和汇编信息、API信 | 空洞空间金字塔池化改进的 | Kaggle:99.48% | Kaggle、DataCon |
息间的语义关系 | CNN | DataCon:97.78% |
[1] | 国家互联网应急中心. 网络安全信息与动态周报[EB]. |
National Internet Emergency Center. Network security information and dynamic weekly report[EB]. | |
[2] | IWAMOTO K , WASAKI K . Malware classification based on extracted API sequences using static analysis[C]// Proceedings of the Asian Internet Engineeering Conference. 2012: 31-38. |
[3] | IMRAN M , AFZAL M T , QADIR M A . Similarity-based malware classification using hidden Markov model[C]// 2015 Fourth International Conference on Cyber Security,Cyber Warfare,and Digital Forensic (CyberSec). 2015: 129-134. |
[4] | HARDY W , CHEN L , HOU S ,et al. DL4MD:a deep learning framework for intelligent malware detection[C]// Proceedings of the International Conference on Data Science (ICDATA).The Steering Committee of The World Congress in Computer Science,Computer Engineering and Applied Computing (WorldComp). 2016:61. |
[5] | SCHULTZ M G , ESKIN E , ZADOK F ,et al. Data mining methods for detection of new malicious executables[C]// Proceedings 2001 IEEE Symposium on Security and Privacy ( S&P 2001). 2000: 38-49. |
[6] | KOLTER J Z , MALOOF M A . Learning to detect malicious executables in the wild[C]// Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2004: 470-478. |
[7] | KOLTER J Z , MALOOF M A . Learning to detect and classify malicious executables in the wild[J]. Journal of Machine Learning Research, 2006,7(12). |
[8] | KANG B J , YERIMA S Y , MC-LAUGHLIN K , et al . N-opcode analysis for android malware classification and categorization[C]// 2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). 2016: 1-7. |
[9] | TIAN R , BATTEN L M , VERSTEEG S C . Function length as a tool for malware classification[C]// 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE). 2008: 69-76. |
[10] | SIDDIQUI M , WANG M C , LEE J . Detecting internet worms using data mining techniques[J]. Journal of Systemics,Cybernetics and Informatics, 2009,6(6): 48-53. |
[11] | KONG D , YAN G . Discriminant malware distance learning on structural information for automated malware classification[C]// Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data mining. 2013: 1357-1365. |
[12] | BAYSA D , LOW R M , STAMP M . Structural entropy and metamorphic malware[J]. Journal of Computer Virology and Hacking Techniques, 2013,9(4): 179-192. |
[13] | LI B , ROUNDY K , GATES C ,et al. Large-scale identification of malicious singleton files[C]// Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy. 2017: 227-238. |
[14] | KUMAR A , KUPPUSAMY K S , AGHILA G . A learning model to detect maliciousness of portable executable using integrated feature set[J]. Journal of King Saud University-Computer and Information Sciences, 2019,31(2): 252-265. |
[15] | FIRDAUSI I , ERWIN A , NUGROHO A S . Analysis of machine learning techniques used in behavior-based malware detection[C]// 2010 2nd International Conference on Advances in Computing,Control,and Telecommunication Technologies. 2010: 201-203. |
[16] | ZOLKIPLI M F , JANTAN A . An approach for malware behavior identification and classification[C]// 2011 3rd International Conference on Computer Research and Development. 2011: 191-194. |
[17] | RIECK K , TRINIUS P , WILLEMS C ,et al. Automatic analysis of malware behavior using machine learning[J]. Journal of Computer Security, 2011,19(4): 639-668. |
[18] | ANDERSON B , QUIST D , NEIL J ,et al. Graph-based malware detection using dynamic analysis[J]. Journal in Computer Virology, 2011,7(4): 247-258. |
[19] | KIM H , KIM J , KIM Y ,et al. Improvement of malware detection and classification using API call sequence alignment and visualization[J]. Cluster Computing, 2019,22(1): 921-929. |
[20] | 陈佳捷, 彭伯庄, 吴佩泽 . 基于动态行为和机器学习的恶意代码检测方法[J]. 计算机工程, 2021,47(3): 166-173. |
CHEN J J , PENG B Z , WU P Z . Malicious code detection method based on dynamic behavior and machine learning[J]. Computer Engineering, 2021,47(3): 166-173. | |
[21] | ISLAM R , TIAN R , BATTEN L M ,et al. Classification of malware based on integrated static and dynamic features[J]. Journal of Network and Computer Applications, 2013,36(2): 646-656. |
[22] | SANTOS I , DEVESA J , BREZO F ,et al. Opem:a static-dynamic approach for machine-learning-based malware detection[C]// International Joint Conference CISIS’12-ICEUTE′ 12-SOCO′ 12, 2013: 271-280. |
[23] | 金炳初 . 基于多特征的恶意软件分类方法[D]. 太原:太原理工大学, 2020. |
JIN B C . Malware classification method based on multiple features[D]. Taiyuan:Taiyuan University of Technology, 2020. | |
[24] | 陈志锋, 李清宝, 张平 ,等. 基于数据特征的内核恶意软件检测[J]. 软件学报, 2016,27(12): 3172-3191. |
CHEN Z F , LI Q B , ZHANG P ,et al. Kernel malware detection based on data features[J]. Journal of Software, 2016,27(12): 3172-3191. | |
[25] | NATARAJ L , KARTHIKEYAN S , JACOB G ,et al. Malware images:visualization and automatic classification[C]// Proceedings of the 8th International Symposium on Visualization for Cyber Security. 2011: 1-7. |
[26] | TORRALBA A , MURPHY K P , FREEMAN W T ,et al. Context-based vision system for place and object recognition[C]// IEEE International Conference on Computer Vision. 2003: 273-273. |
[27] | OLIVA A , TORRALBA A . Modeling the shape of the scene:a holistic representation of the spatial envelope[J]. International Journal of Computer Vision, 2001,42(3): 145-175. |
[28] | SIAGIAN C , ITTI L . Rapid biologically-inspired scene classification using features shared with visual attention[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007,29(2): 300-312. |
[29] | NATARAJ L , YEGNESWARAN V , PORRAS P ,et al. A comparative assessment of malware classification using binary texture analysis and dynamic analysis[C]// Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence. 2011: 21-30. |
[30] | 刘亚姝, 王志海, 严寒冰 ,等. 抗混淆的恶意代码图像纹理特征描述方法[J]. 通信学报, 2018,39(11): 44-53. |
LIU Y S , WANG Z H , YAN H B ,et al. Anti-obfuscation malicious code image texture feature description method[J]. Journal on Communications, 2018,39(11): 44-53. | |
[31] | 刘亮, 刘露平, 何帅 ,等. 一种基于多特征的恶意代码家族静态标注方法[J]. 信息安全研究, 2018,4(4): 322-328. |
LIU L , LIU L P , HE S ,et al. A static labeling method for malware family based on multiple features[J]. Journal of Information Security Research, 2018,4(4): 322-328. | |
[32] | NAEEM H , GUO B , NAEEM M R ,et al. Identification of malicious code variants based on image visualization[J]. Computers &Electrical Engineering, 2019,76: 225-237. |
[33] | LIU L , WANG B , YU B ,et al. Automatic malware classification and new malware detection using machine learning[J]. Frontiers of Information Technology & Electronic Engineering, 2017,18(9): 1336-1347. |
[34] | FU J , XUE J , WANG Y ,et al. Malware visualization for fine-grained classification[J]. IEEE Access, 2018,6: 14510-14523. |
[35] | 郎大鹏, 丁巍, 姜昊辰 ,等. 基于多特征融合的恶意代码分类算法[J]. 计算机应用, 2019,39(8): 2333-2338. |
LANG D P , DING W , JIANG H C ,et al. Malware classification algorithm based on multi-feature fusion[J]. Journal of Computer Applications, 2019,39(8): 2333-2338. | |
[36] | 李劭杰, 王晨, 史崯 . 基于多特征随机森林的恶意代码检测[J]. 计算机应用与软件, 2020,37(10): 328-333. |
LI S J , WANG C , SHI Y . Malware detection based on random forest with multiple features[J]. Computer Applications and Software, 2020,37(10): 328-333. | |
[37] | ANDERSON B , STORLIE C , LANE T . Improving malware classification:bridging the static/dynamic gap[C]// Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence. 2012: 3-14. |
[38] | 卢喜东, 段哲民, 钱叶魁 ,等. 一种基于深度森林的恶意代码分类方法[J]. 软件学报, 2020,31(5): 1454-1464. |
LU X D , DUAN Z M , QIAN Y K ,et al. A deep forest-based malware classification method[J]. Journal of Software, 2020,31(5): 1454-1464. | |
[39] | KANCHERLA K , MUKKAMALA S . Image visualization based malware detection[C]// 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS). 2013: 40-44. |
[40] | DAVIS A , WOLFF M . Deep learning on disassembly data[J]. BlackHat USA, 2015. |
[41] | 轩勃娜, 李进 . 基于改进CNN的恶意软件分类方法[J]. 电子学报, 2023,51(5): 1187-1197. |
XUAN B N , LI J . Malware classification method based on improved CNN[J]. Acta Electronica Sinica, 2023,51(5): 1187-1197. | |
[42] | CUI Z , XUE F , CAI X ,et al. Detection of malicious code variants based on deep learning[J]. IEEE Transactions on Industrial Informatics, 2018,14(7): 3187-3196. |
[43] | KALASH M , ROCHAN M , MOHAMMED N ,et al. Malware classification with deep convolutional neural networks[C]// 2018 9th IFIP International Conference on New Technologies,Mobility and Security (NTMS). 2018: 1-5. |
[44] | 田志成, 张伟哲, 乔延臣 ,等. 基于模型解释的PE文件对抗性恶意代码检测[J]. 软件学报, 2023,34(4): 1926-1943. |
TIAN Z C , ZHANG W Z , QIAO Y C ,et al. Adversarial malicious code detection for PE files based on model interpretation[J]. Journal of Software, 2023,34(4): 1926-1943. | |
[45] | 王博, 蔡弘昊, 苏旸 . 基于 VGGNet 的恶意代码变种分类[J]. 计算机应用, 2020,40(1): 162-167. |
WANG B , CAI H H , SU Y . Malware variant classification based on VGGNet[J]. Journal of Computer Applications, 2020,40(1): 162-167. | |
[46] | CHU Q , LIU G , ZHU X . Visualization feature and CNN based homology classification of malicious code[J]. Chinese Journal of Electronics, 2020,29(1): 154-160. |
[47] | VASAN D , ALAZAB M , WASSAN S ,et al. IMCFN:image-based malware classification using fine-tuned convolutional neural network architecture[J]. Computer Networks, 2020,171:107138. |
[48] | 蒋考林, 白玮, 张磊 ,等. 基于多通道图像深度学习的恶意代码检测[J]. 计算机应用, 2021,41(4): 1142-1147. |
JIANG K L , BAI W , ZHANG L , CHEN J ,et al. Malware detection based on multi-channel image deep learning[J]. Journal of Computer Applications, 2021,41(4): 1142-1147. | |
[49] | NI S , QIAN Q , ZHANG R . Malware identification using visualization images and deep learning[J]. Computers & Security, 2018,77: 871-885. |
[50] | SUN G , QIAN Q . Deep learning and visualization for identifying malware families[J]. IEEE Transactions on Dependable and Secure Computing, 2018,18(1): 283-295. |
[51] | 陈小寒, 魏书宁, 覃正泽 . 基于深度学习可视化的恶意软件家族分类[J]. 计算机工程与应用, 2021,57(22): 131-138. |
Chen X H , Wei S N , Qin Z Z . Malware family classification based on deep learning visualization[J]. Computer Engineering and Applications, 2021,57(22): 131-138. | |
[52] | GIBERT D , MATEU C , PLANES J ,et al. Classification of malware by using structural entropy on convolutional neural networks[C]// Proceedings of the AAAI Conference on Artificial Intelligence. 2018:32. |
[53] | XIAO G , LI J , CHEN Y ,et al. MalFCS:an effective malware classification framework with automated feature extraction based on deep convolutional neural networks[J]. Journal of Parallel and Distributed Computing, 2020,141: 49-58. |
[54] | YAN J , QI Y , RAO Q . Detecting malware with an ensemble method based on deep neural network[J]. Security and Communication Networks,2018, 2018. |
[55] | 乔延臣, 姜青山, 古亮 ,等. 基于汇编指令词向量与卷积神经网络的恶意代码分类方法研究[J]. 信息网络安全, 2019(4): 20-28. |
QIAO Y C , JIANG Q S , GU L ,et al. Research on malicious code classification method based on assembly instruction word vector and convolutional neural network[J]. Information Network Security, 2019(4): 20-28. | |
[56] | YAKURA H , SHINOZAKI S , NISHIMURA R ,et al. Neural malware analysis with attention mechanism[J]. Computers & Security, 2019,87:101592. |
[57] | ZHAO Y , XU C , BO B ,et al. Maldeep:a deep learning classification framework against malware variants based on texture visualization[J]. Security and Communication Networks, 2019. |
[58] | 任卓君, 陈光, 卢文科 . 恶意软件的操作码可视化方法研究[J]. 计算机工程与应用, 2021,57(18): 130-134. |
REN Z J , CHEN G , LU W K . Research on opcode visualization method for malware[J]. Computer Engineering and Applications, 2021,57(18): 130-134. | |
[59] | REN Z , BAI T . Malware visualization based on deep learning[C]// 2021 14th International Congress on Image and Signal Processing,BioMedical Engineering and Informatics (CISP-BMEI). 2021: 1-5. |
[60] | 王润正, 高见, 仝鑫 . 等融合注意力机制的恶意代码家族分类研究[J]. 计算机科学与探索, 2021,15(5): 881-892. |
WANG R Z , GAO J , TONG X ,et al. Research on malware family classification with attention mechanism fusion[J]. Journal of Frontiers of Computer Science and Technology, 2021,15(5): 881-892. | |
[61] | PINHERO A , ANUPAMA M L , VINOD P ,et al. Malware detection employed by visualization and deep neural network[J]. Computers& Security, 2021,105:102247. |
[62] | ANANDHI V , VINOD P , MENON V G . Malware visualization and detection using DenseNets[J]. Personal and Ubiquitous Computing, 2021: 1-17. |
[63] | HUANG X , MA L , YANG W ,et al. A method for windows malware detection based on deep learning[J]. Journal of Signal Processing Systems, 2021,93: 265-273. |
[64] | MOUSSAS V , ANDREATOS A . Malware detection based on code visualization and two-level classification[J]. Information, 2021,12(3): 118. |
[65] | DAREM A , ABAWAJY J , MAKKAR A ,et al. Visualization and deep-learning-based malware variant detection using OpCode-level features[J]. Future Generation Computer Systems, 2021,125: 314-323. |
[66] | CONTI M , KHANDHAR S , VINOD P . A few-shot malware classification approach for unknown family recognition using malware feature visualization[J]. Computers & Security, 2022,122:102887. |
[67] | FALANA O J , SODIYA A S , ONASHOGA S A ,et al. Mal-detect:an intelligent visualization approach for malware detection[J]. Journal of King Saud University-Computer and Information Sciences, 2022,34(5): 1968-1983. |
[68] | CHAGANTI R , RAVI V , PHAM T D . Image-based malware representation approach with efficient net convolutional neural networks for effective malware classification[J]. Journal of Information Security and Applications, 2022,69:103306. |
[69] | MALLIK A , KHETARPAL A , KUMAR S . ConRec:malware classification using convolutional recurrence[J]. Journal of Computer Virology and Hacking Techniques, 2022,18(4): 297-313. |
[70] | CHAUHAN D , SINGH H , HOODA H ,et al. Classification of malware using visualization techniques[C]// International Conference on Innovative Computing and Communications (ICICC 2022). 2022: 739-750. |
[71] | HAN K S , LIM J H , IM E G . Malware analysis method using visualization of binary files[M]. Proceedings of the 2013 Research in Adaptive and Convergent Systems. 2013: 317-321. |
[72] | HAN K S , LIM J H , KANG B ,et al. Malware analysis using visualized images and entropy graphs[J]. International Journal of Information Security, 2015,14(1): 1-14. |
[73] | PATURI A , CHERUKURI M , DONAHUE J ,et al. Mobile malware visual analytics and similarities of attack toolkits (malware gene analysis)[C]// 2013 International Conference on Collaboration Technologies and Systems (CTS). 2013: 149-154. |
[74] | 韩晓光 . 恶意代码检测关键技术研究[D]. 北京:北京科技大学, 2015. |
HAN X G . Research on key techniques for malicious code detection[D]. Beijing:University of Science and Technology Beijing, 2015. |
[1] | Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89. |
[2] | Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN. Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149. |
[3] | Rongna XIE, Zhuhong MA, Zongyu LI, Ye TIAN. Encrypted traffic classification method based on convolutional neural network [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 84-91. |
[4] | Dengyong ZHANG, Huang WEN, Feng LI, Peng CAO, Lingyun XIANG, Gaobo YANG, Xiangling DING. Image inpainting forensics method based on dual branch network [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 110-122. |
[5] | Jiaying LIN, Wenbo ZHOU, Weiming ZHANG, Nenghai YU. Lip forgery detection via spatial-frequency domain combination [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 146-155. |
[6] | Nan WEI, Lihua YIN, Hong NING, Binxing FANG. Preliminary study on the reform of machine learning teaching [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 182-189. |
[7] | Jinyin CHEN, Changan WU, Haibin ZHENG. Novel defense based on softmax activation transformation [J]. Chinese Journal of Network and Information Security, 2022, 8(2): 48-63. |
[8] | Baolin QIU, Ping YI. Adversarial examples defense method based on multi-dimensional feature maps knowledge distillation [J]. Chinese Journal of Network and Information Security, 2022, 8(2): 88-99. |
[9] | Cheng HUANG, Mingxu SUN, Renyu DUAN, Susheng WU, Bin CHEN. Vulnerability identification technology research based on project version difference [J]. Chinese Journal of Network and Information Security, 2022, 8(1): 52-62. |
[10] | Lijuan LI, Man LI, Hongjun BI, Huachun ZHOU. Multi-type low-rate DDoS attack detection method based on hybrid deep learning [J]. Chinese Journal of Network and Information Security, 2022, 8(1): 73-85. |
[11] | Zhongyuan QIN, Zhaoxiang HE, Tao LI, Liquan CHEN. Adversarial example defense algorithm for MNIST based on image reconstruction [J]. Chinese Journal of Network and Information Security, 2022, 8(1): 86-94. |
[12] | Deqing ZOU, Xiang LI, Minhuan HUANG, Xiang SONG, Hao LI, Weiming LI. Intelligent vulnerability detection system based on graph structured source code slice [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 113-122. |
[13] | Zhenglong WANG, Baowen ZHANG. Survey of generative adversarial network [J]. Chinese Journal of Network and Information Security, 2021, 7(4): 68-85. |
[14] | Binglong LI, Jinlong TONG, Yu ZHANG, Yifeng SUN, Qingxian WANG, Chaowen CHANG. Auto forensic detecting algorithms of malicious code fragment based on TensorFlow [J]. Chinese Journal of Network and Information Security, 2021, 7(4): 154-163. |
[15] | Qingyin TAN, Yingming ZENG, Ye HAN, Yijing LIU, Zheli LIU. Survey on backdoor attacks targeted on neural network [J]. Chinese Journal of Network and Information Security, 2021, 7(3): 46-58. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|