Malicious Code Classification Method Based on Deep Forest

被引:0
|
作者
Lu, Xi-Dong [1 ]
Duan, Zhe-Min [1 ]
Qian, Ye-Kui [2 ]
Zhou, Wei [1 ]
机构
[1] School of Electronics and Information, Northwestern Polytechnical University, Xi'an,710072, China
[2] Zhengzhou Campus, PLA Army Artillery Air Defense Academy, Zhengzhou,450052, China
来源
Ruan Jian Xue Bao/Journal of Software | 2020年 / 31卷 / 05期
关键词
D O I
10.13328/j.cnki.jos.005660
中图分类号
学科分类号
摘要
引用
收藏
页码:1454 / 1464
相关论文
共 50 条
  • [31] CNN- and GAN-based classification of malicious code families: A code visualization approach
    Wang, Ziyue
    Wang, Weizheng
    Yang, Yaoqi
    Han, Zhaoyang
    Xu, Dequan
    Su, Chunhua
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 12472 - 12489
  • [32] Tri-channel visualised malicious code classification based on improved ResNet
    Li, Sicong
    Wang, Jian
    Song, Yafei
    Wang, Shuo
    [J]. APPLIED INTELLIGENCE, 2024, 54 (23) : 12453 - 12475
  • [33] CodeBERT Based Code Classification Method
    Cheng, Siqiang
    Liu, Jianxun
    Peng, Zhenlian
    Cao, Ben
    [J]. Computer Engineering and Applications, 2023, 59 (24) : 277 - 288
  • [34] Method for Generating Malicious Code Adversarial Samples Based on Genetic Algorithm
    Yan Jia
    Nie Chujiang
    Su Purui
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (09) : 2126 - 2133
  • [35] Research of Malicious Code Attack Effect Based on Synthetic Entropy Method
    Li Peng
    Wang Ruchuan
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (03) : 449 - 454
  • [36] An Android Malicious Code Detection Method Based on Improved DCA Algorithm
    Wang, Chundong
    Li, Zhiyuan
    Gong, Liangyi
    Mo, Xiuliang
    Yang, Hong
    Zhao, Yi
    [J]. ENTROPY, 2017, 19 (02):
  • [37] Method for Generating Malicious Code Adversarial Samples Based on Genetic Algorithm
    Yan, Jia
    Yan, Jia
    Nie, Chujiang
    Su, Purui
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (09): : 2126 - 2133
  • [38] A Full-Lifecycle Malicious Code Detection Scheme Based on RASP and Random Forest
    Cheng, Jiameng
    Zhang, Chenhao
    Zhang, Hongwei
    Wang, Cong
    Wang, Jinsong
    [J]. ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT II, ICIC 2024, 2024, 14876 : 281 - 293
  • [39] Malicious Code Detection Based on Code Semantic Features
    Zhang, Yu
    Li, Binglong
    [J]. IEEE ACCESS, 2020, 8 : 176728 - 176737
  • [40] Deep Learning Based Detection Method for SDN Malicious Applications
    Chi Yaping
    Yu Yuzhou
    Yang Jianxi
    [J]. COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, CSPS 2018, VOL III: SYSTEMS, 2020, 517 : 96 - 104