[1]Cho I K, Kim T G, Shim Y J, et al. Malware similarity analysis using API sequence alignments[J]. Journal of Internet Services and Information Security, 2014, 4(4): 103114[2]陈琪, 蒋国平, 夏玲玲. 基于静态结构的恶意代码同源性分析[J]. 计算机工程与应用, 2017, 53(14): 9398[3]钱雨村, 彭国军, 王滢, 等. 恶意代码同源性分析及家族聚类[J]. 计算机工程与应用, 2015, 51(18): 7681[4]Giannella C, Bloedorn E. Spectral malware behavior clustering[C] Proc of IEEE Int Conf on Intelligence and Security Informatics (ISI). Piscataway, NJ: IEEE, 2015: 712[5]刘凯, 方勇, 张磊, 等. 基于图卷积网络的恶意代码聚类[J]. 四川大学学报: 自然科学版, 2019, 56(4): 654660[6]Xue D, Li J, Wu W, et al. Homology analysis of malware based on ensemble learning and multifeatures[J]. PloS One, 2019, 14(8): e0211373[7]乔延臣, 姜青山, 古亮, 等. 基于汇编指令词向量与卷积神经网络的恶意代码分类方法研究[J]. 信息网络安全, 2019 (4): 2028[8]Zhu X, Huang J, Wang B, et al. Malware homology determination using visualized images and feature fusion[J]. PeerJ Computer Science, 2021, 7: e494[9]Jia J. Deep learning and open set malware classification: A survey[J]. arXiv preprint, arXiv:2004.04272, 2020[10]陈雁佳. 恶意软件组织的开集识别模型研究[D]. 广州: 暨南大学, 2020[11]Le Q, Mikolov T. Distributed representations of sentences and documents[C] Proc of the 31st Int Conf on Machine Learning. New York: ACM, 2014: 11881196[12]Howard A G, Zhu M, Chen B, et al. Mobilenets: Efficient convolutional neural networks for mobile vision applications[J]. arXiv preprint, arXiv:1704.04861, 2017[13]Liu Z, Miao Z, Zhan X, et al. Largescale longtailed recognition in an open world[C] Proc of the IEEECVF Conf on Computer Vision and Pattern Recognition. Piscataway, NJ: IEEE, 2019: 25372546[14]Mikolov T, Chen K, Corrado G, et al. Efficient estimation of word representations in vector space[J]. arXiv preprint, arXiv:1301.3781, 2013[15]Tran T K, Sato H. NLPbased approaches for malware classification from API sequences[C] Proc of the 21st Asia Pacific Symp on Intelligent and Evolutionary Systems (IES). Piscataway, NJ: IEEE, 2017: 101105[16]张景莲, 彭艳兵. 基于特征融合的恶意代码分类研究[J]. 计算机工程, 2019, 45(8): 281286, 295[17]Chu Q, Liu G, Zhu X. Visualization feature and CNN based homology classification of malicious code[J]. Chinese Journal of Electronics, 2020, 29(1): 154160[18]刘亮, 刘露平, 何帅, 等. 一种基于多特征的恶意代码家族静态标注方法[J]. 信息安全研究, 2018, 4(4): 322328[19]Microsoft. Microsoft malware classification challenge[EBOL]. [20180310]. https:www.kaggle.comcmalwareclassification |