JOURNAL ARTICLE

Malicious Code Detection under 5G HetNets Based on a Multi-Objective RBM Model

Zhihua CuiYaru ZhaoYang CaoXingjuan CaiWensheng ZhangJinjun Chen

Year: 2021 Journal:   IEEE Network Vol: 35 (2)Pages: 82-87   Publisher: Institute of Electrical and Electronics Engineers

Abstract

The fifth generation (5G) mobile communication technology brings people a higher perceived rate experience, the high-quality service of high-density user connection, and other commercial applications. As an important means of data processing in 5G heterogeneous networks (HetNets), data fusion technology is faced with a large number of malicious code attacks. Thus, it is particularly important to find an efficient malicious code detection method. However, in the traditional research, due to dataset imbalance, the complexity of the deep learning network model, the use of a single-objective algorithm, and other factors, it brings greater loss and lower detection accuracy. Therefore, how to choose a suitable network model and improve the data classification accuracy in HetNets is a big challenge. To enhance the model's robustness, a multi-objective restricted Boltzmann machine (RBM) model is designed for training. In this article, evaluation indices are used to comprehensively measure the effect of data classification, introducing a strategy pool to improve the effect of data fusion and using non-dominated sorting genetic algorithms (NSGA-II) to deal with the imbalanced malware family. Experimental results demonstrate that the proposed multi-objective RBM model combined with NSGA-II can effectively enhance the data classification accuracy of HetNets and reduce the loss in the process of data fusion.

Keywords:
Computer science Heterogeneous network Data mining Robustness (evolution) Restricted Boltzmann machine Cellular network Machine learning Artificial intelligence Data modeling Deep learning Computer network Database Wireless network Wireless

Metrics

130
Cited By
18.14
FWCI (Field Weighted Citation Impact)
16
Refs
1.00
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Plant Virus Research Studies
Life Sciences →  Agricultural and Biological Sciences →  Plant Science
Physical Unclonable Functions (PUFs) and Hardware Security
Physical Sciences →  Computer Science →  Hardware and Architecture

Related Documents

JOURNAL ARTICLE

Malicious code detection based on many‐objective transfer model

Binquan ZhangDi WuZhuoxuan LanZhihua CuiLiping Xie

Journal:   Concurrency and Computation Practice and Experience Year: 2023 Vol: 35 (22)
JOURNAL ARTICLE

Malicious code detection based on CNNs and multi-objective algorithm

Zhihua CuiLei DuPenghong WangXingjuan CaiWensheng Zhang

Journal:   Journal of Parallel and Distributed Computing Year: 2019 Vol: 129 Pages: 50-58
BOOK-CHAPTER

A Transformer-Based Malicious Code Detection Model

Yuerong LiYuntao Zhao

Lecture notes in electrical engineering Year: 2025 Pages: 105-112
BOOK-CHAPTER

Immunity-Based Model for Malicious Code Detection

Yu ZhangLihua WuFeng XiaXiaowen Liu

Lecture notes in computer science Year: 2010 Pages: 399-406
BOOK-CHAPTER

Malicious Code Detection Based on Generative Adversarial Model

Jin ZhangJia YangWeiqi Zhou

Lecture notes in computer science Year: 2025 Pages: 167-183
© 2026 ScienceGate Book Chapters — All rights reserved.