JOURNAL ARTICLE

Malicious code detection based on many‐objective transfer model

Binquan ZhangDi WuZhuoxuan LanZhihua CuiLiping Xie

Year: 2023 Journal:   Concurrency and Computation Practice and Experience Vol: 35 (22)   Publisher: Wiley

Abstract

Summary With the rapid growth of malicious codes, personal privacy, and Internet security are seriously threatened. Existing transfer learning‐based malicious code detection improves detection accuracy by transferring pre‐trained neural networks. However, it cannot efficiently tune the structure and parameters of the neural networks. Here, we first propose a novel many‐objective transfer model. It mainly focuses on the detection accuracy and the total number of parameters of the neural network model. The optimal structure and parameters are captured from the pre‐trained neural network by many‐objective optimization algorithm. Second, the partitioned crossover‐mutation vector angle‐based evolutionary algorithm for unconstrained many‐objective optimization is proposed to solve the model. The algorithm performs crossover mutation operations in different ways on different regions of the candidate solution to improve population diversity. The simulation results show that the model can reduce the pre‐trained neural network structure by 49% while maintaining the accuracy in malicious code detection.

Keywords:
Crossover Computer science Artificial neural network Code (set theory) Mutation Artificial intelligence Machine learning Transfer of learning Population Data mining Transfer (computing)

Metrics

1
Cited By
0.27
FWCI (Field Weighted Citation Impact)
52
Refs
0.40
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Machine Learning and Data Classification
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

BOOK-CHAPTER

A Transformer-Based Malicious Code Detection Model

Yuerong LiYuntao Zhao

Lecture notes in electrical engineering Year: 2025 Pages: 105-112
BOOK-CHAPTER

Immunity-Based Model for Malicious Code Detection

Yu ZhangLihua WuFeng XiaXiaowen Liu

Lecture notes in computer science Year: 2010 Pages: 399-406
JOURNAL ARTICLE

Malicious code detection based on CNNs and multi-objective algorithm

Zhihua CuiLei DuPenghong WangXingjuan CaiWensheng Zhang

Journal:   Journal of Parallel and Distributed Computing Year: 2019 Vol: 129 Pages: 50-58
BOOK-CHAPTER

Malicious Code Detection Based on Generative Adversarial Model

Jin ZhangJia YangWeiqi Zhou

Lecture notes in computer science Year: 2025 Pages: 167-183
© 2026 ScienceGate Book Chapters — All rights reserved.