{"title":"ConvNeXt_GHSA: Integrating hybrid gated attention for malware image classification","authors":"Junhai Li , Yu Zhang , Yuanquan Shi , Yujun Yang","doi":"10.1016/j.jisa.2025.104259","DOIUrl":null,"url":null,"abstract":"<div><div>Malware classification based on image representation has emerged as an effective approach to enhancing security systems against evolving threats. However, challenges such as suboptimal feature extraction, insufficient adaptive attention fusion, and class imbalance remain unresolved. To address these issues, this paper proposes a deep learning-based classification framework named ConvNeXt_GHSA. The model is built upon a pretrained ConvNeXt backbone and incorporates a novel Gated Hybrid Self-Attention (GHSA) mechanism, which integrates channel, local, and global attention branches to capture multi-scale, discriminative features. At gating strategy is employed to adaptively fuse information from the three branches according to their contextual relevance. Additionally, Focal Loss and label smoothing are adopted during training to alleviate the impact of class imbalance and enhance minority class recognition. Experimental evaluations on three public malware image datasets—Malimg, MaleVis, and Dumpware10—demonstrate that ConvNeXt_GHSA achieves classification accuracies of 99.79%, 99.23%, and 99.78%, respectively. These results confirm the proposed model's robustness, effectiveness, and generalization ability in malware image classification tasks.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104259"},"PeriodicalIF":3.7000,"publicationDate":"2025-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625002960","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Malware classification based on image representation has emerged as an effective approach to enhancing security systems against evolving threats. However, challenges such as suboptimal feature extraction, insufficient adaptive attention fusion, and class imbalance remain unresolved. To address these issues, this paper proposes a deep learning-based classification framework named ConvNeXt_GHSA. The model is built upon a pretrained ConvNeXt backbone and incorporates a novel Gated Hybrid Self-Attention (GHSA) mechanism, which integrates channel, local, and global attention branches to capture multi-scale, discriminative features. At gating strategy is employed to adaptively fuse information from the three branches according to their contextual relevance. Additionally, Focal Loss and label smoothing are adopted during training to alleviate the impact of class imbalance and enhance minority class recognition. Experimental evaluations on three public malware image datasets—Malimg, MaleVis, and Dumpware10—demonstrate that ConvNeXt_GHSA achieves classification accuracies of 99.79%, 99.23%, and 99.78%, respectively. These results confirm the proposed model's robustness, effectiveness, and generalization ability in malware image classification tasks.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.