Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/16774
Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Sharmila, S. P. | en_US |
| dc.contributor.author | Gupta, Shubham | en_US |
| dc.contributor.author | Tiwari, Aruna | en_US |
| dc.contributor.author | Chaudhari, Narendra Shivaji | en_US |
| dc.date.accessioned | 2025-09-04T12:47:47Z | - |
| dc.date.available | 2025-09-04T12:47:47Z | - |
| dc.date.issued | 2025 | - |
| dc.identifier.citation | Sharmila, S. P., Gupta, S., Tiwari, A., & Chaudhari, N. S. (2025). Unveiling Evasive Portable Documents with Explainable Kolmogorov-Arnold Networks Resilient to Generative Adversarial Attacks. Applied Soft Computing, 182. Scopus. https://doi.org/10.1016/j.asoc.2025.113537 | en_US |
| dc.identifier.issn | 1568-4946 | - |
| dc.identifier.other | EID(2-s2.0-105010871219) | - |
| dc.identifier.uri | https://dx.doi.org/10.1016/j.asoc.2025.113537 | - |
| dc.identifier.uri | https://dspace.iiti.ac.in:8080/jspui/handle/123456789/16774 | - |
| dc.description.abstract | Portable Document Format (PDFs) files have become a serious threat to organizational security, as adversaries exploit their popularity and rich JavaScript environment to launch cyberattacks. Although Machine Learning (ML) methods have been developed for PDF malware detection, they remain vulnerable to adversarial attacks. To address this issue, we propose an efficient, explainable, and robust PDF malware detector that is resilient to generative adversarial attacks and effective against evasive malware using a 4-Layered 5-Fold Kolmogorov-Arnold Network (4L5FKAN). Our approach leverages Kolmogorov-Arnold Networks (KAN), a novel neural network architecture that has emerged as a strong alternative to traditional Multi-Layer Perceptron (MLP) models. To train our model, we constructed a comprehensive dataset by collecting over 100,000 raw PDFs from various sources, ensuring the inclusion of evasive malware samples through an extensive PDF mining process. The proposed 4L5FKAN model is designed to be exploit-agnostic to specific exploit patterns, making it resilient to Generative Adversarial Network (GAN) based attacks, enhancing interpretability using custom-built Local Interpretable Model-agnostic Explanations (LIME) and SHapley Additive exPlanations (SHAP). These explanation techniques provide privacy-preserved conservative explanations for model predictions, ensuring transparency. Our experimental results demonstrate that the proposed 4L5FKAN model achieves an outstanding detection accuracy of 98.7%–99.8% on unseen samples, outperforming existing state-of-the-art methods. Furthermore, it exhibits more than 25% reduction in false positives compared to conventional MLP-based approaches and shows a 30% increase in adversarial robustness against GAN-generated malware samples. These results highlight the effectiveness of our model in detecting evasive PDF malware while maintaining high interpretability and resilience to adversarial attacks. © 2025 Elsevier B.V., All rights reserved. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Elsevier Ltd | en_US |
| dc.source | Applied Soft Computing | en_US |
| dc.subject | Evasive Pdf | en_US |
| dc.subject | Explainable Ai | en_US |
| dc.subject | Gan | en_US |
| dc.subject | Lime | en_US |
| dc.subject | Malware Detection | en_US |
| dc.subject | Pdf Mining | en_US |
| dc.subject | Shap | en_US |
| dc.subject | Data Mining | en_US |
| dc.subject | Generative Adversarial Networks | en_US |
| dc.subject | Learning Systems | en_US |
| dc.subject | Malware | en_US |
| dc.subject | Network Layers | en_US |
| dc.subject | Network Security | en_US |
| dc.subject | Neural Networks | en_US |
| dc.subject | Privacy-preserving Techniques | en_US |
| dc.subject | Adversarial Networks | en_US |
| dc.subject | Evasive Portable Document Format | en_US |
| dc.subject | Explainable Ai | en_US |
| dc.subject | Local Interpretable Model-agnostic Explanation | en_US |
| dc.subject | Malware Detection | en_US |
| dc.subject | Portable Document Format Mining | en_US |
| dc.subject | Portable Document Formats | en_US |
| dc.subject | Shapley | en_US |
| dc.subject | Shapley Additive Explanation | en_US |
| dc.subject | Network Architecture | en_US |
| dc.title | Unveiling Evasive Portable Documents with Explainable Kolmogorov-Arnold Networks Resilient to Generative Adversarial Attacks | en_US |
| dc.type | Journal Article | en_US |
| Appears in Collections: | Department of Computer Science and Engineering | |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: