Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
Design of an integrated evidence-driven few-shot meta-learning for zero-day malware detection and forensic attributions
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 28 April 2026

Design of an integrated evidence-driven few-shot meta-learning for zero-day malware detection and forensic attributions

  • Rijvan Beg1,
  • Nikhil Nigam1,
  • Yogesh Kumar Sharma3,
  • Amit Patel3,
  • Surendra Solanki2,
  • Sukhwinder Sharma4 &
  • …
  • Lalit Kumar2 

Scientific Reports (2026) Cite this article

  • 749 Accesses

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Mathematics and computing
  • Psychology

Abstract

Zero-day malware still slips past the best detection systems because most models need thousands of labeled examples before they learn anything useful. That dependency is exactly the weak point: by the time enough samples accumulate, the damage is already spreading. Traditional few-shot approaches promise quicker adaptation, yet they often reduce rich forensic evidence into flat feature vectors and end up overfitting to byte-level quirks rather than behavioral signals. This work takes a different path and develops a systematic pipeline that treats malware traces as structured evidence, feeding them through a sequence of five meta-learning extensions designed to survive the scarcity of zero-day samples. We begin with EpiForge, which fabricates realistic few-shot episodes from evidence-graphs and injects controlled novelties without breaking causal consistency, ensuring the training tasks resemble true zero-day strangeness. These episodes drive BayesMAML-E, a hierarchical Bayesian meta-learner that encodes evidence-type priors, producing task-conditioned initializations and calibrated uncertainty estimates. The output then flows into CoShaRE, which sparsifies decisions by learning counterfactual Shapley-regularized masks retaining only causally sufficient evidence and generating counter-examples that test decision stability. From there, OptiQuill decides how to spend scarce resources, balancing sandbox runs and labeling efforts using a budget-aware Lagrangian bandit that targets maximum downstream meta-learning gains. Finally, CausalFADE distills the learned behavior into compact automata and executable rules, turning black-box predictions into forensic signatures that analysts can trust and re-use for the process. Across all five stages, we see evidence of measurable impact: 5-shot accuracy improves by more than 10% points over standard MAML, calibration error falls to near 2%, and label and compute budgets are cut substantially. The result is not just faster adaptation but also auditable, causally grounded signatures that close the loop between evidence collection, learning, and deployment. This work appears to offer a path toward zero-day detection that is both technically feasible and operationally sustainable in process.

Similar content being viewed by others

Uncertainty-aware molecular dynamics from Bayesian active learning for phase transformations and thermal transport in SiC

Article Open access 06 March 2023

A hierarchical deep learning framework with doubly regularized loss for robust malware detection and family categorization

Article Open access 05 January 2026

A dynamic evaluation method for ethical awareness in metaverse-based educational environments using hybrid Bayesian sequential models

Article Open access 29 April 2026

Abbreviations

AI:

Artificial intelligence

APT:

Advanced persistent threat

API:

Application programming interface

AHEDNet:

Adaptive hybrid exploit detection network

AWPA:

Adaptive WavePCA-autoencoder

CNN:

Convolutional neural network

CoShaRE:

Counterfactual Shapley-regularized evidence selector

DNN:

Deep neural network

DSL:

Domain specific language

DEFENDIFY:

Defense amplified with transfer learning for obfuscated malware

ECE:

Expected calibration error

EMBER:

Endgame malware benchmark for research

EML-AMD:

Explainable machine learning for adaptive android malware detection

EpiForge:

Evidence-graph episodic forger with novelty injection

FPR:

False positive rate

FEdroid:

Federated android malware detection

GAN:

Generative adversarial network

GIN:

Graph isomorphism network

GNN:

Graph neural network

GRU:

Gated recurrent unit

IoT:

Internet of things

MADESANT:

Malware detection and severity analysis in industrial environments

MAML:

Model-agnostic meta-learning

BayesMAML-E:

Hierarchical Bayesian MAML with evidence-type priors

ML:

Machine learning

NLP:

Natural language processing

PE:

Portable executable

PRAU-GIN:

GIN-based malware classifier with traffic refinement and node augmentation

RNN:

Recurrent neural network

SDN:

Software-defined networking

SVM:

Support vector machine

ViT:

Vision transformer

ViTGuard:

Vision transformer and genetic algorithm optimized detection

VAE:

Variational autoencoder

ZeSAI:

Zero-shot AI vigilant malware detection

AUROC:

Area under receiver operating characteristic curve

OptiQuill:

Budget-aware active quarantine with evidence-utility Lagrangian

CausalFADE:

Causal forensic automata with differentiable explanations

XAI:

Explainable Artificial Intelligence

Funding

Open access funding provided by Manipal University Jaipur.

Author information

Authors and Affiliations

  1. School of Engineering and Applied Sciences, Department of Computer Science and Engineering, SRM University - AP, Amaravati, Andhra Pradesh, India, 522240

    Rijvan Beg & Nikhil Nigam

  2. Department of Artificial Intelligence and Machine Learning, Manipal University Jaipur, Jaipur, 303007, Rajasthan, India

    Surendra Solanki & Lalit Kumar

  3. Department of Computer Science and Information Technology, Sagar Institute of Science and Technology, Bhopal, 462036, Madhya Pradesh, India

    Yogesh Kumar Sharma & Amit Patel

  4. Department of Data Science and Engineering, Manipal University Jaipur, Jaipur, 303007, Rajasthan, India

    Sukhwinder Sharma

Authors
  1. Rijvan Beg
    View author publications

    Search author on:PubMed Google Scholar

  2. Nikhil Nigam
    View author publications

    Search author on:PubMed Google Scholar

  3. Yogesh Kumar Sharma
    View author publications

    Search author on:PubMed Google Scholar

  4. Amit Patel
    View author publications

    Search author on:PubMed Google Scholar

  5. Surendra Solanki
    View author publications

    Search author on:PubMed Google Scholar

  6. Sukhwinder Sharma
    View author publications

    Search author on:PubMed Google Scholar

  7. Lalit Kumar
    View author publications

    Search author on:PubMed Google Scholar

Corresponding authors

Correspondence to Surendra Solanki or Lalit Kumar.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Beg, R., Nigam, N., Sharma, Y.K. et al. Design of an integrated evidence-driven few-shot meta-learning for zero-day malware detection and forensic attributions. Sci Rep (2026). https://doi.org/10.1038/s41598-026-43745-9

Download citation

  • Received: 16 December 2025

  • Accepted: 06 March 2026

  • Published: 28 April 2026

  • DOI: https://doi.org/10.1038/s41598-026-43745-9

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Zero-day malware
  • Few-shot meta-learning
  • Evidence-graphs
  • Bayesian meta-learning
  • Causal attribution
  • Scenarios
Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com footer links

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics