SOTAVerified

Computer Security

Papers

Showing 5166 of 66 papers

TitleStatusHype
Poisoning Behavioral Malware Clustering0
Robust Neural Malware Detection Models for Emulation Sequence LearningCode0
Non-deterministic Behavior of Ranking-based Metrics when Evaluating Embeddings0
Detecting Denial-of-Service Attacks from Social Media Text: Applying NLP to Computer Security0
Generative Models for Spear Phishing Posts on Social Media0
Reservoir of Diverse Adaptive Learners and Stacking Fast Hoeffding Drift Detection Methods for Evolving Data StreamsCode0
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity DetectionCode0
A Survey on Resilient Machine Learning0
Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks0
LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems0
Self-Organising Maps in Computer Security0
Novel Feature Extraction, Selection and Fusion for Effective Malware Family ClassificationCode0
Randomized LU decomposition: An Algorithm for Dictionaries Construction0
Topic Modeling of Hierarchical Corpora0
Stratified Graphical Models - Context-Specific Independence in Graphical Models0
Immune System Approaches to Intrusion Detection - A Review (ICARIS)0
Show:102550
← PrevPage 3 of 3Next →

No leaderboard results yet.