| Poisoning Behavioral Malware Clustering | Nov 25, 2018 | ClusteringComputer Security | —Unverified | 0 |
| Robust Neural Malware Detection Models for Emulation Sequence Learning | Jun 28, 2018 | Computer SecurityMalware Classification | CodeCode Available | 0 |
| Non-deterministic Behavior of Ranking-based Metrics when Evaluating Embeddings | Jun 19, 2018 | Computer Security | —Unverified | 0 |
| Detecting Denial-of-Service Attacks from Social Media Text: Applying NLP to Computer Security | Jun 1, 2018 | Computer Security | —Unverified | 0 |
| Generative Models for Spear Phishing Posts on Social Media | Feb 14, 2018 | ClusteringComputer Security | —Unverified | 0 |
| Reservoir of Diverse Adaptive Learners and Stacking Fast Hoeffding Drift Detection Methods for Evolving Data Streams | Sep 7, 2017 | Computer SecurityDrift Detection | CodeCode Available | 0 |
| Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection | Aug 22, 2017 | Computer SecurityGraph Embedding | CodeCode Available | 0 |
| A Survey on Resilient Machine Learning | Jul 11, 2017 | BIG-bench Machine LearningBlocking | —Unverified | 0 |
| Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks | Apr 6, 2017 | Computer Security | —Unverified | 0 |
| LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems | Nov 6, 2016 | Computer SecurityIntrusion Detection | —Unverified | 0 |