| Magika: AI-Powered Content-Type Detection | Sep 18, 2024 | CPUMalware Analysis | CodeCode Available | 11 |
| EMBER2024 -- A Benchmark Dataset for Holistic Evaluation of Malware Classifiers | Jun 5, 2025 | Malware AnalysisMalware Classification | CodeCode Available | 2 |
| Avast-CTU Public CAPE Dataset | Sep 6, 2022 | Malware AnalysisMalware Detection | CodeCode Available | 1 |
| CyberLLMInstruct: A New Dataset for Analysing Safety of Fine-Tuned LLMs Using Cyber Security Data | Mar 12, 2025 | Adversarial AttackMalware Analysis | CodeCode Available | 1 |
| Is Function Similarity Over-Engineered? Building a Benchmark | Oct 30, 2024 | Malware AnalysisVulnerability Detection | CodeCode Available | 1 |
| Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model | Dec 14, 2020 | Deep LearningFeature Engineering | CodeCode Available | 1 |
| Quo Vadis: Hybrid Machine Learning Meta-Model based on Contextual and Behavioral Malware Representations | Aug 20, 2022 | Hybrid Machine LearningMalware Analysis | CodeCode Available | 1 |
| Nebula: Self-Attention for Dynamic Malware Analysis | Sep 19, 2023 | Malware AnalysisMalware Classification | CodeCode Available | 1 |
| DecompileBench: A Comprehensive Benchmark for Evaluating Decompilers in Real-World Scenarios | May 16, 2025 | Malware Analysis | CodeCode Available | 1 |
| FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis | Aug 10, 2023 | Malware AnalysisMulti-Task Learning | CodeCode Available | 1 |
| A Lean Transformer Model for Dynamic Malware Analysis and Detection | Aug 5, 2024 | Malware Analysis | —Unverified | 0 |
| Auxiliary-Classifier GAN for Malware Analysis | Jul 4, 2021 | Malware Analysis | —Unverified | 0 |
| Artificial Intelligence Based Malware Analysis | Apr 27, 2017 | Malware Analysis | —Unverified | 0 |
| Adapting Novelty towards Generating Antigens for Antivirus systems | May 24, 2025 | Evolutionary AlgorithmsMalware Analysis | —Unverified | 0 |
| Domain-Specific Retrieval-Augmented Generation Using Vector Stores, Knowledge Graphs, and Tensor Factorization | Oct 3, 2024 | Anomaly DetectionAttribute | —Unverified | 0 |
| A Review on the effectiveness of Dimensional Reduction with Computational Forensics: An Application on Malware Analysis | Jan 15, 2023 | Malware Analysis | —Unverified | 0 |
| apk2vec: Semi-supervised multi-view representation learning for profiling Android applications | Sep 15, 2018 | Clone DetectionClustering | —Unverified | 0 |
| On the Robustness of Malware Detectors to Adversarial Samples | Aug 5, 2024 | image-classificationImage Classification | —Unverified | 0 |
| Data Augmentation for Opcode Sequence Based Malware Detection | Jun 22, 2021 | Android Malware DetectionData Augmentation | —Unverified | 0 |
| Deep Image: A precious image based deep learning method for online malware detection in IoT Environment | Apr 4, 2022 | Malware AnalysisMalware Detection | —Unverified | 0 |
| Deep Learning Based XIoT Malware Analysis: A Comprehensive Survey, Taxonomy, and Research Challenges | Oct 14, 2024 | Deep LearningMalware Analysis | —Unverified | 0 |
| Deep learning guided Android malware and anomaly detection | Oct 23, 2019 | Anomaly DetectionCPU | —Unverified | 0 |
| Devising Malware Characterstics using Transformers | May 23, 2020 | Malware Analysis | —Unverified | 0 |
| DIRECT : A Transformer-based Model for Decompiled Identifier Renaming | Aug 1, 2021 | Malware Analysis | —Unverified | 0 |
| A New Deep Boosted CNN and Ensemble Learning based IoT Malware Detection | Dec 15, 2022 | Ensemble LearningMalware Analysis | —Unverified | 0 |