| Revisiting Static Feature-Based Android Malware Detection | Sep 11, 2024 | Android Malware DetectionComputer Security | —Unverified | 0 |
| Explainable Artificial Intelligence (XAI) for Malware Analysis: A Survey of Techniques, Applications, and Open Challenges | Sep 9, 2024 | Explainable artificial intelligenceExplainable Artificial Intelligence (XAI) | —Unverified | 0 |
| A Lean Transformer Model for Dynamic Malware Analysis and Detection | Aug 5, 2024 | Malware Analysis | —Unverified | 0 |
| On the Robustness of Malware Detectors to Adversarial Samples | Aug 5, 2024 | image-classificationImage Classification | —Unverified | 0 |
| Reinforcement Learning for an Efficient and Effective Malware Investigation during Cyber Incident Response | Aug 4, 2024 | Decision MakingMalware Analysis | —Unverified | 0 |
| Exploring the Efficacy of Large Language Models (GPT-4) in Binary Reverse Engineering | Jun 9, 2024 | Malware Analysis | —Unverified | 0 |
| Know Your Neighborhood: General and Zero-Shot Capable Binary Function Search Powered by Call Graphlets | Jun 2, 2024 | Graph Neural NetworkGraph Representation Learning | CodeCode Available | 0 |
| Large Language Models for Cyber Security: A Systematic Literature Review | May 8, 2024 | Explainable ModelsIntrusion Detection | CodeCode Available | 0 |
| Threat Behavior Textual Search by Attention Graph Isomorphism | Apr 16, 2024 | AttributeMalware Analysis | CodeCode Available | 0 |
| On the Effectiveness of Adversarial Samples against Ensemble Learning-based Windows PE Malware Detectors | Sep 25, 2023 | Ensemble LearningMalware Analysis | —Unverified | 0 |
| Smart OMVI: Obfuscated Malware Variant Identification using a novel dataset | Sep 24, 2023 | Malware Analysis | —Unverified | 0 |
| Survey of Malware Analysis through Control Flow Graph using Machine Learning | May 15, 2023 | Malware AnalysisMalware Detection | —Unverified | 0 |
| Revisiting Deep Learning for Variable Type Recovery | Apr 7, 2023 | DecoderDeep Learning | CodeCode Available | 0 |
| A Review on the effectiveness of Dimensional Reduction with Computational Forensics: An Application on Malware Analysis | Jan 15, 2023 | Malware Analysis | —Unverified | 0 |
| Boosting Neural Networks to Decompile Optimized Binaries | Jan 3, 2023 | Graph Neural NetworkMachine Translation | —Unverified | 0 |
| A New Deep Boosted CNN and Ensemble Learning based IoT Malware Detection | Dec 15, 2022 | Ensemble LearningMalware Analysis | —Unverified | 0 |
| From Malware Samples to Fractal Images: A New Paradigm for Classification. (Version 2.0, Previous version paper name: Have you ever seen malware?) | Dec 5, 2022 | ClassificationMalware Analysis | —Unverified | 0 |
| Efficient Malware Analysis Using Metric Embeddings | Dec 5, 2022 | AttributeMalware Analysis | —Unverified | 0 |
| Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge Mechanism | Nov 22, 2022 | CPUMalware Analysis | —Unverified | 0 |
| MAIL: Malware Analysis Intermediate Language | Nov 6, 2022 | Malware Analysis | —Unverified | 0 |
| Reliable Malware Analysis and Detection using Topology Data Analysis | Nov 3, 2022 | Intrusion DetectionMalware Analysis | CodeCode Available | 0 |
| Leveraging Artificial Intelligence on Binary Code Comprehension | Oct 11, 2022 | Compiler OptimizationMalware Analysis | —Unverified | 0 |
| An Efficient Multi-Step Framework for Malware Packing Identification | Aug 17, 2022 | feature selectionMalware Analysis | —Unverified | 0 |
| SeqNet: An Efficient Neural Network for Automatic Malware Detection | May 8, 2022 | Efficient Neural NetworkFeature Engineering | —Unverified | 0 |
| Malware Analysis with Symbolic Execution and Graph Kernel | Apr 12, 2022 | BIG-bench Machine LearningMalware Analysis | —Unverified | 0 |