| System Calls for Malware Detection and Classification: Methodologies and Applications | Jun 2, 2025 | Anomaly DetectionMalware Analysis | —Unverified | 0 |
| The Curious Case of Machine Learning In Malware Detection | May 18, 2019 | BIG-bench Machine LearningMalware Analysis | —Unverified | 0 |
| To believe or not to believe: Validating explanation fidelity for dynamic malware analysis | Apr 30, 2019 | ClassificationGeneral Classification | —Unverified | 0 |
| Toward Metric Indexes for Incremental Insertion and Querying | Jan 12, 2018 | Malware Analysis | —Unverified | 0 |
| Towards resilient machine learning for ransomware detection | Dec 21, 2018 | BIG-bench Machine LearningGenerative Adversarial Network | —Unverified | 0 |
| Unmasking the Shadows: Pinpoint the Implementations of Anti-Dynamic Analysis Techniques in Malware Using LLM | Nov 8, 2024 | Language ModelingLanguage Modelling | —Unverified | 0 |
| Reinforcement Learning for an Efficient and Effective Malware Investigation during Cyber Incident Response | Aug 4, 2024 | Decision MakingMalware Analysis | —Unverified | 0 |
| LAMD: Context-driven Android Malware Detection and Classification with LLMs | Feb 18, 2025 | Android Malware DetectionMalware Analysis | —Unverified | 0 |
| Large Language Model (LLM) for Software Security: Code Analysis, Malware Analysis, Reverse Engineering | Apr 7, 2025 | Language ModelingLanguage Modelling | —Unverified | 0 |
| Learning Malware Representation based on Execution Sequences | Dec 16, 2019 | Malware Analysis | —Unverified | 0 |
| Leveraging Artificial Intelligence on Binary Code Comprehension | Oct 11, 2022 | Compiler OptimizationMalware Analysis | —Unverified | 0 |
| Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection | Jul 1, 2020 | Malware AnalysisMalware Detection | —Unverified | 0 |
| MAIL: Malware Analysis Intermediate Language | Nov 6, 2022 | Malware Analysis | —Unverified | 0 |
| Malware analysis assisted by AI with R2AI | Apr 10, 2025 | Malware Analysis | —Unverified | 0 |
| Malware Analysis with Artificial Intelligence and a Particular Attention on Results Interpretability | Jul 23, 2021 | Malware AnalysisMalware Detection | —Unverified | 0 |
| Malware Analysis with Symbolic Execution and Graph Kernel | Apr 12, 2022 | BIG-bench Machine LearningMalware Analysis | —Unverified | 0 |
| Malware Detection using Artificial Bee Colony Algorithm | Dec 1, 2020 | feature selectionMalware Analysis | —Unverified | 0 |
| Malware Detection using Machine Learning and Deep Learning | Apr 4, 2019 | BIG-bench Machine LearningDeep Learning | —Unverified | 0 |
| ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation | Aug 30, 2021 | Malware AnalysisMalware Detection | —Unverified | 0 |
| NtMalDetect: A Machine Learning Approach to Malware Detection Using Native API System Calls | Feb 15, 2018 | BIG-bench Machine LearningDocument Classification | —Unverified | 0 |
| On Benchmarking Code LLMs for Android Malware Analysis | Apr 1, 2025 | BenchmarkingMalware Analysis | —Unverified | 0 |
| On the Effectiveness of Adversarial Samples against Ensemble Learning-based Windows PE Malware Detectors | Sep 25, 2023 | Ensemble LearningMalware Analysis | —Unverified | 0 |
| Integration of Static and Dynamic Analysis for Malware Family Classification with Composite Neural Network | Dec 24, 2019 | ClassificationGeneral Classification | CodeCode Available | 0 |
| Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis | Jan 27, 2020 | BIG-bench Machine LearningInterpretable Machine Learning | CodeCode Available | 0 |
| Evading Malware Classifiers via Monte Carlo Mutant Feature Discovery | Jun 15, 2021 | BIG-bench Machine LearningMalware Analysis | CodeCode Available | 0 |
| KiloGrams: Very Large N-Grams for Malware Classification | Aug 1, 2019 | ClassificationGeneral Classification | CodeCode Available | 0 |
| Know Your Neighborhood: General and Zero-Shot Capable Binary Function Search Powered by Call Graphlets | Jun 2, 2024 | Graph Neural NetworkGraph Representation Learning | CodeCode Available | 0 |
| Revisiting Deep Learning for Variable Type Recovery | Apr 7, 2023 | DecoderDeep Learning | CodeCode Available | 0 |
| Threat Behavior Textual Search by Attention Graph Isomorphism | Apr 16, 2024 | AttributeMalware Analysis | CodeCode Available | 0 |
| Large Language Models for Cyber Security: A Systematic Literature Review | May 8, 2024 | Explainable ModelsIntrusion Detection | CodeCode Available | 0 |
| Malware triage for early identification of Advanced Persistent Threat activities | Oct 16, 2018 | Malware Analysis | CodeCode Available | 0 |
| SAFE: Self-Attentive Function Embeddings for Binary Similarity | Nov 13, 2018 | Malware AnalysisVulnerability Detection | CodeCode Available | 0 |
| AndrODet: An Adaptive Android Obfuscation Detector | Jan 1, 2019 | Android Malware DetectionMalware Analysis | CodeCode Available | 0 |
| Dynamic Malware Analysis with Feature Engineering and Feature Learning | Jul 17, 2019 | Feature EngineeringMalware Analysis | CodeCode Available | 0 |
| A Cross-Architecture Instruction Embedding Model for Natural Language Processing-Inspired Binary Code Analysis | Dec 23, 2018 | Malware Analysis | CodeCode Available | 0 |
| SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning | Jul 9, 2021 | BIG-bench Machine LearningCode Reuse Detection | CodeCode Available | 0 |
| On Ensemble Learning | Mar 7, 2021 | BIG-bench Machine LearningEnsemble Learning | CodeCode Available | 0 |
| Reliable Malware Analysis and Detection using Topology Data Analysis | Nov 3, 2022 | Intrusion DetectionMalware Analysis | CodeCode Available | 0 |
| Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique | Oct 24, 2019 | Feature Engineeringfeature selection | CodeCode Available | 0 |