| Semantic-aware Binary Code Representation with BERT | Jun 10, 2021 | BIG-bench Machine LearningClone Detection | —Unverified | 0 | 0 |
| Semantic Preprocessing for LLM-based Malware Analysis | Jun 13, 2025 | Language ModelingLanguage Modelling | —Unverified | 0 | 0 |
| SeqNet: An Efficient Neural Network for Automatic Malware Detection | May 8, 2022 | Efficient Neural NetworkFeature Engineering | —Unverified | 0 | 0 |
| Smart OMVI: Obfuscated Malware Variant Identification using a novel dataset | Sep 24, 2023 | Malware Analysis | —Unverified | 0 | 0 |
| Survey of Malware Analysis through Control Flow Graph using Machine Learning | May 15, 2023 | Malware AnalysisMalware Detection | —Unverified | 0 | 0 |
| System Calls for Malware Detection and Classification: Methodologies and Applications | Jun 2, 2025 | Anomaly DetectionMalware Analysis | —Unverified | 0 | 0 |
| The Curious Case of Machine Learning In Malware Detection | May 18, 2019 | BIG-bench Machine LearningMalware Analysis | —Unverified | 0 | 0 |
| To believe or not to believe: Validating explanation fidelity for dynamic malware analysis | Apr 30, 2019 | ClassificationGeneral Classification | —Unverified | 0 | 0 |
| Toward Metric Indexes for Incremental Insertion and Querying | Jan 12, 2018 | Malware Analysis | —Unverified | 0 | 0 |
| Towards resilient machine learning for ransomware detection | Dec 21, 2018 | BIG-bench Machine LearningGenerative Adversarial Network | —Unverified | 0 | 0 |
| Unmasking the Shadows: Pinpoint the Implementations of Anti-Dynamic Analysis Techniques in Malware Using LLM | Nov 8, 2024 | Language ModelingLanguage Modelling | —Unverified | 0 | 0 |
| Reinforcement Learning for an Efficient and Effective Malware Investigation during Cyber Incident Response | Aug 4, 2024 | Decision MakingMalware Analysis | —Unverified | 0 | 0 |
| Unsupervised Features Extraction for Binary Similarity Using Graph Embedding Neural Networks | Oct 23, 2018 | Graph EmbeddingMalware Analysis | —Unverified | 0 | 0 |
| On the Robustness of Malware Detectors to Adversarial Samples | Aug 5, 2024 | image-classificationImage Classification | —Unverified | 0 | 0 |
| A Lean Transformer Model for Dynamic Malware Analysis and Detection | Aug 5, 2024 | Malware Analysis | —Unverified | 0 | 0 |
| A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classification | Mar 7, 2021 | ClassificationFeature Engineering | —Unverified | 0 | 0 |
| Adapting Novelty towards Generating Antigens for Antivirus systems | May 24, 2025 | Evolutionary AlgorithmsMalware Analysis | —Unverified | 0 | 0 |
| An Efficient Multi-Step Framework for Malware Packing Identification | Aug 17, 2022 | feature selectionMalware Analysis | —Unverified | 0 | 0 |
| A New Deep Boosted CNN and Ensemble Learning based IoT Malware Detection | Dec 15, 2022 | Ensemble LearningMalware Analysis | —Unverified | 0 | 0 |
| apk2vec: Semi-supervised multi-view representation learning for profiling Android applications | Sep 15, 2018 | Clone DetectionClustering | —Unverified | 0 | 0 |
| A Review on the effectiveness of Dimensional Reduction with Computational Forensics: An Application on Malware Analysis | Jan 15, 2023 | Malware Analysis | —Unverified | 0 | 0 |
| Artificial Intelligence Based Malware Analysis | Apr 27, 2017 | Malware Analysis | —Unverified | 0 | 0 |
| Auxiliary-Classifier GAN for Malware Analysis | Jul 4, 2021 | Malware Analysis | —Unverified | 0 | 0 |
| Boosting Neural Networks to Decompile Optimized Binaries | Jan 3, 2023 | Graph Neural NetworkMachine Translation | —Unverified | 0 | 0 |
| Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge Mechanism | Nov 22, 2022 | CPUMalware Analysis | —Unverified | 0 | 0 |
| Data Augmentation for Opcode Sequence Based Malware Detection | Jun 22, 2021 | Android Malware DetectionData Augmentation | —Unverified | 0 | 0 |
| Deep Image: A precious image based deep learning method for online malware detection in IoT Environment | Apr 4, 2022 | Malware AnalysisMalware Detection | —Unverified | 0 | 0 |
| Deep Learning Based XIoT Malware Analysis: A Comprehensive Survey, Taxonomy, and Research Challenges | Oct 14, 2024 | Deep LearningMalware Analysis | —Unverified | 0 | 0 |
| Deep learning guided Android malware and anomaly detection | Oct 23, 2019 | Anomaly DetectionCPU | —Unverified | 0 | 0 |
| Devising Malware Characterstics using Transformers | May 23, 2020 | Malware Analysis | —Unverified | 0 | 0 |
| DIRECT : A Transformer-based Model for Decompiled Identifier Renaming | Aug 1, 2021 | Malware Analysis | —Unverified | 0 | 0 |
| Domain-Specific Retrieval-Augmented Generation Using Vector Stores, Knowledge Graphs, and Tensor Factorization | Oct 3, 2024 | Anomaly DetectionAttribute | —Unverified | 0 | 0 |
| Dual Explanations via Subgraph Matching for Malware Detection | Apr 29, 2025 | Malware AnalysisMalware Detection | —Unverified | 0 | 0 |
| Efficient Malware Analysis Using Metric Embeddings | Dec 5, 2022 | AttributeMalware Analysis | —Unverified | 0 | 0 |
| Explainable Artificial Intelligence (XAI) for Malware Analysis: A Survey of Techniques, Applications, and Open Challenges | Sep 9, 2024 | Explainable artificial intelligenceExplainable Artificial Intelligence (XAI) | —Unverified | 0 | 0 |
| Exploring Large Language Models for Semantic Analysis and Categorization of Android Malware | Jan 8, 2025 | Malware AnalysisPrompt Engineering | —Unverified | 0 | 0 |
| Exploring the Efficacy of Large Language Models (GPT-4) in Binary Reverse Engineering | Jun 9, 2024 | Malware Analysis | —Unverified | 0 | 0 |
| FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware | Sep 17, 2018 | Attributefeature selection | —Unverified | 0 | 0 |
| Fuzzy Hashing as Perturbation-Consistent Adversarial Kernel Embedding | Dec 17, 2018 | Malware Analysis | —Unverified | 0 | 0 |