SOTAVerified

Malware Analysis

Papers

Showing 5189 of 89 papers

TitleStatusHype
Semantic-aware Binary Code Representation with BERT0
Semantic Preprocessing for LLM-based Malware Analysis0
SeqNet: An Efficient Neural Network for Automatic Malware Detection0
Smart OMVI: Obfuscated Malware Variant Identification using a novel dataset0
Survey of Malware Analysis through Control Flow Graph using Machine Learning0
System Calls for Malware Detection and Classification: Methodologies and Applications0
The Curious Case of Machine Learning In Malware Detection0
To believe or not to believe: Validating explanation fidelity for dynamic malware analysis0
Toward Metric Indexes for Incremental Insertion and Querying0
Towards resilient machine learning for ransomware detection0
Unmasking the Shadows: Pinpoint the Implementations of Anti-Dynamic Analysis Techniques in Malware Using LLM0
Reinforcement Learning for an Efficient and Effective Malware Investigation during Cyber Incident Response0
Unsupervised Features Extraction for Binary Similarity Using Graph Embedding Neural Networks0
On the Robustness of Malware Detectors to Adversarial Samples0
A Lean Transformer Model for Dynamic Malware Analysis and Detection0
A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classification0
Adapting Novelty towards Generating Antigens for Antivirus systems0
An Efficient Multi-Step Framework for Malware Packing Identification0
A New Deep Boosted CNN and Ensemble Learning based IoT Malware Detection0
apk2vec: Semi-supervised multi-view representation learning for profiling Android applications0
A Review on the effectiveness of Dimensional Reduction with Computational Forensics: An Application on Malware Analysis0
Artificial Intelligence Based Malware Analysis0
Auxiliary-Classifier GAN for Malware Analysis0
Boosting Neural Networks to Decompile Optimized Binaries0
Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge Mechanism0
Data Augmentation for Opcode Sequence Based Malware Detection0
Deep Image: A precious image based deep learning method for online malware detection in IoT Environment0
Deep Learning Based XIoT Malware Analysis: A Comprehensive Survey, Taxonomy, and Research Challenges0
Deep learning guided Android malware and anomaly detection0
Devising Malware Characterstics using Transformers0
DIRECT : A Transformer-based Model for Decompiled Identifier Renaming0
Domain-Specific Retrieval-Augmented Generation Using Vector Stores, Knowledge Graphs, and Tensor Factorization0
Dual Explanations via Subgraph Matching for Malware Detection0
Efficient Malware Analysis Using Metric Embeddings0
Explainable Artificial Intelligence (XAI) for Malware Analysis: A Survey of Techniques, Applications, and Open Challenges0
Exploring Large Language Models for Semantic Analysis and Categorization of Android Malware0
Exploring the Efficacy of Large Language Models (GPT-4) in Binary Reverse Engineering0
FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware0
Fuzzy Hashing as Perturbation-Consistent Adversarial Kernel Embedding0
Show:102550
← PrevPage 2 of 2Next →

No leaderboard results yet.