| DIRECT : A Transformer-based Model for Decompiled Identifier Renaming | Aug 1, 2021 | Malware Analysis | —Unverified | 0 | 0 |
| Domain-Specific Retrieval-Augmented Generation Using Vector Stores, Knowledge Graphs, and Tensor Factorization | Oct 3, 2024 | Anomaly DetectionAttribute | —Unverified | 0 | 0 |
| Dual Explanations via Subgraph Matching for Malware Detection | Apr 29, 2025 | Malware AnalysisMalware Detection | —Unverified | 0 | 0 |
| Efficient Malware Analysis Using Metric Embeddings | Dec 5, 2022 | AttributeMalware Analysis | —Unverified | 0 | 0 |
| Explainable Artificial Intelligence (XAI) for Malware Analysis: A Survey of Techniques, Applications, and Open Challenges | Sep 9, 2024 | Explainable artificial intelligenceExplainable Artificial Intelligence (XAI) | —Unverified | 0 | 0 |
| Exploring Large Language Models for Semantic Analysis and Categorization of Android Malware | Jan 8, 2025 | Malware AnalysisPrompt Engineering | —Unverified | 0 | 0 |
| Exploring the Efficacy of Large Language Models (GPT-4) in Binary Reverse Engineering | Jun 9, 2024 | Malware Analysis | —Unverified | 0 | 0 |
| FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware | Sep 17, 2018 | Attributefeature selection | —Unverified | 0 | 0 |
| Fuzzy Hashing as Perturbation-Consistent Adversarial Kernel Embedding | Dec 17, 2018 | Malware Analysis | —Unverified | 0 | 0 |