SOTAVerified

Malware Detection

Malware Detection is a significant part of endpoint security including workstations, servers, cloud instances, and mobile devices. Malware Detection is used to detect and identify malicious activities caused by malware. With the increase in the variety of malware activities on CMS based websites such as malicious malware redirects on WordPress site (Aka, WordPress Malware Redirect Hack) where the site redirects to spam, being the most widespread, the need for automatic detection and classifier amplifies as well. The signature-based Malware Detection system is commonly used for existing malware that has a signature but it is not suitable for unknown malware or zero-day malware

Source: The Threat of Adversarial Attacks on Machine Learning in Network Security - A Survey

Papers

Showing 401425 of 431 papers

TitleStatusHype
Creating Valid Adversarial Examples of MalwareCode0
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved FeaturesCode0
On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial AttacksCode0
An Efficient Approach For Malware Detection Using PE Header SpecificationCode0
Convolutional Neural Network for Classification of Malware Assembly CodeCode0
Multitask Learning for Network Traffic ClassificationCode0
A learning model to detect maliciousness of portable executable using integrated feature setCode0
Black-Box Attacks against RNN based Malware Detection AlgorithmsCode0
Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware DetectionCode0
Level Up with ML Vulnerability Identification: Leveraging Domain Constraints in Feature Space for Robust Android Malware DetectionCode0
Classification with Costly Features in Hierarchical Deep SetsCode0
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity DetectionCode0
Adversarial Feature Selection against Evasion AttacksCode0
Deep learning at the shallow end: Malware classification for non-domain expertsCode0
Reliable Malware Analysis and Detection using Topology Data AnalysisCode0
How to 0wn NAS in Your Spare TimeCode0
How to 0wn the NAS in Your Spare TimeCode0
How to Train your Antivirus: RL-based Hardening through the Problem-SpaceCode0
Detecting DGA domains with recurrent neural networks and side informationCode0
Hyperbolic Benchmarking Unveils Network Topology-Feature Relationship in GNN PerformanceCode0
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable BytesCode0
Statistical Estimation of Malware Detection Metrics in the Absence of Ground TruthCode0
Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection TechniqueCode0
Imbalanced malware classification: an approach based on dynamic classifier selectionCode0
Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious CorrelationsCode0
Show:102550
← PrevPage 17 of 18Next →

No leaderboard results yet.