SOTAVerified

Malware Detection

Malware Detection is a significant part of endpoint security including workstations, servers, cloud instances, and mobile devices. Malware Detection is used to detect and identify malicious activities caused by malware. With the increase in the variety of malware activities on CMS based websites such as malicious malware redirects on WordPress site (Aka, WordPress Malware Redirect Hack) where the site redirects to spam, being the most widespread, the need for automatic detection and classifier amplifies as well. The signature-based Malware Detection system is commonly used for existing malware that has a signature but it is not suitable for unknown malware or zero-day malware

Source: The Threat of Adversarial Attacks on Machine Learning in Network Security - A Survey

Papers

Showing 51100 of 431 papers

TitleStatusHype
On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial AttacksCode0
An Efficient Approach For Malware Detection Using PE Header SpecificationCode0
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable BytesCode0
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity DetectionCode0
MaMaDroid2.0 -- The Holes of Control Flow GraphsCode0
Malware Detection based on API callsCode0
Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection TechniqueCode0
Black-Box Attacks against RNN based Malware Detection AlgorithmsCode0
Multitask Learning for Network Traffic ClassificationCode0
Reliable Malware Analysis and Detection using Topology Data AnalysisCode0
Orthrus: A Bimodal Learning Architecture for Malware ClassificationCode0
Interpreting Machine Learning Malware Detectors Which Leverage N-gram AnalysisCode0
Hyperbolic Benchmarking Unveils Network Topology-Feature Relationship in GNN PerformanceCode0
Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious CorrelationsCode0
How to Train your Antivirus: RL-based Hardening through the Problem-SpaceCode0
BagFlip: A Certified Defense against Data PoisoningCode0
How to 0wn NAS in Your Spare TimeCode0
Fast & Furious: Modelling Malware Detection as Evolving Data StreamsCode0
Evasion Attacks against Machine Learning at Test TimeCode0
Generating Adversarial Malware Examples for Black-Box Attacks Based on GANCode0
Efficient Concept Drift Handling for Batch Android Malware Detection ModelsCode0
Accelerating Malware Classification: A Vision Transformer SolutionCode0
Efficient Formal Safety Analysis of Neural NetworksCode0
EvadeDroid: A Practical Evasion Attack on Machine Learning for Black-box Android Malware DetectionCode0
Detecting DGA domains with recurrent neural networks and side informationCode0
DetectBERT: Towards Full App-Level Representation Learning to Detect Android MalwareCode0
Deep Transfer Learning for Static Malware ClassificationCode0
DeepSign: Deep Learning for Automatic Malware Signature Generation and ClassificationCode0
DeepXplore: Automated Whitebox Testing of Deep Learning SystemsCode0
Level Up with ML Vulnerability Identification: Leveraging Domain Constraints in Feature Space for Robust Android Malware DetectionCode0
Deep learning at the shallow end: Malware classification for non-domain expertsCode0
Deep k-Nearest Neighbors: Towards Confident, Interpretable and Robust Deep LearningCode0
Evading Malware Classifiers via Monte Carlo Mutant Feature DiscoveryCode0
Evaluating the Robustness of Adversarial Defenses in Malware Detection SystemsCode0
Adversarially Robust Learning with Optimal Transport Regularized DivergencesCode0
Arhuaco: Deep Learning and Isolation Based Security for Distributed High-Throughput ComputingCode0
Classification with Costly Features in Hierarchical Deep SetsCode0
Evaluating Explanation Methods for Deep Learning in SecurityCode0
How to 0wn the NAS in Your Spare TimeCode0
Behavioural Reports of Multi-Stage MalwareCode0
Crystal ball: From innovative attacks to attack effectiveness classifierCode0
Imbalanced malware classification: an approach based on dynamic classifier selectionCode0
Improving Malware Detection Accuracy by Extracting Icon InformationCode0
Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware DetectionCode0
Cyber Security Data Science: Machine Learning Methods and their Performance on Imbalanced DatasetsCode0
Creating Valid Adversarial Examples of MalwareCode0
Adversarial Feature Selection against Evasion AttacksCode0
Cross-Language Binary-Source Code Matching with Intermediate RepresentationsCode0
ALOHA: Auxiliary Loss Optimization for Hypothesis AugmentationCode0
A learning model to detect maliciousness of portable executable using integrated feature setCode0
Show:102550
← PrevPage 2 of 9Next →

No leaderboard results yet.