SOTAVerified

Malware Detection

Malware Detection is a significant part of endpoint security including workstations, servers, cloud instances, and mobile devices. Malware Detection is used to detect and identify malicious activities caused by malware. With the increase in the variety of malware activities on CMS based websites such as malicious malware redirects on WordPress site (Aka, WordPress Malware Redirect Hack) where the site redirects to spam, being the most widespread, the need for automatic detection and classifier amplifies as well. The signature-based Malware Detection system is commonly used for existing malware that has a signature but it is not suitable for unknown malware or zero-day malware

Source: The Threat of Adversarial Attacks on Machine Learning in Network Security - A Survey

Papers

Showing 151200 of 431 papers

TitleStatusHype
The Efficacy of Transformer-based Adversarial Attacks in Security Domains0
Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations0
On the Effectiveness of Adversarial Samples against Ensemble Learning-based Windows PE Malware Detectors0
Efficient Concept Drift Handling for Batch Android Malware Detection ModelsCode0
Adversarially Robust Learning with Optimal Transport Regularized DivergencesCode0
The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement LearningCode0
Assessing Cyclostationary Malware Detection via Feature Selection and Classification0
Optimized Deep Learning Models for Malware Detection under Concept Drift0
Malware Classification using Deep Neural Networks: Performance Evaluation and Applications in Edge Devices0
A Comparison of Adversarial Learning Techniques for Malware Detection0
A Feature Set of Small Size for the PDF Malware Detection0
LaFiCMIL: Rethinking Large File Classification from the Perspective of Correlated Multiple Instance Learning0
Open Image Content Disarm And Reconstruction0
Hidden Markov Models with Random Restarts vs Boosting for Malware Detection0
ATWM: Defense against adversarial malware based on adversarial training0
A Natural Language Processing Approach to Malware Classification0
Review of Deep Learning-based Malware Detection for Android and Windows System0
From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy0
Creating Valid Adversarial Examples of MalwareCode0
On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities0
A Survey on Cross-Architectural IoT Malware Threat Hunting0
Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features0
FGAM:Fast Adversarial Malware Generation Method Based on Gradient Sign0
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses0
Survey of Malware Analysis through Control Flow Graph using Machine Learning0
Can Feature Engineering Help Quantum Machine Learning for Malware Detection?0
A Survey on Malware Detection with Graph Representation Learning0
MalProtect: Stateful Defense Against Adversarial Query Attacks in ML-based Malware Detection0
Generative Adversarial Networks for Malware Detection: a Survey0
Sequential Embedding-based Attentive (SEA) classifier for malware classificationCode0
Effectiveness of Moving Target Defenses for Adversarial Attacks in ML-based Malware Detection0
RS-Del: Edit Distance Robustness Certificates for Sequence Classifiers via Randomized DeletionCode0
Behavioural Reports of Multi-Stage MalwareCode0
Investigating Feature and Model Importance in Android Malware Detection: An Implemented Survey and Experimental Comparison of ML-Based Methods0
PECAN: A Deterministic Certified Defense Against Backdoor Attacks0
New Approach to Malware Detection Using Optimized Convolutional Neural Network0
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning0
A New Deep Boosted CNN and Ensemble Learning based IoT Malware Detection0
Machine Learning for Detecting Malware in PE Files0
Efficient Malware Analysis Using Metric Embeddings0
Transformers for End-to-End InfoSec Tasks: A Feasibility Study0
Mask Off: Analytic-based Malware Detection By Transfer Learning and Model Personalization0
Clustering based opcode graph generation for malware variant detection0
Reliable Malware Analysis and Detection using Topology Data AnalysisCode0
Flexible Android Malware Detection Model based on Generative Adversarial Networks with Code Tensor0
The State-of-the-Art in AI-Based Malware Detection Techniques: A Review0
Instance Attack:An Explanation-based Vulnerability Analysis Framework Against DNNs for Malware Detection0
Traffic Analytics Development Kits (TADK): Enable Real-Time AI Inference in Networking Apps0
Design of secure and robust cognitive system for malware detection0
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware0
Show:102550
← PrevPage 4 of 9Next →

No leaderboard results yet.