There is Limited Correlation between Coverage and Robustness for Deep Neural Networks Nov 14, 2019 Face Recognition Malware Detection
— Unverified 0The State-of-the-Art in AI-Based Malware Detection Techniques: A Review Oct 12, 2022 Malware Detection
— Unverified 0The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey Nov 6, 2019 BIG-bench Machine Learning Classification
— Unverified 0Towards Accurate Labeling of Android Apps for Reliable Malware Detection Jul 1, 2020 Malware Detection
— Unverified 0Towards an Automated Pipeline for Detecting and Classifying Malware through Machine Learning Jun 10, 2021 BIG-bench Machine Learning Malware Detection
— Unverified 0Towards an in-depth detection of malware using distributed QCNN Dec 19, 2023 Malware Detection Quantum Machine Learning
— Unverified 0Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples Dec 11, 2019 Malware Detection
— Unverified 0Towards Deep Federated Defenses Against Malware in Cloud Ecosystems Dec 27, 2019 BIG-bench Machine Learning Cloud Computing
— Unverified 0Towards Interpretable Ensemble Learning for Image-based Malware Detection Jan 13, 2021 Ensemble Learning Malware Detection
— Unverified 0Towards interpreting ML-based automated malware detection models: a survey Jan 15, 2021 Malware Detection Survey
— Unverified 0Towards Novel Malicious Packet Recognition: A Few-Shot Learning Approach Sep 17, 2024 Few-Shot Learning Language Modelling
— Unverified 0Towards Obfuscated Malware Detection for Low Powered IoT Devices Nov 6, 2020 Malware Detection
— Unverified 0Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization Aug 29, 2017 Data Poisoning Deep Learning
— Unverified 0Towards Robust Real-Time Hardware-based Mobile Malware Detection using Multiple Instance Learning Formulation Apr 19, 2024 Malware Detection Multiple Instance Learning
— Unverified 0Toward the Detection of Polyglot Files Mar 14, 2022 Malware Detection
— Unverified 0Traffic Analytics Development Kits (TADK): Enable Real-Time AI Inference in Networking Apps Aug 16, 2022 Malware Detection Traffic Classification
— Unverified 0Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls May 15, 2024 Malware Detection Transfer Learning
— Unverified 0Transformers for End-to-End InfoSec Tasks: A Feasibility Study Dec 5, 2022 Binary Classification Malware Detection
— Unverified 0Trust Under Siege: Label Spoofing Attacks against Machine Learning for Android Malware Detection Mar 14, 2025 Android Malware Detection Malware Detection
— Unverified 0Unmasking the Shadows: Pinpoint the Implementations of Anti-Dynamic Analysis Techniques in Malware Using LLM Nov 8, 2024 Language Modeling Language Modelling
— Unverified 0Unraveling the Key of Machine Learning Solutions for Android Malware Detection Feb 5, 2024 Android Malware Detection Feature Engineering
— Unverified 0Unsupervised representation learning with Hebbian synaptic and structural plasticity in brain-like feedforward neural networks Jun 7, 2024 Malware Detection Representation Learning
— Unverified 0Use of Multi-CNNs for Section Analysis in Static Malware Detection Feb 6, 2024 Malware Detection
— Unverified 0Using Deep Neural Network for Android Malware Detection Jan 16, 2019 Android Malware Detection Malware Detection
— Unverified 0Using Randomness to Improve Robustness of Machine-Learning Models Against Evasion Attacks Aug 10, 2018 BIG-bench Machine Learning Intrusion Detection
— Unverified 0Virus-MNIST: A Benchmark Malware Dataset Feb 28, 2021 Clustering image-classification
— Unverified 0Weakly Supervised Anomaly Detection via Knowledge-Data Alignment Feb 6, 2024 Anomaly Detection Malware Detection
— Unverified 0WebEye - Automated Collection of Malicious HTTP Traffic Feb 16, 2018 BIG-bench Machine Learning Malware Detection
— Unverified 0Word Embedding Techniques for Malware Evolution Detection Mar 7, 2021 Feature Engineering Malware Detection
— Unverified 0Would a File by Any Other Name Seem as Malicious? Oct 10, 2019 Malware Detection
— Unverified 0Understanding the efficacy, reliability and resiliency of computer vision techniques for malware detection and future research directions Apr 3, 2019 BIG-bench Machine Learning Classification
— Unverified 0Efficient Malware Analysis Using Metric Embeddings Dec 5, 2022 Attribute Malware Analysis
— Unverified 0Efficient Malware Detection with Optimized Learning on High-Dimensional Features Jun 18, 2025 Computational Efficiency Dimensionality Reduction
— Unverified 0Empirical Quantification of Spurious Correlations in Malware Detection Jun 11, 2025 Deep Learning Malware Detection
— Unverified 0EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning Mar 31, 2017 Android Malware Detection BIG-bench Machine Learning
— Unverified 0Enhanced Attacks on Defensively Distilled Deep Neural Networks Nov 16, 2017 Face Recognition General Classification
— Unverified 0Enhancing Enterprise Network Security: Comparing Machine-Level and Process-Level Analysis for Dynamic Malware Detection Oct 27, 2023 CPU Malware Detection
— Unverified 0Enhancing Malware Detection by Integrating Machine Learning with Cuckoo Sandbox Nov 7, 2023 Deep Learning Malware Detection
— Unverified 0Enhancing Robustness of Neural Networks through Fourier Stabilization Jun 8, 2021 Combinatorial Optimization Malware Detection
— Unverified 0Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach Feb 4, 2024 Deep Reinforcement Learning Malware Detection
— Unverified 0Examining Adversarial Learning against Graph-based IoT Malware Detection Systems Feb 12, 2019 Adversarial Attack General Classification
— Unverified 0Explainable AI-based Intrusion Detection System for Industry 5.0: An Overview of the Literature, associated Challenges, the existing Solutions, and Potential Research Directions Jul 21, 2024 Explainable artificial intelligence Explainable Artificial Intelligence (XAI)
— Unverified 0Explainable Artificial Intelligence (XAI) for Malware Analysis: A Survey of Techniques, Applications, and Open Challenges Sep 9, 2024 Explainable artificial intelligence Explainable Artificial Intelligence (XAI)
— Unverified 0Explainable Malware Detection through Integrated Graph Reduction and Learning Techniques Dec 4, 2024 Decision Making Malware Detection
— Unverified 0Explainable Malware Detection with Tailored Logic Explained Networks May 5, 2024 Malware Detection
— Unverified 0Explaining Black-box Android Malware Detection Mar 9, 2018 Android Malware Detection BIG-bench Machine Learning
— Unverified 0Explaining high-dimensional text classifiers Nov 22, 2023 Malware Detection Sentiment Analysis
— Unverified 0Exploring Adversarial Examples in Malware Detection Oct 18, 2018 Feature Engineering General Classification
— Unverified 0GLSearch: Maximum Common Subgraph Detection via Learning to Search Feb 8, 2020 Cloud Computing Graph Embedding
— Unverified 0Feature Cross-Substitution in Adversarial Classification Dec 1, 2014 Classification feature selection
— Unverified 0