SOTAVerified

Malware Detection

Malware Detection is a significant part of endpoint security including workstations, servers, cloud instances, and mobile devices. Malware Detection is used to detect and identify malicious activities caused by malware. With the increase in the variety of malware activities on CMS based websites such as malicious malware redirects on WordPress site (Aka, WordPress Malware Redirect Hack) where the site redirects to spam, being the most widespread, the need for automatic detection and classifier amplifies as well. The signature-based Malware Detection system is commonly used for existing malware that has a signature but it is not suitable for unknown malware or zero-day malware

Source: The Threat of Adversarial Attacks on Machine Learning in Network Security - A Survey

Papers

Showing 251300 of 431 papers

TitleStatusHype
Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering0
Virus-MNIST: A Benchmark Malware Dataset0
Collective Intelligence: Decentralized Learning for Android Malware Detection in IoT with Blockchain0
A Non-Intrusive Machine Learning Solution for Malware Detection and Data Theft Classification in Smartphones0
MalNet: A Large-Scale Image Database of Malicious SoftwareCode1
Robust Android Malware Detection System against Adversarial Attacks using Q-Learning0
Malware Detection Using Frequency Domain-Based Image Visualization and Deep LearningCode1
A novel DL approach to PE malware detection: exploring Glove vectorization, MCC_RCNN and feature fusion0
Towards interpreting ML-based automated malware detection models: a survey0
Towards Interpretable Ensemble Learning for Image-based Malware Detection0
Echelon: Two-Tier Malware Detection for Raw Executables to Reduce False Alarms0
Powershell malware detection method based on features combination0
Learning to Search for Fast Maximum Common Subgraph Detection0
A Novel Resampling Technique for Imbalanced Dataset Optimization0
Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS0
Classifying Sequences of Extreme Length with Constant Memory Applied to Malware DetectionCode1
Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware DetectionCode0
Malware Detection using Artificial Bee Colony Algorithm0
A survey on practical adversarial examples for malware classifiers0
Towards Obfuscated Malware Detection for Low Powered IoT Devices0
Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers0
Traffic Refinery: Cost-Aware Data Representation for Machine Learning on Network Traffic0
Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors0
Dos and Don'ts of Machine Learning in Computer Security0
Against All Odds: Winning the Defense Challenge in an Evasion Competition with DiversificationCode1
Lightweight IoT Malware Detection Solution Using CNN Classification0
Data Augmentation Based Malware Detection using Convolutional Neural NetworksCode1
Orthrus: A Bimodal Learning Architecture for Malware ClassificationCode0
Dataset Optimization Strategies for MalwareTraffic DetectionCode1
Semantic-preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware DetectionCode1
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware DetectionCode1
Probabilistic Jacobian-based Saliency Maps AttacksCode1
Robust and Accurate Authorship Attribution via Program Normalization0
Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection0
Towards Accurate Labeling of Android Apps for Reliable Malware Detection0
Feature Extraction for Novelty Detection in Network Traffic0
Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware DetectionCode1
Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacksCode1
An Efficient Approach For Malware Detection Using PE Header SpecificationCode0
Adversarial Feature Selection against Evasion AttacksCode0
Arms Race in Adversarial Malware Detection: A Survey0
HYDRA: A multimodal deep learning framework for malware classificationCode1
A Review of Computer Vision Methods in Network Security0
Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?0
How to 0wn the NAS in Your Spare TimeCode0
NetML: A Challenge for Network Traffic AnalyticsCode1
Why an Android App is Classified as Malware? Towards Malware Classification InterpretationCode1
A Framework for Enhancing Deep Neural Networks Against Adversarial MalwareCode1
pAElla: Edge-AI based Real-Time Malware Detection in Data CentersCode0
AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks0
Show:102550
← PrevPage 6 of 9Next →

No leaderboard results yet.