SOTAVerified

Malware Detection

Malware Detection is a significant part of endpoint security including workstations, servers, cloud instances, and mobile devices. Malware Detection is used to detect and identify malicious activities caused by malware. With the increase in the variety of malware activities on CMS based websites such as malicious malware redirects on WordPress site (Aka, WordPress Malware Redirect Hack) where the site redirects to spam, being the most widespread, the need for automatic detection and classifier amplifies as well. The signature-based Malware Detection system is commonly used for existing malware that has a signature but it is not suitable for unknown malware or zero-day malware

Source: The Threat of Adversarial Attacks on Machine Learning in Network Security - A Survey

Papers

Showing 251300 of 431 papers

TitleStatusHype
FGAM:Fast Adversarial Malware Generation Method Based on Gradient Sign0
Flexible Android Malware Detection Model based on Generative Adversarial Networks with Code Tensor0
Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking0
From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy0
Generative Adversarial Networks and Image-Based Malware Classification0
Generative Adversarial Networks for Malware Detection: a Survey0
Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities0
Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors0
Graph Neural Network-based Android Malware Classification with Jumping Knowledge0
HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis0
HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples0
HeNet: A Deep Learning Approach on Intel^ Processor Trace for Effective Exploit Detection0
Heterogeneous Graph Matching Networks0
Hidden Markov Models with Random Restarts vs Boosting for Malware Detection0
High Accuracy Android Malware Detection Using Ensemble Learning0
Holographic Global Convolutional Networks for Long-Range Prediction Tasks in Malware Detection0
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses0
"How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector0
Identification of Significant Permissions for Efficient Android Malware Detection0
I-MAD: Interpretable Malware Detector Using Galaxy Transformer0
Image-Based Malware Classification Using QR and Aztec Codes0
Improving Android Malware Detection Through Data Augmentation Using Wasserstein Generative Adversarial Networks0
Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations0
"Influence Sketching": Finding Influential Samples In Large-Scale Regressions0
Instance Attack:An Explanation-based Vulnerability Analysis Framework Against DNNs for Malware Detection0
Integrating Explainable AI for Effective Malware Detection in Encrypted Network Traffic0
Intelligent Systems Design for Malware Classification Under Adversarial Conditions0
Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features0
Collective Intelligence: Decentralized Learning for Android Malware Detection in IoT with Blockchain0
IoT Malware Detection Architecture using a Novel Channel Boosted and Squeezed CNN0
Is feature selection secure against training data poisoning?0
Knowledge Engineering for Planning-Based Hypothesis Generation0
LaFiCMIL: Rethinking Large File Classification from the Perspective of Correlated Multiple Instance Learning0
LAMD: Context-driven Android Malware Detection and Classification with LLMs0
Large Language Model (LLM) for Software Security: Code Analysis, Malware Analysis, Reverse Engineering0
Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection0
Learning Temporal Invariance in Android Malware Detectors0
Learning to Search for Fast Maximum Common Subgraph Detection0
Leveraging LSTM and GAN for Modern Malware Detection0
Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints0
Leveraging VAE-Derived Latent Spaces for Enhanced Malware Detection with Machine Learning Classifiers0
Light up that Droid! On the Effectiveness of Static Analysis Features against App Obfuscation for Android Malware Detection0
Lightweight IoT Malware Detection Solution Using CNN Classification0
Living off the Analyst: Harvesting Features from Yara Rules for Malware Detection0
LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach0
Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection0
Machine learning-based malware detection for IoT devices using control-flow data0
Machine Learning for Windows Malware Detection and Classification: Methods, Challenges and Ongoing Research0
Machine Learning With Feature Selection Using Principal Component Analysis for Malware Detection: A Case Study0
MADCAT: Combating Malware Detection Under Concept Drift with Test-Time Adaptation0
Show:102550
← PrevPage 6 of 9Next →

No leaderboard results yet.