A Review of Computer Vision Methods in Network Security May 7, 2020 Anomaly Detection Malware Detection
— Unverified 0Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware? May 4, 2020 Adversarial Robustness Android Malware Detection
— Unverified 0How to 0wn the NAS in Your Spare Time May 1, 2020 CPU Malware Detection
Code Code Available 0pAElla: Edge-AI based Real-Time Malware Detection in Data Centers Apr 7, 2020 Anomaly Detection Edge-computing
Code Code Available 0AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks Feb 19, 2020 Malware Detection Self-Driving Cars
— Unverified 0How to 0wn NAS in Your Spare Time Feb 17, 2020 CPU Deep Learning
Code Code Available 0Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS Feb 15, 2020 CPU Malware Detection
— Unverified 0MDEA: Malware Detection with Evolutionary Adversarial Learning Feb 9, 2020 BIG-bench Machine Learning Malware Detection
— Unverified 0GLSearch: Maximum Common Subgraph Detection via Learning to Search Feb 8, 2020 Cloud Computing Graph Embedding
— Unverified 0Can't Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks Feb 7, 2020 Cyber Attack Detection Data Poisoning
— Unverified 0Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis Jan 27, 2020 BIG-bench Machine Learning Interpretable Machine Learning
Code Code Available 0Practical Fast Gradient Sign Attack against Mammographic Image Classifier Jan 27, 2020 Adversarial Attack Malware Detection
— Unverified 0Towards Deep Federated Defenses Against Malware in Cloud Ecosystems Dec 27, 2019 BIG-bench Machine Learning Cloud Computing
— Unverified 0Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes Dec 19, 2019 Feature Engineering Malware Detection
Code Code Available 0Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples Dec 11, 2019 Malware Detection
— Unverified 0Coda: An End-to-End Neural Program Decompiler Dec 1, 2019 Computer Security Malware Detection
— Unverified 0DL-Droid: Deep learning based android malware detection using real devices Nov 22, 2019 Android Malware Detection Deep Learning
— Unverified 0Classification with Costly Features in Hierarchical Deep Sets Nov 20, 2019 Classification Classification with Costly Features
Code Code Available 0There is Limited Correlation between Coverage and Robustness for Deep Neural Networks Nov 14, 2019 Face Recognition Malware Detection
— Unverified 0The Naked Sun: Malicious Cooperation Between Benign-Looking Processes Nov 6, 2019 Behavioral Malware Detection Malware Detection
— Unverified 0The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey Nov 6, 2019 BIG-bench Machine Learning Classification
— Unverified 0Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique Oct 24, 2019 Feature Engineering feature selection
Code Code Available 0Heterogeneous Graph Matching Networks Oct 17, 2019 Graph Matching Malware Detection
— Unverified 0Would a File by Any Other Name Seem as Malicious? Oct 10, 2019 Malware Detection
— Unverified 0An MDL-Based Classifier for Transactional Datasets with Application in Malware Detection Oct 9, 2019 Clustering Malware Detection
— Unverified 0A Hierarchical Convolutional Neural Network for Malware Classification Sep 30, 2019 Classification General Classification
— Unverified 0COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection Sep 20, 2019 Adversarial Attack Malware Detection
— Unverified 0I-MAD: Interpretable Malware Detector Using Galaxy Transformer Sep 15, 2019 BIG-bench Machine Learning Malware Detection
— Unverified 0Effectiveness of Adversarial Examples and Defenses for Malware Classification Sep 10, 2019 Classification General Classification
— Unverified 0SEdroid: A Robust Android Malware Detector using Selective Ensemble Learning Sep 6, 2019 Android Malware Detection Ensemble Learning
— Unverified 0On Defending Against Label Flipping Attacks on Malware Detection Systems Aug 13, 2019 Android Malware Detection BIG-bench Machine Learning
— Unverified 0Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features Aug 13, 2019 Android Malware Detection Malware Detection
— Unverified 0New Era of Deeplearning-Based Malware Intrusion Detection: The Malware Detection and Prediction Based On Deep Learning Jul 19, 2019 Clustering Deep Learning
— Unverified 0Dynamic Malware Analysis with Feature Engineering and Feature Learning Jul 17, 2019 Feature Engineering Malware Analysis
Code Code Available 0Intelligent Systems Design for Malware Classification Under Adversarial Conditions Jul 6, 2019 BIG-bench Machine Learning Classification
— Unverified 0A Neural-based Program Decompiler Jun 28, 2019 Computer Security Malware Detection
— Unverified 0A New Malware Detection System Using a High Performance-ELM method Jun 27, 2019 Malware Detection Vocal Bursts Intensity Prediction
— Unverified 0Multitask Learning for Network Traffic Classification Jun 12, 2019 Classification General Classification
Code Code Available 0Evaluating Explanation Methods for Deep Learning in Security Jun 5, 2019 Computer Security Deep Learning
Code Code Available 0Transferable Cost-Aware Security Policy Implementation for Malware Detection Using Deep Reinforcement Learning May 25, 2019 Deep Reinforcement Learning Malware Detection
— Unverified 0The Curious Case of Machine Learning In Malware Detection May 18, 2019 BIG-bench Machine Learning Malware Analysis
— Unverified 0Automatic Malware Description via Attribute Tagging and Similarity Embedding May 15, 2019 Attribute BIG-bench Machine Learning
Code Code Available 0Distinguishability of Adversarial Examples May 1, 2019 BIG-bench Machine Learning Malware Detection
— Unverified 0Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach Apr 20, 2019 BIG-bench Machine Learning Data Poisoning
— Unverified 0Malware Evasion Attack and Defense Apr 7, 2019 BIG-bench Machine Learning Malware Detection
— Unverified 0Malware Detection using Machine Learning and Deep Learning Apr 4, 2019 BIG-bench Machine Learning Deep Learning
— Unverified 0Understanding the efficacy, reliability and resiliency of computer vision techniques for malware detection and future research directions Apr 3, 2019 BIG-bench Machine Learning Classification
— Unverified 0ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation Mar 13, 2019 Attribute Malware Detection
Code Code Available 0Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis Mar 12, 2019 Malware Detection
— Unverified 0Examining Adversarial Learning against Graph-based IoT Malware Detection Systems Feb 12, 2019 Adversarial Attack General Classification
— Unverified 0