SOTAVerified

Malware Detection

Malware Detection is a significant part of endpoint security including workstations, servers, cloud instances, and mobile devices. Malware Detection is used to detect and identify malicious activities caused by malware. With the increase in the variety of malware activities on CMS based websites such as malicious malware redirects on WordPress site (Aka, WordPress Malware Redirect Hack) where the site redirects to spam, being the most widespread, the need for automatic detection and classifier amplifies as well. The signature-based Malware Detection system is commonly used for existing malware that has a signature but it is not suitable for unknown malware or zero-day malware

Source: The Threat of Adversarial Attacks on Machine Learning in Network Security - A Survey

Papers

Showing 301350 of 431 papers

TitleStatusHype
A Review of Computer Vision Methods in Network Security0
Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?0
How to 0wn the NAS in Your Spare TimeCode0
pAElla: Edge-AI based Real-Time Malware Detection in Data CentersCode0
AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks0
How to 0wn NAS in Your Spare TimeCode0
Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS0
MDEA: Malware Detection with Evolutionary Adversarial Learning0
GLSearch: Maximum Common Subgraph Detection via Learning to Search0
Can't Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks0
Interpreting Machine Learning Malware Detectors Which Leverage N-gram AnalysisCode0
Practical Fast Gradient Sign Attack against Mammographic Image Classifier0
Towards Deep Federated Defenses Against Malware in Cloud Ecosystems0
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable BytesCode0
Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples0
Coda: An End-to-End Neural Program Decompiler0
DL-Droid: Deep learning based android malware detection using real devices0
Classification with Costly Features in Hierarchical Deep SetsCode0
There is Limited Correlation between Coverage and Robustness for Deep Neural Networks0
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes0
The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey0
Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection TechniqueCode0
Heterogeneous Graph Matching Networks0
Would a File by Any Other Name Seem as Malicious?0
An MDL-Based Classifier for Transactional Datasets with Application in Malware Detection0
A Hierarchical Convolutional Neural Network for Malware Classification0
COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection0
I-MAD: Interpretable Malware Detector Using Galaxy Transformer0
Effectiveness of Adversarial Examples and Defenses for Malware Classification0
SEdroid: A Robust Android Malware Detector using Selective Ensemble Learning0
On Defending Against Label Flipping Attacks on Malware Detection Systems0
Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features0
New Era of Deeplearning-Based Malware Intrusion Detection: The Malware Detection and Prediction Based On Deep Learning0
Dynamic Malware Analysis with Feature Engineering and Feature LearningCode0
Intelligent Systems Design for Malware Classification Under Adversarial Conditions0
A Neural-based Program Decompiler0
A New Malware Detection System Using a High Performance-ELM method0
Multitask Learning for Network Traffic ClassificationCode0
Evaluating Explanation Methods for Deep Learning in SecurityCode0
Transferable Cost-Aware Security Policy Implementation for Malware Detection Using Deep Reinforcement Learning0
The Curious Case of Machine Learning In Malware Detection0
Automatic Malware Description via Attribute Tagging and Similarity EmbeddingCode0
Distinguishability of Adversarial Examples0
Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach0
Malware Evasion Attack and Defense0
Malware Detection using Machine Learning and Deep Learning0
Understanding the efficacy, reliability and resiliency of computer vision techniques for malware detection and future research directions0
ALOHA: Auxiliary Loss Optimization for Hypothesis AugmentationCode0
Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis0
Examining Adversarial Learning against Graph-based IoT Malware Detection Systems0
Show:102550
← PrevPage 7 of 9Next →

No leaderboard results yet.