Android Malware Detection: an Eigenspace Analysis Approach Authors: Suleiman Y. Yerima, Sakir Sezer, Igor Muttik | Published: 2016-07-27 Data Extraction and AnalysisModel evaluation methodsFeature Selection Method 2016.07.27 2026.05.01 Literature Database
Wavelet decomposition of software entropy reveals symptoms of malicious code Authors: Michael Wojnowicz, Glenn Chisholm, Matt Wolff, Xuan Zhao | Published: 2016-07-18 | Updated: 2018-02-02 Energy ManagementModel evaluation methodsFeature Selection Method 2016.07.18 2026.05.01 Literature Database
Adversarial examples in the physical world Authors: Alexey Kurakin, Ian Goodfellow, Samy Bengio | Published: 2016-07-08 | Updated: 2017-02-11 Certified RobustnessAdversarial ExampleAdversarial Transferability 2016.07.08 2026.05.01 Literature Database
Deciphering Malware’s use of TLS (without Decryption) Authors: Blake Anderson, Subharthi Paul, David McGrew | Published: 2016-07-06 TLSクライアント構成Secure Communication ChannelData Extraction and Analysis 2016.07.06 2026.05.01 Literature Database
Bayesian Nonparametrics for Sparse Dynamic Networks Authors: Cian Naik, Francois Caron, Judith Rousseau, Yee Whye Teh, Konstantina Palla | Published: 2016-07-06 | Updated: 2022-04-14 Dynamic AnalysisConvergence PropertyTime Series Analysis 2016.07.06 2026.05.01 Literature Database
Deep Learning with Differential Privacy Authors: Martín Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang | Published: 2016-07-01 | Updated: 2016-10-24 Privacy-Preserving Machine LearningDifferential PrivacyDeep Learning 2016.07.01 2026.05.01 Literature Database
Adaptive and Scalable Android Malware Detection through Online Learning Authors: Annamalai Narayanan, Liu Yang, Lihui Chen, Liu Jinliang | Published: 2016-06-23 | Updated: 2016-09-26 Online LearningSecurity AnalysisAdaptive Misuse Detection 2016.06.23 2026.05.01 Literature Database
Efficient Attack Graph Analysis through Approximate Inference Authors: Luis Muñoz-González, Daniele Sgandurra, Andrea Paudice, Emil C. Lupu | Published: 2016-06-22 Bayesian SecurityRisk Analysis MethodDynamic Analysis 2016.06.22 2026.05.01 Literature Database
An effective approach for classification of advanced malware with high accuracy Authors: Ashu Sharma, Sanjay K. Sahay | Published: 2016-06-22 Network Threat DetectionModel EvaluationFeature Selection 2016.06.22 2026.05.01 Literature Database
Adversarial Perturbations Against Deep Neural Networks for Malware Classification Authors: Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, Patrick McDaniel | Published: 2016-06-14 | Updated: 2016-06-16 Certified RobustnessAdversarial ExampleAdversarial Attack Assessment 2016.06.14 2026.05.01 Literature Database