Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes Authors: Keane Lucas, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, Saurabh Shintre | Published: 2019-12-19 | Updated: 2021-10-25 Binary DiversificationAdversarial ExampleDeep Learning Technology 2019.12.19 2025.05.28 Literature Database
Adversarial Binaries for Authorship Identification Authors: Xiaozhu Meng, Barton P. Miller, Somesh Jha | Published: 2018-09-21 | Updated: 2018-11-07 Binary DiversificationAdversarial LearningAdversarial Attack Methods 2018.09.21 2025.05.28 Literature Database