A Survey on Malware Detection with Graph Representation Learning Authors: Tristan Bilot, Nour El Madhoun, Khaldoun Al Agha, Anis Zouaoui | Published: 2023-03-28 | Updated: 2023-08-17 Graph EmbeddingPoisoningMalware Classification 2023.03.28 2025.05.28 Literature Database
Analysis, Detection, and Classification of Android Malware using System Calls Authors: Shubham Shakya, Mayank Dave | Published: 2022-08-12 Malware ClassificationMalware Detection MethodAttack Method 2022.08.12 2025.05.28 Literature Database
Online Malware Classification with System-Wide System Calls in Cloud IaaS Authors: Phillip Brown, Austin Brown, Maanak Gupta, Mahmoud Abdelsalam | Published: 2022-08-09 Malware ClassificationMalware Detection MethodMachine Learning Method 2022.08.09 2025.05.28 Literature Database
Representation learning with function call graph transformations for malware open set recognition Authors: Jingyun Jia, Philip K. Chan | Published: 2022-05-13 | Updated: 2022-07-12 PoisoningMalware ClassificationSelf-Supervised Learning 2022.05.13 2025.05.28 Literature Database
Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks Authors: Harel Berger, Amit Dvir, Chen Hajaj, Rony Ronen | Published: 2022-05-09 Malware ClassificationAttack MethodDurability Issue 2022.05.09 2025.05.28 Literature Database
Adversarial Patterns: Building Robust Android Malware Classifiers Authors: Dipkamal Bhusal, Nidhi Rastogi | Published: 2022-03-04 | Updated: 2024-04-12 Malware ClassificationAdversarial ExampleDefense Method 2022.03.04 2025.05.28 Literature Database
Dynamic detection of mobile malware using smartphone data and machine learning Authors: J. S. Panman de Wit, J. van der Ham, D. Bucur | Published: 2021-07-23 Malware ClassificationRole of Machine LearningEvaluation Method 2021.07.23 2025.05.28 Literature Database
Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification Authors: Erwin Quiring, Lukas Pirch, Michael Reimsbach, Daniel Arp, Konrad Rieck | Published: 2020-10-19 PE Malware ClassificationBackdoor AttackMalware Classification 2020.10.19 2025.05.28 Literature Database
Generating End-to-End Adversarial Examples for Malware Classifiers Using Explainability Authors: Ishai Rosenberg, Shai Meir, Jonathan Berrebi, Ilay Gordon, Guillaume Sicard, Eli David | Published: 2020-09-28 | Updated: 2022-06-01 Malware ClassificationModel InterpretabilityAdversarial Example 2020.09.28 2025.05.28 Literature Database
Hardware-Assisted Detection of Firmware Attacks in Inverter-Based Cyberphysical Microgrids Authors: Abraham Peedikayil Kuruvila, Ioannis Zografopoulos, Kanad Basu, Charalambos Konstantinou | Published: 2020-09-16 | Updated: 2021-04-18 Hardware DesignMalware ClassificationVulnerability detection 2020.09.16 2025.05.28 Literature Database