Enhancing the Insertion of NOP Instructions to Obfuscate Malware via Deep Reinforcement Learning Authors: Daniel Gibert, Matt Fredrikson, Carles Mateu, Jordi Planes, Quan Le | Published: 2021-11-18 Malware Detection MethodReinforcement LearningDeep Reinforcement Learning 2021.11.18 2025.05.28 Literature Database
Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges Authors: Rajasekhar Chaganti, Vinayakumar Ravi, Mamoun Alazab, Tuan D. Pham | Published: 2021-10-06 Steganography TechniquesMalware Detection MethodPerformance Evaluation 2021.10.06 2025.05.28 Literature Database
GANG-MAM: GAN based enGine for Modifying Android Malware Authors: Renjith G, Sonia Laudanna, Aji S, Corrado Aaron Visaggio, Vinod P | Published: 2021-09-27 Software SecurityMalware Detection MethodAdversarial attack 2021.09.27 2025.05.28 Literature Database
Attacks on Visualization-Based Malware Detection: Balancing Effectiveness and Executability Authors: Hadjer Benkraouda, Jingyu Qian, Hung Quoc Tran, Berkay Kaplan | Published: 2021-09-21 Malware Detection MethodAdversarial ExampleAdversarial attack 2021.09.21 2025.05.28 Literature Database
Detecting Attacks on IoT Devices using Featureless 1D-CNN Authors: Arshiya Khan, Chase Cotton | Published: 2021-09-09 Malware Detection MethodMachine LearningCommunication Analysis 2021.09.09 2025.05.28 Literature Database
Metamorphic Detection of Repackaged Malware Authors: Shirish Singh, Gail Kaiser | Published: 2021-04-27 Malware Detection MethodFeature InterdependenceFeature Extraction Method 2021.04.27 2025.05.28 Literature Database
Adversarial Robustness with Non-uniform Perturbations Authors: Ecenaz Erdemir, Jeffrey Bickford, Luca Melis, Sergul Aydore | Published: 2021-02-24 | Updated: 2021-10-29 Malware Detection MethodAdversarial ExampleAdversarial Example Detection 2021.02.24 2025.05.28 Literature Database
SK-Tree: a systematic malware detection algorithm on streaming trees via the signature kernel Authors: Thomas Cochrane, Peter Foster, Varun Chhabra, Maud Lemercier, Cristopher Salvi, Terry Lyons | Published: 2021-02-16 | Updated: 2021-09-29 WatermarkingMalware Detection MethodHierarchical Classification Methods 2021.02.16 2025.05.28 Literature Database
MalNet: A Large-Scale Image Database of Malicious Software Authors: Scott Freitas, Rahul Duggal, Duen Horng Chau | Published: 2021-01-31 | Updated: 2022-09-04 Data CollectionMalware Detection MethodDeep Transfer Learning 2021.01.31 2025.05.28 Literature Database
A Large-Scale Database for Graph Representation Learning Authors: Scott Freitas, Yuxiao Dong, Joshua Neil, Duen Horng Chau | Published: 2020-11-16 | Updated: 2021-11-07 Dataset GenerationPerformance EvaluationMalware Detection Method 2020.11.16 2025.05.28 Literature Database