Attacks on Visualization-Based Malware Detection: Balancing Effectiveness and Executability Authors: Hadjer Benkraouda, Jingyu Qian, Hung Quoc Tran, Berkay Kaplan | Published: 2021-09-21 Malware Detection MethodAdversarial ExampleAdversarial attack 2021.09.21 2025.05.28 Literature Database
Detecting Attacks on IoT Devices using Featureless 1D-CNN Authors: Arshiya Khan, Chase Cotton | Published: 2021-09-09 Malware Detection MethodMachine LearningCommunication Analysis 2021.09.09 2025.05.28 Literature Database
Metamorphic Detection of Repackaged Malware Authors: Shirish Singh, Gail Kaiser | Published: 2021-04-27 Malware Detection MethodFeature InterdependenceFeature Extraction Method 2021.04.27 2025.05.28 Literature Database
Adversarial Robustness with Non-uniform Perturbations Authors: Ecenaz Erdemir, Jeffrey Bickford, Luca Melis, Sergul Aydore | Published: 2021-02-24 | Updated: 2021-10-29 Malware Detection MethodAdversarial ExampleAdversarial Example Detection 2021.02.24 2025.05.28 Literature Database
SK-Tree: a systematic malware detection algorithm on streaming trees via the signature kernel Authors: Thomas Cochrane, Peter Foster, Varun Chhabra, Maud Lemercier, Cristopher Salvi, Terry Lyons | Published: 2021-02-16 | Updated: 2021-09-29 WatermarkingMalware Detection MethodHierarchical Classification Methods 2021.02.16 2025.05.28 Literature Database
MalNet: A Large-Scale Image Database of Malicious Software Authors: Scott Freitas, Rahul Duggal, Duen Horng Chau | Published: 2021-01-31 | Updated: 2022-09-04 Data CollectionMalware Detection MethodDeep Transfer Learning 2021.01.31 2025.05.28 Literature Database
A Large-Scale Database for Graph Representation Learning Authors: Scott Freitas, Yuxiao Dong, Joshua Neil, Duen Horng Chau | Published: 2020-11-16 | Updated: 2021-11-07 Dataset GenerationPerformance EvaluationMalware Detection Method 2020.11.16 2025.05.28 Literature Database
Feature importance in mobile malware detection Authors: Vasileios Kouliaridis, Georgios Kambourakis, Tao Peng | Published: 2020-07-27 | Updated: 2020-08-28 Dataset AnalysisMalware Detection MethodFeature Importance Analysis 2020.07.27 2025.05.28 Literature Database
A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification Authors: Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen | Published: 2020-05-14 | Updated: 2020-05-15 Graph Representation LearningMalware Detection MethodDeep Learning Technology 2020.05.14 2025.05.28 Literature Database
Botnet Detection Using Recurrent Variational Autoencoder Authors: Jeeyung Kim, Alex Sim, Jinoh Kim, Kesheng Wu | Published: 2020-04-01 Malware Detection MethodMachine Learning ApplicationGenerative Model 2020.04.01 2025.05.28 Literature Database