Malware Detection Method

The Curious Case of Machine Learning In Malware Detection

Authors: Sherif Saad, William Briguglio, Haytham Elmiligi | Published: 2019-05-18
Malware Detection Method
Information Security
Adaptive Retraining Mechanism

Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection

Authors: Adarsh Kyadige, Ethan M. Rudd, Konstantin Berlin | Published: 2019-05-16
Data Preprocessing
Malware Detection Method
Model Evaluation

Automatic Malware Description via Attribute Tagging and Similarity Embedding

Authors: Felipe N. Ducau, Ethan M. Rudd, Tad M. Heppner, Alex Long, Konstantin Berlin | Published: 2019-05-15 | Updated: 2020-01-23
Dataset Generation
Malware Detection Method
Model Evaluation

ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation

Authors: Ethan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, Richard Harang | Published: 2019-03-13
Data Curation
Malware Detection Method
Generalized Poisson Distribution

Adversarial Samples on Android Malware Detection Systems for IoT Systems

Authors: Xiaolei Liu, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Mohsen Guizani | Published: 2019-02-12
Malware Detection Method
Adversarial Attack Methods
Optimization Strategy

Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach

Authors: Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen | Published: 2019-02-11
Graph Construction
Malware Detection Method
Classification Pattern Analysis

Towards resilient machine learning for ransomware detection

Authors: Li Chen, Chih-Yuan Yang, Anindya Paul, Ravi Sahita | Published: 2018-12-21 | Updated: 2019-05-16
Backdoor Detection
Malware Detection Method
Generative Adversarial Network

Machine Learning in Cyber-Security – Problems, Challenges and Data Sets

Authors: Idan Amit, John Matherly, William Hewlett, Zhi Xu, Yinnon Meshi, Yigal Weinberger | Published: 2018-12-19 | Updated: 2019-04-22
Data Collection
Malware Detection Method
Information Security

Deep Transfer Learning for Static Malware Classification

Authors: Li Chen | Published: 2018-12-18
Malware Detection Method
Deep Learning
Deep Learning Model

Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification

Authors: Shen Wang, Zhengzhang Chen, Ding Li, Lu-An Tang, Jingchao Ni, Zhichun Li, Junghwan Rhee, Haifeng Chen, Philip S. Yu | Published: 2018-12-10 | Updated: 2019-05-09
Graph Embedding
Data Collection
Malware Detection Method