PDF-Malware: An Overview on Threats, Detection and Evasion Attacks Authors: Nicolas Fleury, Theo Dubrunquez, Ihsen Alouani | Published: 2021-07-27 Overview of PDF FormatPoisoningMalware Detection 2021.07.27 2025.05.28 Literature Database
Deep Learning for Android Malware Defenses: a Systematic Literature Review Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu | Published: 2021-03-09 | Updated: 2022-08-09 Malware DetectionDeep Learning MethodDefense Method 2021.03.09 2025.05.28 Literature Database
Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers Authors: Tzvika Shapira, David Berend, Ishai Rosenberg, Yang Liu, Asaf Shabtai, Yuval Elovici | Published: 2020-10-30 Backdoor AttackMalware DetectionContent Specialized for Toxicity Attacks 2020.10.30 2025.05.28 Literature Database
Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors Authors: Edward Raff, Bobby Filar, James Holt | Published: 2020-10-22 Malware DetectionMachine Learning MethodWeight Update Method 2020.10.22 2025.05.28 Literature Database
MAB-Malware: A Reinforcement Learning Framework for Attacking Static Malware Classifiers Authors: Wei Song, Xuezixiang Li, Sadia Afroz, Deepali Garg, Dmitry Kuznetsov, Heng Yin | Published: 2020-03-06 | Updated: 2021-04-29 Malware ClassificationMalware DetectionAdversarial Perturbation Techniques 2020.03.06 2025.05.28 Literature Database
Detection and Analysis of Drive-by Downloads and Malicious Websites Authors: Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, Monther Aldwairi | Published: 2020-02-19 | Updated: 2020-04-09 Malware DetectionInformation SecurityFeature Extraction Method 2020.02.19 2025.05.28 Literature Database
Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS Authors: Andrew McDole, Mahmoud Abdelsalam, Maanak Gupta, Sudip Mittal | Published: 2020-02-15 Training MethodMalware DetectionMachine Learning Algorithm 2020.02.15 2025.05.28 Literature Database
Feature-level Malware Obfuscation in Deep Learning Authors: Keith Dillon | Published: 2020-02-10 Malware ClassificationMalware Detection 2020.02.10 2025.05.28 Literature Database
CharBot: A Simple and Effective Method for Evading DGA Classifiers Authors: Jonathan Peck, Claire Nie, Raaghavi Sivaguru, Charles Grumer, Femi Olumofin, Bin Yu, Anderson Nascimento, Martine De Cock | Published: 2019-05-03 | Updated: 2019-05-30 Malware DetectionAdversarial Attack DetectionMachine Learning 2019.05.03 2025.05.28 Literature Database
To believe or not to believe: Validating explanation fidelity for dynamic malware analysis Authors: Li Chen, Carter Yagemann, Evan Downing | Published: 2019-04-30 Malware DetectionDeep Learning TechnologyImage Classification Interpretation 2019.04.30 2025.05.28 Literature Database