Detecting Android Malware: From Neural Embeddings to Hands-On Validation with BERTroid Authors: Meryam Chaieb, Mostafa Anouar Ghorab, Mohamed Aymen Saied | Published: 2024-05-06 | Updated: 2024-08-12 Security AnalysisMalware ClassificationModel Performance Evaluation 2024.05.06 2025.05.27 Literature Database
Online Clustering of Known and Emerging Malware Families Authors: Olha Jurečková, Martin Jureček, Mark Stamp | Published: 2024-05-06 Online LearningClustering methodsMalware Classification 2024.05.06 2025.05.27 Literature Database
Explainable Malware Detection with Tailored Logic Explained Networks Authors: Peter Anthony, Francesco Giannini, Michelangelo Diligenti, Martin Homola, Marco Gori, Stefan Balogh, Jan Mojzis | Published: 2024-05-05 Malware ClassificationModel InterpretabilityEvaluation Method 2024.05.05 2025.05.27 Literature Database
Updating Windows Malware Detectors: Balancing Robustness and Regression against Adversarial EXEmples Authors: Matous Kozak, Luca Demetrio, Dmitrijs Trizna, Fabio Roli | Published: 2024-05-04 Malware ClassificationAdversarial ExampleAdversarial Training 2024.05.04 2025.05.27 Literature Database
Explainability Guided Adversarial Evasion Attacks on Malware Detectors Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Moustafa Saleh | Published: 2024-05-02 WatermarkingMalware ClassificationModel Interpretability 2024.05.02 2025.05.27 Literature Database
Empowering Malware Detection Efficiency within Processing-in-Memory Architecture Authors: Sreenitha Kasarapu, Sathwika Bavikadi, Sai Manoj Pudukotai Dinakarrao | Published: 2024-04-12 WatermarkingMalware ClassificationComputational Efficiency 2024.04.12 2025.05.27 Literature Database
Case Study: Neural Network Malware Detection Verification for Feature and Image Datasets Authors: Preston K. Robinette, Diego Manzanas Lopez, Serena Serbinowska, Kevin Leach, Taylor T. Johnson | Published: 2024-04-08 WatermarkingMalware ClassificationEvaluation Method 2024.04.08 2025.05.27 Literature Database
Obfuscated Malware Detection: Investigating Real-world Scenarios through Memory Analysis Authors: S M Rakib Hasan, Aakar Dhakal | Published: 2024-04-03 CybersecurityPrompt InjectionMalware Classification 2024.04.03 2025.05.27 Literature Database
Generative AI-Based Effective Malware Detection for Embedded Computing Systems Authors: Sreenitha Kasarapu, Sanket Shukla, Rakibul Hassan, Avesta Sasan, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao | Published: 2024-04-02 | Updated: 2024-04-12 Dataset GenerationMalware ClassificationMalware Detection with Limited Samples 2024.04.02 2025.05.27 Literature Database
Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models Versus Fine-Tuned Vision Transformers in Image-Based Security Applications Authors: Fouad Trad, Ali Chehab | Published: 2024-03-26 | Updated: 2024-06-10 Evolution of AIPrompt EngineeringMalware Classification 2024.03.26 2025.05.27 Literature Database