Leveraging Large Language Models to Detect npm Malicious Packages Authors: Nusrat Zahan, Philipp Burckhardt, Mikola Lysenko, Feross Aboukhadijeh, Laurie Williams | Published: 2024-03-18 | Updated: 2025-01-06 LLM Performance EvaluationPrompt InjectionMalware Classification 2024.03.18 2025.05.27 Literature Database
Semantic Data Representation for Explainable Windows Malware Detection Models Authors: Peter Švec, Štefan Balogh, Martin Homola, Ján Kľuka, Tomáš Bisták | Published: 2024-03-18 WatermarkingDataset GenerationMalware Classification 2024.03.18 2025.05.27 Literature Database
CBR — Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution Authors: Amir Lukach, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2024-03-17 Few-Shot LearningMalware ClassificationMethods for Dynamically Identifying New Classes 2024.03.17 2025.05.27 Literature Database
Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem Authors: Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Sediola Ruko, Briland Hitaj, Luigi V. Mancini, Fernando Perez-Cruz | Published: 2024-03-06 | Updated: 2025-05-13 Prompt InjectionMalware ClassificationFederated Learning 2024.03.06 2025.05.27 Literature Database
Catch’em all: Classification of Rare, Prominent, and Novel Malware Families Authors: Maksim E. Eren, Ryan Barron, Manish Bhattarai, Selma Wanna, Nicholas Solovyev, Kim Rasmussen, Boian S. Alexandrov, Charles Nicholas | Published: 2024-03-04 Class ImbalancePrompt InjectionMalware Classification 2024.03.04 2025.05.27 Literature Database
On the Role of Similarity in Detecting Masquerading Files Authors: Jonathan Oliver, Jue Mo, Susmit Yenkar, Raghav Batta, Sekhar Josyoula | Published: 2024-02-17 CybersecurityIntegration of Digital Signatures and Machine LearningMalware Classification 2024.02.17 2025.05.27 Literature Database
Unraveling the Key of Machine Learning Solutions for Android Malware Detection Authors: Jiahao Liu, Jun Zeng, Fabio Pierazzi, Lorenzo Cavallaro, Zhenkai Liang | Published: 2024-02-05 APK Characteristic AnalysisWatermarkingMalware Classification 2024.02.05 2025.05.27 Literature Database
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version) Authors: Zeliang Kan, Shae McFadden, Daniel Arp, Feargus Pendlebury, Roberto Jordaney, Johannes Kinder, Fabio Pierazzi, Lorenzo Cavallaro | Published: 2024-02-02 | Updated: 2025-04-09 BiasMalware ClassificationTime-Related Features 2024.02.02 2025.05.27 Literature Database
MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack Authors: Jiayi Hua, Kailong Wang, Meizhen Wang, Guangdong Bai, Xiapu Luo, Haoyu Wang | Published: 2024-01-05 Backdoor AttackMalware ClassificationModel Performance Evaluation 2024.01.05 2025.05.27 Literature Database
Malicious code detection in android: the role of sequence characteristics and disassembling methods Authors: Pinar G. Balikcioglu, Melih Sirlanci, Ozge A. Kucuk, Bulut Ulukapi, Ramazan K. Turkmen, Cengiz Acarturk | Published: 2023-12-02 LSTM Model Performance EvaluationWatermarkingMalware Classification 2023.12.02 2025.05.28 Literature Database