BEACON: Behavioral Malware Classification with Large Language Model Embeddings and Deep Learning Authors: Wadduwage Shanika Perera, Haodi Jiang | Published: 2025-09-18 Malware Detection ScenarioBehavior Analysis MethodEvaluation Method 2025.09.18 2025.09.20 Literature Database
Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features Authors: Kunal Mukherjee, Joshua Wiedemeier, Tianhao Wang, Muhyun Kim, Feng Chen, Murat Kantarcioglu, Kangkook Jee | Published: 2023-06-01 | Updated: 2025-09-22 Security AnalysisMalware Detection Scenario評価メトリクス 2023.06.01 2025.09.24 Literature Database
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection Authors: Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli | Published: 2017-04-28 PoisoningMalware Detection ScenarioModel Extraction Attack 2017.04.28 2025.05.28 Literature Database