Android Malware Detection: an Eigenspace Analysis Approach

Authors: Suleiman Y. Yerima, Sakir Sezer, Igor Muttik | Published: 2016-07-27

Wavelet decomposition of software entropy reveals symptoms of malicious code

Authors: Michael Wojnowicz, Glenn Chisholm, Matt Wolff, Xuan Zhao | Published: 2016-07-18 | Updated: 2018-02-02

Adversarial examples in the physical world

Authors: Alexey Kurakin, Ian Goodfellow, Samy Bengio | Published: 2016-07-08 | Updated: 2017-02-11

Deciphering Malware’s use of TLS (without Decryption)

Authors: Blake Anderson, Subharthi Paul, David McGrew | Published: 2016-07-06

Bayesian Nonparametrics for Sparse Dynamic Networks

Authors: Cian Naik, Francois Caron, Judith Rousseau, Yee Whye Teh, Konstantina Palla | Published: 2016-07-06 | Updated: 2022-04-14

Deep Learning with Differential Privacy

Authors: Martín Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang | Published: 2016-07-01 | Updated: 2016-10-24

Adaptive and Scalable Android Malware Detection through Online Learning

Authors: Annamalai Narayanan, Liu Yang, Lihui Chen, Liu Jinliang | Published: 2016-06-23 | Updated: 2016-09-26

Efficient Attack Graph Analysis through Approximate Inference

Authors: Luis Muñoz-González, Daniele Sgandurra, Andrea Paudice, Emil C. Lupu | Published: 2016-06-22

An effective approach for classification of advanced malware with high accuracy

Authors: Ashu Sharma, Sanjay K. Sahay | Published: 2016-06-22

Adversarial Perturbations Against Deep Neural Networks for Malware Classification

Authors: Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, Patrick McDaniel | Published: 2016-06-14 | Updated: 2016-06-16