Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of adversarial attack and defense methods for malware classification in cyber security
Malware poses a severe threat to cyber security. Attackers use malware to achieve their
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …
Deep learning for android malware defenses: a systematic literature review
Malicious applications (particularly those targeting the Android platform) pose a serious
threat to developers and end-users. Numerous research efforts have been devoted to …
threat to developers and end-users. Numerous research efforts have been devoted to …
The role of machine learning in cybersecurity
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …
systems, and many domains already leverage the capabilities of ML. However, deployment …
GDroid: Android malware detection and classification with graph convolutional network
The dramatic increase in the number of malware poses a serious challenge to the Android
platform and makes it difficult for malware analysis. In this paper, we propose a novel …
platform and makes it difficult for malware analysis. In this paper, we propose a novel …
[PDF][PDF] Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation.
Concept drift is one of the most frustrating challenges for learning-based security
applications built on the closeworld assumption of identical distribution between training and …
applications built on the closeworld assumption of identical distribution between training and …
Continuous learning for android malware detection
Machine learning methods can detect Android malware with very high accuracy. However,
these classifiers have an Achilles heel, concept drift: they rapidly become out of date and …
these classifiers have an Achilles heel, concept drift: they rapidly become out of date and …
DTMIC: Deep transfer learning for malware image classification
In the ever-changing cyber threat landscape, evolving malware threats demand a new
technique for their detection. This paper puts forward a strategy for distinguishing malware …
technique for their detection. This paper puts forward a strategy for distinguishing malware …
Dynamic prototype network based on sample adaptation for few-shot malware detection
The continuous increase and spread of malware have caused immeasurable losses to
social enterprises and even the country, especially unknown malware. Most existing …
social enterprises and even the country, especially unknown malware. Most existing …
[HTML][HTML] Kronodroid: Time-based hybrid-featured dataset for effective android malware detection and characterization
Android malware evolution has been neglected by the available data sets, thus providing a
static snapshot of a non-stationary phenomenon. The impact of the time variable has not had …
static snapshot of a non-stationary phenomenon. The impact of the time variable has not had …
Cruparamer: Learning on parameter-augmented api sequences for malware detection
Learning on execution behaviour, ie, sequences of API calls, is proven to be effective in
malware detection. In this paper, we present CruParamer, a deep neural network based …
malware detection. In this paper, we present CruParamer, a deep neural network based …