A comprehensive survey on deep learning based malware detection techniques

M Gopinath, SC Sethuraman - Computer Science Review, 2023 - Elsevier
Recent theoretical and practical studies have revealed that malware is one of the most
harmful threats to the digital world. Malware mitigation techniques have evolved over the …

[HTML][HTML] The rise of machine learning for detection and classification of malware: Research developments, trends and challenges

D Gibert, C Mateu, J Planes - Journal of Network and Computer …, 2020 - Elsevier
The struggle between security analysts and malware developers is a never-ending battle
with the complexity of malware changing as quickly as innovation grows. Current state-of-the …

Towards evaluating the robustness of neural networks

N Carlini, D Wagner - 2017 ieee symposium on security and …, 2017 - ieeexplore.ieee.org
Neural networks provide state-of-the-art results for most machine learning tasks.
Unfortunately, neural networks are vulnerable to adversarial examples: given an input x and …

Adversarial examples: Attacks and defenses for deep learning

X Yuan, P He, Q Zhu, X Li - IEEE transactions on neural …, 2019 - ieeexplore.ieee.org
With rapid progress and significant successes in a wide spectrum of applications, deep
learning is being applied in many safety-critical environments. However, deep neural …

The limitations of deep learning in adversarial settings

N Papernot, P McDaniel, S Jha… - 2016 IEEE European …, 2016 - ieeexplore.ieee.org
Deep learning takes advantage of large datasets and computationally efficient training
algorithms to outperform other approaches at various machine learning tasks. However …

Distillation as a defense to adversarial perturbations against deep neural networks

N Papernot, P McDaniel, X Wu, S Jha… - 2016 IEEE symposium …, 2016 - ieeexplore.ieee.org
Deep learning algorithms have been shown to perform extremely well on many classical
machine learning problems. However, recent studies have shown that deep learning, like …

Targeted backdoor attacks on deep learning systems using data poisoning

X Chen, C Liu, B Li, K Lu, D Song - arxiv preprint arxiv:1712.05526, 2017 - arxiv.org
Deep learning models have achieved high performance on many tasks, and thus have been
applied to many security-critical scenarios. For example, deep learning-based face …

Deep learning: methods and applications

L Deng, D Yu - Foundations and trends® in signal processing, 2014 - nowpublishers.com
This monograph provides an overview of general deep learning methodology and its
applications to a variety of signal and information processing tasks. The application areas …

A comprehensive review on malware detection approaches

ÖA Aslan, R Samet - IEEE access, 2020 - ieeexplore.ieee.org
According to the recent studies, malicious software (malware) is increasing at an alarming
rate, and some malware can hide in the system by using different obfuscation techniques. In …

Adversarial attacks on deep-learning models in natural language processing: A survey

WE Zhang, QZ Sheng, A Alhazmi, C Li - ACM Transactions on Intelligent …, 2020 - dl.acm.org
With the development of high computational devices, deep neural networks (DNNs), in
recent years, have gained significant popularity in many Artificial Intelligence (AI) …