Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation
Many current malware detection methods are based on supervised learning techniques,
which however have certain limitations. First, these techniques require a large amount of …
which however have certain limitations. First, these techniques require a large amount of …
Boosting neural networks to decompile optimized binaries
Decompilation aims to transform a low-level program language (LPL)(eg., binary file) into its
functionally-equivalent high-level program language (HPL)(eg, C/C++). It is a core …
functionally-equivalent high-level program language (HPL)(eg, C/C++). It is a core …
PackGenome: Automatically generating robust YARA rules for accurate malware packer detection
Binary packing, a widely-used program obfuscation style, compresses or encrypts the
original program and then recovers it at runtime. Packed malware samples are pervasive …
original program and then recovers it at runtime. Packed malware samples are pervasive …
Finer: Enhancing state-of-the-art classifiers with feature attribution to facilitate security analysis
Deep learning classifiers achieve state-of-the-art performance in various risk detection
applications. They explore rich semantic representations and are supposed to automatically …
applications. They explore rich semantic representations and are supposed to automatically …
Risk-aware and explainable framework for ensuring guaranteed coverage in evolving hardware trojan detection
As the semiconductor industry has shifted to a fabless paradigm, the risk of hardware
Trojans being inserted at various stages of production has also increased. Recently, there …
Trojans being inserted at various stages of production has also increased. Recently, there …
An empirical comparison on the results of different clone detection setups for c-based projects
Code clones have been used in many different software maintenance and evaluation tasks
in practice (eg, change proportion and evolution, refactoring, and vulnerability …
in practice (eg, change proportion and evolution, refactoring, and vulnerability …
PowerDetector: Malicious PowerShell script family classification based on multi-modal semantic fusion and deep learning
X Yang, G Peng, D Zhang, Y Gao… - China Communications, 2023 - ieeexplore.ieee.org
PowerShell has been widely deployed in fileless malware and advanced persistent threat
(APT) attacks due to its high stealthiness and live-off-the-land technique. However, existing …
(APT) attacks due to its high stealthiness and live-off-the-land technique. However, existing …
SeqNet: An efficient neural network for automatic malware detection
J Xu, W Fu, H Bu, Z Wang, L Ying - arxiv preprint arxiv:2205.03850, 2022 - arxiv.org
Malware continues to evolve rapidly, and more than 450,000 new samples are captured
every day, which makes manual malware analysis impractical. However, existing deep …
every day, which makes manual malware analysis impractical. However, existing deep …
PromeTrans: Bootstrap binary functionality classification with knowledge transferred from pre-trained models
Pre-trained models have witnessed significant progress in nature language (including
source code) and binary code comprehension. However, none of them are suitable for …
source code) and binary code comprehension. However, none of them are suitable for …