Adversarial examples: Attacks and defenses for deep learning

X Yuan, P He, Q Zhu, X Li - IEEE transactions on neural …, 2019 - ieeexplore.ieee.org
With rapid progress and significant successes in a wide spectrum of applications, deep
learning is being applied in many safety-critical environments. However, deep neural …

Does every second count? time-based evolution of malware behavior in sandboxes

A Küchler, A Mantovani, Y Han, L Bilge… - NDSS 2021, Network …, 2021 - hal.science
The amount of time in which a sample is executed is one of the key parameters of a malware
analysis sandbox. Setting the threshold too high hinders the scalability and reduces the …

Multimodal dual-embedding networks for malware open-set recognition

J Guo, H Wang, Y Xu, W Xu, Y Zhan… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Malware open-set recognition (MOSR) is an emerging research domain that aims at jointly
classifying malware samples from known families and detecting the ones from novel …

MDHE: A malware detection system based on trust hybrid user-edge evaluation in IoT network

X Deng, H Tang, X Pei, D Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the coming of the Internet of Things (IoT) era, malware attacks targeting IoT networks
have posed serious threats to users. Recently, the emerging of edge computing have paved …

[HTML][HTML] AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks

F Nawshin, D Unal, M Hammoudeh, PN Suganthan - Ad Hoc Networks, 2024 - Elsevier
The widespread usage of Android-powered devices in the Internet of Things (IoT) makes
them susceptible to evolving cybersecurity threats. Most healthcare devices in IoT networks …

Fuzzing and Symbolic Execution for Multipath Malware Tracing: Bridging Theory and Practice via Survey and Experiments

M Botacin - Digital Threats: Research and Practice, 2024 - dl.acm.org
In real life, distinct runs of the same artifact lead to the exploration of different paths, due to
either system's natural randomness or malicious constructions. These variations might …

Statistical learning for semantic parsing: A survey

Q Zhu, X Ma, X Li - Big Data Mining and Analytics, 2019 - ieeexplore.ieee.org
A long-term goal of Artificial Intelligence (AI) is to provide machines with the capability of
understanding natural language. Understanding natural language may be referred as the …

A praise for defensive programming: Leveraging uncertainty for effective malware mitigation

R Sun, M Botacin, N Sapountzis, X Yuan… - … on Dependable and …, 2020 - ieeexplore.ieee.org
A promising avenue for improving the effectiveness of behavioral-based malware detectors
is to leverage two-phase detection mechanisms. Existing problem in two-phase detection is …

AdaTrans: An adaptive transformer for IoT Malware detection based on sensitive API call graph and inter-component communication analysis

F Pi, S Tian, X Pei, P Chen, X Wang… - Journal of Intelligent & …, 2023 - content.iospress.com
With the development of the Internet of Things (IoT), mobile devices are playing an
increasingly important role in our daily lives. There are various malware threats present in …

[HTML][HTML] LEDA—Layered Event-Based Malware Detection Architecture

RM Portase, RL Portase, A Colesa, G Sebestyen - Sensors, 2024 - mdpi.com
The rapid increase in new malware necessitates effective detection methods. While machine
learning techniques have shown promise for malware detection, most research focuses on …