Adversarial examples: Attacks and defenses for deep learning
With rapid progress and significant successes in a wide spectrum of applications, deep
learning is being applied in many safety-critical environments. However, deep neural …
learning is being applied in many safety-critical environments. However, deep neural …
Does every second count? time-based evolution of malware behavior in sandboxes
The amount of time in which a sample is executed is one of the key parameters of a malware
analysis sandbox. Setting the threshold too high hinders the scalability and reduces the …
analysis sandbox. Setting the threshold too high hinders the scalability and reduces the …
Multimodal dual-embedding networks for malware open-set recognition
Malware open-set recognition (MOSR) is an emerging research domain that aims at jointly
classifying malware samples from known families and detecting the ones from novel …
classifying malware samples from known families and detecting the ones from novel …
MDHE: A malware detection system based on trust hybrid user-edge evaluation in IoT network
X Deng, H Tang, X Pei, D Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the coming of the Internet of Things (IoT) era, malware attacks targeting IoT networks
have posed serious threats to users. Recently, the emerging of edge computing have paved …
have posed serious threats to users. Recently, the emerging of edge computing have paved …
[HTML][HTML] AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks
The widespread usage of Android-powered devices in the Internet of Things (IoT) makes
them susceptible to evolving cybersecurity threats. Most healthcare devices in IoT networks …
them susceptible to evolving cybersecurity threats. Most healthcare devices in IoT networks …
Fuzzing and Symbolic Execution for Multipath Malware Tracing: Bridging Theory and Practice via Survey and Experiments
M Botacin - Digital Threats: Research and Practice, 2024 - dl.acm.org
In real life, distinct runs of the same artifact lead to the exploration of different paths, due to
either system's natural randomness or malicious constructions. These variations might …
either system's natural randomness or malicious constructions. These variations might …
Statistical learning for semantic parsing: A survey
A long-term goal of Artificial Intelligence (AI) is to provide machines with the capability of
understanding natural language. Understanding natural language may be referred as the …
understanding natural language. Understanding natural language may be referred as the …
A praise for defensive programming: Leveraging uncertainty for effective malware mitigation
A promising avenue for improving the effectiveness of behavioral-based malware detectors
is to leverage two-phase detection mechanisms. Existing problem in two-phase detection is …
is to leverage two-phase detection mechanisms. Existing problem in two-phase detection is …
AdaTrans: An adaptive transformer for IoT Malware detection based on sensitive API call graph and inter-component communication analysis
F Pi, S Tian, X Pei, P Chen, X Wang… - Journal of Intelligent & …, 2023 - content.iospress.com
With the development of the Internet of Things (IoT), mobile devices are playing an
increasingly important role in our daily lives. There are various malware threats present in …
increasingly important role in our daily lives. There are various malware threats present in …
[HTML][HTML] LEDA—Layered Event-Based Malware Detection Architecture
The rapid increase in new malware necessitates effective detection methods. While machine
learning techniques have shown promise for malware detection, most research focuses on …
learning techniques have shown promise for malware detection, most research focuses on …