Adversarial training methods for deep learning: A systematic review

W Zhao, S Alwidian, QH Mahmoud - Algorithms, 2022 - mdpi.com
Deep neural networks are exposed to the risk of adversarial attacks via the fast gradient sign
method (FGSM), projected gradient descent (PGD) attacks, and other attack algorithms …

Adversarial machine learning: A multilayer review of the state-of-the-art and challenges for wireless and mobile systems

J Liu, M Nogueira, J Fernandes… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Machine Learning (ML) models are susceptible to adversarial samples that appear as
normal samples but have some imperceptible noise added to them with the intention of …

Deep learning for android malware defenses: a systematic literature review

Y Liu, C Tantithamthavorn, L Li, Y Liu - ACM Computing Surveys, 2022 - dl.acm.org
Malicious applications (particularly those targeting the Android platform) pose a serious
threat to developers and end-users. Numerous research efforts have been devoted to …

Robust malware defense in industrial IoT applications using machine learning with selective adversarial samples

ME Khoda, T Imam, J Kamruzzaman… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) deploys edge devices to act as intermediaries between
sensors and actuators and application servers or cloud services. Machine learning models …

[HTML][HTML] Robust malware detection models: learning from adversarial attacks and defenses

H Rathore, A Samavedhi, SK Sahay… - Forensic Science …, 2021 - Elsevier
The last decade witnessed an exponential growth of smartphones and their users, which
has drawn massive attention from malware designers. The current malware detection …

Malware detection in edge devices with fuzzy oversampling and dynamic class weighting

ME Khoda, J Kamruzzaman, I Gondal, T Imam… - Applied Soft …, 2021 - Elsevier
Abstract In Internet-of-things (IoT) domain, edge devices are used increasingly for data
accumulation, preprocessing, and analytics. Intelligent integration of edge devices with …

A study on adversarial sample resistance and Defense Mechanism for Multimodal Learning-based phishing website detection

PT Duy, VQ Minh, BTH Dang, NDH Son… - IEEE …, 2024 - ieeexplore.ieee.org
Recent advancements in Artificial Intelligence (AI) have greatly impacted cybersecurity,
particularly in detecting phishing websites. Traditional methods struggle to address evolving …

Androidgyny: Reviewing clustering techniques for Android malware family classification

TSR Pimenta, F Ceschin, A Gregio - Digital Threats: Research and …, 2024 - dl.acm.org
Thousands of malicious applications (apps) are created daily, modified with the aid of
automation tools, and released on the World Wide Web. Several techniques have been …

When the guard failed the droid: A case study of android malware

H Berger, C Hajaj, A Dvir - arxiv preprint arxiv:2003.14123, 2020 - arxiv.org
Android malware is a persistent threat to billions of users around the world. As a
countermeasure, Android malware detection systems are occasionally implemented …

An Efficient Feature Extraction Method For Static Malware Analysis Using PE Header Files

O Hossain, ST Dhruba, F Jalal - 2023 - 103.82.172.44
Detecting malware is crucial for safeguarding various devices, ranging from per sonal
computers to large-scale systems, because computer systems continue to face serious …