Malware classification with recurrent networks
暂无分享,去创建一个
Razvan Pascanu | Jack W. Stokes | Hermineh Sanossian | Anil Thomas | Mady Marinescu | Razvan Pascanu | J. W. Stokes | H. Sanossian | M. Marinescu | Anil Thomas
[1] Jeffrey O. Kephart,et al. A biologically inspired immune system for computers , 1994 .
[2] Yoshua Bengio,et al. Learning long-term dependencies with gradient descent is difficult , 1994, IEEE Trans. Neural Networks.
[3] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[4] Kuldip K. Paliwal,et al. Bidirectional recurrent neural networks , 1997, IEEE Trans. Signal Process..
[5] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[6] Herbert Jaeger,et al. The''echo state''approach to analysing and training recurrent neural networks , 2001 .
[7] Harald Haas,et al. Harnessing Nonlinearity: Predicting Chaotic Systems and Saving Energy in Wireless Communication , 2004, Science.
[8] Christopher Krügel,et al. Behavior-based Spyware Detection , 2006, USENIX Security Symposium.
[9] Marcus A. Maloof,et al. Learning to Detect and Classify Malicious Executables in the Wild , 2006, J. Mach. Learn. Res..
[10] S. Jha,et al. Mining specifications of malicious behavior , 2007, ESEC-FSE '07.
[11] Aditya P. Mathur,et al. A Survey of Malware Detection Techniques , 2007 .
[12] Muddassar Farooq,et al. IMAD: in-execution malware analysis and detection , 2009, GECCO.
[13] Hazem M. El-Bakry,et al. Fast virus detection by using high speed time delay neural networks , 2009, Journal in Computer Virology.
[14] Sven Behnke,et al. Evaluation of Pooling Operations in Convolutional Architectures for Object Recognition , 2010, ICANN.
[15] Lukás Burget,et al. Recurrent neural network based language model , 2010, INTERSPEECH.
[16] Fahad Bin Muhaya,et al. Polymorphic Malware Detection Using Hierarchical Hidden Markov Model , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[17] Yoshua Bengio,et al. Deep Sparse Rectifier Neural Networks , 2011, AISTATS.
[18] Nitish Srivastava,et al. Improving neural networks by preventing co-adaptation of feature detectors , 2012, ArXiv.
[19] Nikos Karampatziakis,et al. Using File Relationships in Malware Classification , 2012, DIMVA.
[20] Geoffrey E. Hinton,et al. Speech recognition with deep recurrent neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[21] Jack W. Stokes,et al. Large-scale malware classification using random projections and neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[22] Razvan Pascanu,et al. On the difficulty of training recurrent neural networks , 2012, ICML.
[23] Alex Graves,et al. Generating Sequences With Recurrent Neural Networks , 2013, ArXiv.
[24] Geoffrey E. Hinton,et al. On the importance of initialization and momentum in deep learning , 2013, ICML.
[25] Razvan Pascanu,et al. Advances in optimizing recurrent networks , 2012, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.