Detection of Malicious Code Variants Based on Deep Learning
暂无分享,去创建一个
Jinjun Chen | Zhihua Cui | Yang Cao | Fei Xue | Xingjuan Cai | Gai-ge Wang | Xingjuan Cai | Fei Xue | Z. Cui | Jinjun Chen | Gai-ge Wang | Yang Cao
[1] Ayumu Kubota,et al. Kernel-based Behavior Analysis for Android Malware Detection , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.
[2] Albert Y. Zomaya,et al. Distribution Based Workload Modelling of Continuous Queries in Clouds , 2017, IEEE Transactions on Emerging Topics in Computing.
[3] InSeon Yoo,et al. Visualizing windows executable viruses using self-organizing maps , 2004, VizSEC/DMSEC '04.
[4] Yanan Du,et al. Quantum-inspired glowworm swarm optimisation and its application , 2017, Int. J. Comput. Sci. Math..
[5] Albert Y. Zomaya,et al. Particle Swarm Optimization based dictionary learning for remote sensing big data , 2015, Knowl. Based Syst..
[6] John R. Goodall,et al. Visual analysis of code security , 2010, VizSec '10.
[7] B. S. Manjunath,et al. Malware images: visualization and automatic classification , 2011, VizSec '11.
[8] Felix C. Freiling,et al. Visual analysis of malware behavior using treemaps and thread graphs , 2009, 2009 6th International Workshop on Visualization for Cyber Security.
[9] Eul Gyu Im,et al. Malware analysis method using visualization of binary files , 2013, RACS.
[10] Yu Xue,et al. Improved bat algorithm with optimal forage strategy and random disturbance strategy , 2016, Int. J. Bio Inspired Comput..
[11] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[12] Nathan S. Netanyahu,et al. DeepSign: Deep learning for automatic malware signature generation and classification , 2015, 2015 International Joint Conference on Neural Networks (IJCNN).
[13] Zhihua Cui,et al. Bat algorithm with triangle-flipping strategy for numerical optimization , 2017, International Journal of Machine Learning and Cybernetics.
[14] Daniel Díaz-Pernil,et al. Bio-inspired parallel computing of representative geometrical objects of holes of binary 2D-images , 2017, Int. J. Bio Inspired Comput..
[15] Jinjun Chen,et al. Optimal LEACH protocol with modified bat algorithm for big data sensing systems in Internet of Things , 2019, J. Parallel Distributed Comput..
[16] Zhifeng Xie,et al. General central firefly algorithm based on different learning time , 2017, Int. J. Comput. Sci. Math..
[17] Yu Xue,et al. A novel oriented cuckoo search algorithm to improve DV-Hop performance for cyber-physical systems , 2017, J. Parallel Distributed Comput..
[18] S. Sitharama Iyengar,et al. A Survey on Malware Detection Using Data Mining Techniques , 2017, ACM Comput. Surv..
[19] Vinod Yegneswaran,et al. A comparative assessment of malware classification using binary texture analysis and dynamic analysis , 2011, AISec '11.
[20] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[21] Jürgen Schmidhuber,et al. Deep learning in neural networks: An overview , 2014, Neural Networks.
[22] Rajiv Ranjan,et al. Elasticity management of Streaming Data Analytics Flows on clouds , 2017, J. Comput. Syst. Sci..
[23] Jinjun Chen,et al. High Performance Computing for Cyber Physical Social Systems by Using Evolutionary Multi-Objective Optimization Algorithm , 2020, IEEE Transactions on Emerging Topics in Computing.
[24] Xin-She Yang,et al. A New Metaheuristic Bat-Inspired Algorithm , 2010, NICSO.
[25] Yi-Ning Quan,et al. Remote sensing image fusion based on shearlet and genetic algorithm , 2017, Int. J. Bio Inspired Comput..
[26] Daniel A. Keim,et al. A Survey of Visualization Systems for Malware Analysis , 2015, EuroVis.
[27] Trevor Darrell,et al. Caffe: Convolutional Architecture for Fast Feature Embedding , 2014, ACM Multimedia.