Explaining AI for Malware Detection: Analysis of Mechanisms of MalConv
暂无分享,去创建一个
[1] Joongheon Kim,et al. Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering , 2018, EAI Endorsed Trans. Security Safety.
[2] Konstantin Berlin,et al. Deep neural network based malware detection using two dimensional binary program features , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).
[3] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[4] Ming-Wei Chang,et al. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.
[5] Claudia Eckert,et al. Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).
[6] Dumitru Erhan,et al. Deep Neural Networks for Object Detection , 2013, NIPS.
[7] Hyrum S. Anderson,et al. EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models , 2018, ArXiv.
[8] Jon Barker,et al. Malware Detection by Eating a Whole EXE , 2017, AAAI Workshops.
[9] Fabio Roli,et al. Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries , 2019, ITASEC.
[10] Dumitru Erhan,et al. Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[11] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[12] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[13] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[14] Koushik Sen,et al. Symbolic execution for software testing: three decades later , 2013, CACM.
[15] Andrew McCallum,et al. Energy and Policy Considerations for Deep Learning in NLP , 2019, ACL.
[16] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[17] Ilya Sutskever,et al. Language Models are Unsupervised Multitask Learners , 2019 .
[18] Yoseba K. Penya,et al. N-grams-based File Signatures for Malware Detection , 2009, ICEIS.
[19] Juan Caballero,et al. The MALICIA dataset: identification and analysis of drive-by download operations , 2014, International Journal of Information Security.
[20] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[21] Scott E. Coull,et al. Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification , 2019, 2019 IEEE Security and Privacy Workshops (SPW).
[22] Marcus A. Maloof,et al. Learning to Detect and Classify Malicious Executables in the Wild , 2006, J. Mach. Learn. Res..
[23] Dragos Gavrilut,et al. Malware detection using machine learning , 2009, 2009 International Multiconference on Computer Science and Information Technology.
[24] Xiang Zhang,et al. Text Understanding from Scratch , 2015, ArXiv.
[25] Benny Pinkas,et al. Deceiving End-to-End Deep Learning Malware Detectors using Adversarial Examples , 2018, 1802.04528.
[26] Ricardo J. G. B. Campello,et al. Density-Based Clustering Based on Hierarchical Density Estimates , 2013, PAKDD.
[27] Carlo Luschi,et al. Revisiting Small Batch Training for Deep Neural Networks , 2018, ArXiv.
[28] Geoffrey E. Hinton,et al. Speech recognition with deep recurrent neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[29] Ankur Taly,et al. Axiomatic Attribution for Deep Networks , 2017, ICML.