暂无分享,去创建一个
[1] Yoon Kim,et al. Convolutional Neural Networks for Sentence Classification , 2014, EMNLP.
[2] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[3] Xiang Zhang,et al. Character-level Convolutional Networks for Text Classification , 2015, NIPS.
[4] Alva Erwin,et al. Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection , 2010, 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies.
[5] Harris Drucker,et al. Learning algorithms for classification: A comparison on handwritten digit recognition , 1995 .
[6] Jonathan Baxter,et al. Learning internal representations , 1995, COLT '95.
[7] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[8] Vladlen Koltun,et al. Multi-Scale Context Aggregation by Dilated Convolutions , 2015, ICLR.
[9] Jian Sun,et al. Identity Mappings in Deep Residual Networks , 2016, ECCV.
[10] Yoshua Bengio,et al. Gradient Flow in Recurrent Nets: the Difficulty of Learning Long-Term Dependencies , 2001 .
[11] Bin Jiang,et al. MALICIOUS URL DETECTION BY DYNAMICALLY MINING PATTERNS WITHOUT PRE-DEFINED ELEMENTS , 2012 .
[12] Tara N. Sainath,et al. Convolutional, Long Short-Term Memory, fully connected Deep Neural Networks , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[13] Lawrence K. Saul,et al. Beyond blacklists: learning to detect malicious web sites from suspicious URLs , 2009, KDD.
[14] Salvatore J. Stolfo,et al. Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses , 2002, RAID.
[15] Youssef Iraqi,et al. Phishing Detection: A Literature Survey , 2013, IEEE Communications Surveys & Tutorials.
[16] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[17] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[18] Lawrence D. Jackel,et al. Backpropagation Applied to Handwritten Zip Code Recognition , 1989, Neural Computation.
[19] Wenyi Huang,et al. MtNet: A Multi-Task Neural Network for Dynamic Malware Classification , 2016, DIMVA.
[20] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[21] Alex Graves,et al. Neural Machine Translation in Linear Time , 2016, ArXiv.
[22] Alessandro Moschitti,et al. UNITN: Training Deep Convolutional Neural Network for Twitter Sentiment Classification , 2015, *SEMEVAL.
[23] Joris Pelemans,et al. Sparse non-negative matrix language modeling for skip-grams , 2015, INTERSPEECH.
[24] Brian D. Ondov,et al. Mash: fast genome and metagenome distance estimation using MinHash , 2015, Genome Biology.
[25] Lorrie Faith Cranor,et al. An Empirical Analysis of Phishing Blacklists , 2009, CEAS 2009.
[26] Dumitru Erhan,et al. Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[27] Cícero Nogueira dos Santos,et al. Deep Convolutional Neural Networks for Sentiment Analysis of Short Texts , 2014, COLING.
[28] David Slater,et al. Malicious Behavior Detection using Windows Audit Logs , 2015, AISec@CCS.