ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1812.09400
  4. Cited By
Towards resilient machine learning for ransomware detection

Towards resilient machine learning for ransomware detection

21 December 2018
Li-Wei Chen
Chih-Yuan Yang
Anindya Paul
R. Sahita
    AAML
ArXivPDFHTML

Papers citing "Towards resilient machine learning for ransomware detection"

32 / 32 papers shown
Title
Deep Transfer Learning for Static Malware Classification
Deep Transfer Learning for Static Malware Classification
Li-Wei Chen
36
46
0
18 Dec 2018
Leveraging Machine Learning Techniques for Windows Ransomware Network
  Traffic Detection
Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection
O. Alhawi
James Baldwin
Ali Dehghantanha
29
136
0
27 Jul 2018
Emulating malware authors for proactive protection using GANs over a
  distributed image visualization of dynamic file behavior
Emulating malware authors for proactive protection using GANs over a distributed image visualization of dynamic file behavior
Vineeth S. Bhaskara
D. Bhattacharyya
AAML
28
8
0
19 Jul 2018
Black-box Adversarial Attacks with Limited Queries and Information
Black-box Adversarial Attacks with Limited Queries and Information
Andrew Ilyas
Logan Engstrom
Anish Athalye
Jessy Lin
MLAU
AAML
160
1,198
0
23 Apr 2018
Adversarial Logit Pairing
Adversarial Logit Pairing
Harini Kannan
Alexey Kurakin
Ian Goodfellow
AAML
95
628
0
16 Mar 2018
Shield: Fast, Practical Defense and Vaccination for Deep Learning using
  JPEG Compression
Shield: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Nilaksh Das
Madhuri Shanbhogue
Shang-Tse Chen
Fred Hohman
Siwei Li
Li-Wei Chen
Michael E. Kounavis
Duen Horng Chau
FedML
AAML
69
227
0
19 Feb 2018
Deep Learning for Malicious Flow Detection
Deep Learning for Malicious Flow Detection
Yun-Chun Chen
Yu-Jhe Li
Aragorn Tseng
Tsungnan Lin
AAML
38
38
0
09 Feb 2018
Generating Adversarial Examples with Adversarial Networks
Generating Adversarial Examples with Adversarial Networks
Chaowei Xiao
Yue Liu
Jun-Yan Zhu
Warren He
M. Liu
D. Song
GAN
AAML
115
896
0
08 Jan 2018
HeNet: A Deep Learning Approach on Intel$^\circledR$ Processor Trace for
  Effective Exploit Detection
HeNet: A Deep Learning Approach on Intel®^\circledR® Processor Trace for Effective Exploit Detection
Li-Wei Chen
Salmin Sultana
R. Sahita
44
41
0
08 Jan 2018
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Nicholas Carlini
D. Wagner
AAML
91
1,077
0
05 Jan 2018
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
Battista Biggio
Fabio Roli
AAML
106
1,407
0
08 Dec 2017
Towards Deep Learning Models Resistant to Adversarial Attacks
Towards Deep Learning Models Resistant to Adversarial Attacks
Aleksander Madry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
SILM
OOD
277
12,029
0
19 Jun 2017
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection
  Methods
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods
Nicholas Carlini
D. Wagner
AAML
118
1,854
0
20 May 2017
Keeping the Bad Guys Out: Protecting and Vaccinating Deep Learning with
  JPEG Compression
Keeping the Bad Guys Out: Protecting and Vaccinating Deep Learning with JPEG Compression
Nilaksh Das
Madhuri Shanbhogue
Shang-Tse Chen
Fred Hohman
Li-Wei Chen
Michael E. Kounavis
Duen Horng Chau
AAML
58
305
0
08 May 2017
Semi-supervised classification for dynamic Android malware detection
Semi-supervised classification for dynamic Android malware detection
Li-Wei Chen
Mingwei Zhang
Chih-Yuan Yang
R. Sahita
AAML
27
27
0
19 Apr 2017
Feature Squeezing: Detecting Adversarial Examples in Deep Neural
  Networks
Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks
Weilin Xu
David Evans
Yanjun Qi
AAML
72
1,260
0
04 Apr 2017
Wasserstein GAN
Wasserstein GAN
Martín Arjovsky
Soumith Chintala
Léon Bottou
GAN
166
4,825
0
26 Jan 2017
Software-Defined Networking-based Crypto Ransomware Detection Using HTTP
  Traffic Characteristics
Software-Defined Networking-based Crypto Ransomware Detection Using HTTP Traffic Characteristics
Krzysztof Cabaj
Marcin Gregorczyk
W. Mazurczyk
20
153
0
24 Nov 2016
Conditional Image Synthesis With Auxiliary Classifier GANs
Conditional Image Synthesis With Auxiliary Classifier GANs
Augustus Odena
C. Olah
Jonathon Shlens
GAN
415
3,209
0
30 Oct 2016
DeepDGA: Adversarially-Tuned Domain Generation and Detection
DeepDGA: Adversarially-Tuned Domain Generation and Detection
Hyrum S. Anderson
Jonathan Woodbridge
Bobby Filar
AAML
58
198
0
06 Oct 2016
Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use
  for Detection
Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection
D. Sgandurra
Luis Muñoz-González
Rabih Mohsen
Emil C. Lupu
47
268
0
10 Sep 2016
Towards Evaluating the Robustness of Neural Networks
Towards Evaluating the Robustness of Neural Networks
Nicholas Carlini
D. Wagner
OOD
AAML
237
8,548
0
16 Aug 2016
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
517
5,893
0
08 Jul 2016
XGBoost: A Scalable Tree Boosting System
XGBoost: A Scalable Tree Boosting System
Tianqi Chen
Carlos Guestrin
681
38,735
0
09 Mar 2016
The Limitations of Deep Learning in Adversarial Settings
The Limitations of Deep Learning in Adversarial Settings
Nicolas Papernot
Patrick McDaniel
S. Jha
Matt Fredrikson
Z. Berkay Celik
A. Swami
AAML
88
3,955
0
24 Nov 2015
Unsupervised Representation Learning with Deep Convolutional Generative
  Adversarial Networks
Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks
Alec Radford
Luke Metz
Soumith Chintala
GAN
OOD
243
13,989
0
19 Nov 2015
DeepFool: a simple and accurate method to fool deep neural networks
DeepFool: a simple and accurate method to fool deep neural networks
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
P. Frossard
AAML
131
4,886
0
14 Nov 2015
Deep Generative Image Models using a Laplacian Pyramid of Adversarial
  Networks
Deep Generative Image Models using a Laplacian Pyramid of Adversarial Networks
Emily L. Denton
Soumith Chintala
Arthur Szlam
Rob Fergus
GAN
90
2,241
0
18 Jun 2015
Explaining and Harnessing Adversarial Examples
Explaining and Harnessing Adversarial Examples
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAML
GAN
241
19,017
0
20 Dec 2014
Conditional Generative Adversarial Nets
Conditional Generative Adversarial Nets
M. Berk Mirza
Simon Osindero
GAN
SyDa
AI4CE
248
10,394
0
06 Nov 2014
Convolutional Neural Networks for Sentence Classification
Convolutional Neural Networks for Sentence Classification
Yoon Kim
AILaw
VLM
605
13,416
0
25 Aug 2014
Intriguing properties of neural networks
Intriguing properties of neural networks
Christian Szegedy
Wojciech Zaremba
Ilya Sutskever
Joan Bruna
D. Erhan
Ian Goodfellow
Rob Fergus
AAML
247
14,893
1
21 Dec 2013
1