ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2006.16545
  4. Cited By
Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware
  Detection

Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection

30 June 2020
Deqiang Li
Qianmu Li
    AAML
ArXivPDFHTML

Papers citing "Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection"

23 / 23 papers shown
Title
On the Security Risks of ML-based Malware Detection Systems: A Survey
On the Security Risks of ML-based Malware Detection Systems: A Survey
Ping He
Yuhao Mao
Changjiang Li
Lorenzo Cavallaro
Ting Wang
Shouling Ji
23
0
0
16 May 2025
Evaluating the Robustness of Adversarial Defenses in Malware Detection Systems
Evaluating the Robustness of Adversarial Defenses in Malware Detection Systems
Mostafa Jafari
Alireza Shameli-Sendi
AAML
31
0
0
14 May 2025
FCGHunter: Towards Evaluating Robustness of Graph-Based Android Malware Detection
FCGHunter: Towards Evaluating Robustness of Graph-Based Android Malware Detection
Shiwen Song
Xiaofei Xie
Ruitao Feng
Qi Guo
Sen Chen
AAML
50
0
0
28 Apr 2025
AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement
  Learning
AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning
Vasudev Gohil
Satwik Patnaik
D. Kalathil
Jeyavijayan Rajendran
AAML
45
3
0
21 Feb 2024
CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive
  Attackers for Security Applications
CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications
Hangsheng Zhang
Jiqiang Liu
Jinsong Dong
AAML
26
1
0
20 Jan 2024
Beyond Detection: Unveiling Fairness Vulnerabilities in Abusive Language
  Models
Beyond Detection: Unveiling Fairness Vulnerabilities in Abusive Language Models
Yueqing Liang
Lu Cheng
Ali Payani
Kai Shu
28
3
0
15 Nov 2023
Single-board Device Individual Authentication based on Hardware
  Performance and Autoencoder Transformer Models
Single-board Device Individual Authentication based on Hardware Performance and Autoencoder Transformer Models
Pedro Miguel Sánchez Sánchez
Alberto Huertas Celdrán
Gérome Bovet
Gregorio Martínez Pérez
31
1
0
14 Jun 2023
PAD: Towards Principled Adversarial Malware Detection Against Evasion
  Attacks
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
Deqiang Li
Shicheng Cui
Yun Li
Jia Xu
Fu Xiao
Shouhuai Xu
AAML
59
18
0
22 Feb 2023
A Transferable and Automatic Tuning of Deep Reinforcement Learning for
  Cost Effective Phishing Detection
A Transferable and Automatic Tuning of Deep Reinforcement Learning for Cost Effective Phishing Detection
Orel Lavie
A. Shabtai
Gilad Katz
AAML
OffRL
32
1
0
19 Sep 2022
Problem-Space Evasion Attacks in the Android OS: a Survey
Problem-Space Evasion Attacks in the Android OS: a Survey
Harel Berger
Chen Hajaj
A. Dvir
33
2
0
29 May 2022
Do You Think You Can Hold Me? The Real Challenge of Problem-Space
  Evasion Attacks
Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks
Harel Berger
A. Dvir
Chen Hajaj
Rony Ronen
AAML
31
3
0
09 May 2022
MaMaDroid2.0 -- The Holes of Control Flow Graphs
MaMaDroid2.0 -- The Holes of Control Flow Graphs
Harel Berger
Chen Hajaj
Enrico Mariconti
A. Dvir
38
4
0
28 Feb 2022
On the Detection of Adaptive Adversarial Attacks in Speaker Verification
  Systems
On the Detection of Adaptive Adversarial Attacks in Speaker Verification Systems
Zesheng Chen
AAML
24
8
0
11 Feb 2022
Attacking Deep Learning AI Hardware with Universal Adversarial
  Perturbation
Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation
Mehdi Sadi
B. M. S. Bahar Talukder
Kaniz Mishty
Md. Tauhidur Rahman
AAML
37
0
0
18 Nov 2021
EvadeDroid: A Practical Evasion Attack on Machine Learning for Black-box
  Android Malware Detection
EvadeDroid: A Practical Evasion Attack on Machine Learning for Black-box Android Malware Detection
Hamid Bostani
Veelasha Moonsamy
AAML
43
52
0
07 Oct 2021
Can We Leverage Predictive Uncertainty to Detect Dataset Shift and
  Adversarial Examples in Android Malware Detection?
Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Deqiang Li
Tian Qiu
Shuo Chen
Qianmu Li
Shouhuai Xu
AAML
80
12
0
20 Sep 2021
A methodology to identify identical single-board computers based on
  hardware behavior fingerprinting
A methodology to identify identical single-board computers based on hardware behavior fingerprinting
Pedro Miguel Sánchez Sánchez
José María Jorquera Valero
Alberto Huertas Celdrán
Gérome Bovet
M. Gil Pérez
Gregorio Martínez Pérez
22
10
0
15 Jun 2021
Metamorphic Detection of Repackaged Malware
Metamorphic Detection of Repackaged Malware
S. Singh
Gail E. Kaiser
24
8
0
27 Apr 2021
Deep Learning for Android Malware Defenses: a Systematic Literature
  Review
Deep Learning for Android Malware Defenses: a Systematic Literature Review
Yue Liu
Chakkrit Tantithamthavorn
Li Li
Yepang Liu
AAML
35
77
0
09 Mar 2021
Adversarial Robustness with Non-uniform Perturbations
Adversarial Robustness with Non-uniform Perturbations
Ece Naz Erdemir
Jeffrey Bickford
Luca Melis
Sergul Aydore
AAML
24
26
0
24 Feb 2021
A survey on practical adversarial examples for malware classifiers
A survey on practical adversarial examples for malware classifiers
Daniel Park
B. Yener
AAML
46
14
0
06 Nov 2020
Arms Race in Adversarial Malware Detection: A Survey
Arms Race in Adversarial Malware Detection: A Survey
Deqiang Li
Qianmu Li
Yanfang Ye
Shouhuai Xu
AAML
27
52
0
24 May 2020
Adversarial Machine Learning at Scale
Adversarial Machine Learning at Scale
Alexey Kurakin
Ian Goodfellow
Samy Bengio
AAML
314
3,115
0
04 Nov 2016
1