1 |
Razvan,Pascanu, Jack W,Stokes, Hermineh Sanossian, Mady Marinescu, Anil Thomas, "Malware classification with recurrent networks." in Proceeding of the 2015 IEEE International Conference on Acoustics, Speech and Signal Processing, p. 1916, Queensland, Australia. Available: https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/pascanuIcassp2015.pdf, 2015
|
2 |
Jack W.Stokes, De.Wang, Mady Marinescu, Marc Marino,and Brian Bussone, "Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Classification Models." Journal of the Cryptography and Security, Available: https://arxiv.org/pdf/1712.05919, 2017.
|
3 |
Cho, Young-Bok, Woo,Sung-Hee, Lee, Sang-Ho and Han, Chang-Su, "CUDA based Medical Image High Speed Processing Algorithm," in Proceeding of the 2017 International Conference on Future Information Communication Engineering, vol 9, no.1, p. 213, Russia, 2017, Available: http://www.dbpia.co.kr/Journal/ArticleDetail/NODE07203503
|
4 |
Giambattista Parascandolo, Heikki Huttunen and Tuomas Virtanen, "Recurrent neural networks for polyphonic sound event detection in real life recordings", in Proceeding of the 2016 IEEE International Conference on Acoustics, Speech and Signal Processing, p. 6440, Shanghai, China, 2016, Available: https://arxiv.org/pdf/1604.00861
|
5 |
Cho,Young-Bok, Woo,Sung-Hee and Lee,Sang-Ho,"Security Issues Using Remote Medical Treatment in Health Care In formation," in Proceeding of the 2014 International Conference On Future Information & Communication Engineering, vol. 6, no. 1, p.193, 2014. Available: http://www.dbpia.co.kr/Journal/ArticleDetail/NODE07221599
|
6 |
Cho,Young-Bok, Woo,Sung-Hee and Lee,Sang-Hoo "Genetic lesion matching algorithm using medical image", Journal of the Korea Institute of Information and Communication Engineering, vol. 21, no.5.p.960, May 2017
DOI
|
7 |
Heaton,J.B,Polson,N.G and Witte,J.H "Deep learning for finance: deep portfolios." Journal of the Applied Stochastic Models in Business and Industry, vol. 33, no. 1, p.3, October 2016, Available: https://doi.org/10.1002/asmb.2209
DOI
|
8 |
Yoon,Hye-Jin, Kim,Chang-Sik, Kwahk Kee-Young,"Research Trends Investigation Using Text Mining Techniques: Focusing on Social Network Services", Journal of Digital Content Society(JDCS), Vol. 19, No. 3, March. 2018, Available: http://www.dbpia.co.kr/Journal/ArticleDetail/NODE07408880
|
9 |
Seok,Seon-Hee and Kim,Ho-Won "Visualized malware classification based-on convolutional neural network". Journal of the Korea Institute of Information Security and Cryptology, vol.26, no. 1, p.197, Available: http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2016_v26n1_197, Feb. 2016
DOI
|
10 |
Athiwaratkun,Ben, and Jack W, Stokes, "Malware classification with LSTM and GRU language models and a characterlevel CNN.", 2017, Available: https://www.microsoft.com/en-us/research/wp-content/uploads/2017/07/LstmGruCnnMalwareClassifier.pdf, 2017
|
11 |
A. Test, "Malware Statistics.", Available: https://www.av-test.org/en/s tatistics/malware//,2015. September, 2015.
|
12 |
Anderson,Hyrrum-S, Woodbridge,Jonathan and Filar,Bobby "DeepDGA: Adversarially-tuned domain generation and detection." In Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, p.13. Vienna, Austria, 2016, Available: https://arxiv.org/pdf/1610.01969
|