1 |
Kingma, Diederik P, and Max Welling, "Auto-encoding variational bayes", arXiv preprint arXiv:1312.6114, 2013. https://doi.org/10.18653/v1/2020.coling-main.458
|
2 |
Nataraj, Lakshmanan et al., "Malware images: visualization and automatic classification", Proceedings of the 8th international symposium on visualization for cyber security, 2011. https://doi.org/10.1145/2016904.2016908
DOI
|
3 |
Nataraj and B. S. Manjunath, "SPAM: Signal processing to analyze malware", arXiv, 2016. https://doi.org/10.1109/msp.2015.2507185
|
4 |
Chalapathy, Raghavendra, and Sanjay Chawla, "Deep learning for anomaly detection: A survey", arXiv preprint arXiv:1901.03407, 2019. https://arxiv.org/abs/1901.03407
|
5 |
Jin-Young Kim, Seok-Jun Bu, and Sung-Bae Cho, "Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders", Information Sciences 460, pp83-102, 2018. https://doi.org/10.1016/j.ins.2018.04.092
DOI
|
6 |
Jin-Young Kim, and Sung-Bae Cho, "Detecting intrusive malware with a hybrid generative deep learning model.", International Conference on Intelligent Data Engineering and Automated Learning. Springer, 2018. https://doi.org/10.1007/978-3-030-03493-1_52
DOI
|
7 |
Weiss, Karl, Taghi M. Khoshgoftaar, and DingDing Wang, "A survey of transfer learning.", Journal of Big data, 2016. https://doi.org/10.1186/s40537-016-0043-6
DOI
|
8 |
Bisong, Ekaba, "Google colaboratory", Building Machine Learning and Deep Learning Models on Google Cloud Platform. Apress, Berkeley, CA, 2019. https://doi.org/10.1007/978-1-4842-4470-8_7
|
9 |
Luo, Jhu-Sin, and Dan Chia-Tien Lo, "Binary malware image classification using machine learning with local binary pattern", IEEE International Conference on Big Data, IEEE, 2017. https://doi.org/10.1109/bigdata.2017.8258512
DOI
|
10 |
Gribbon, Kim T, and Donald G. Bailey, "A novel approach to real-time bilinear interpolation", Proceedings. DELTA 2004. Second IEEE International Workshop on Electronic Design, Test and Applications. IEEE, 2004. https://doi.org/10.1109/delta.2004.10055
DOI
|
11 |
Venkatraman, Sitalakshmi, Mamoun Alazab, and R. Vinayakumar, "A hybrid deep learning image-based analysis for effective malware detection", Journal of Information Security and Applications 47, 2019. https://doi.org/10.1016/j.jisa.2019.06.006
DOI
|
12 |
Moser, Andreas, Christopher Kruegel, and Engin Kirda, "Limits of static analysis for malware detection", Twenty-Third Annual Computer Security Applicaitons Conference IEEE, 2007. https://doi.org/10.1109/acsac.2007.21
DOI
|
13 |
Zhou, Xin, Jianmin Pang, and Guanghui Liang. "Image classification for malware detection using extremely randomized trees." 2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID). IEEE, 2017. https://doi.org/10.1109/icasid.2017.8285743
DOI
|
14 |
Vasan, Danish, et al. "IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture." Computer Networks 171, 2020. https://doi.org/10.1016/j.comnet.2020.107138
DOI
|
15 |
He, Kaiming, et al., "Deep residual learning for image recognition", Proceedings of the IEEE conference on computer vision and pattern recognition, 2016. https://doi.org/10.1109/cvpr.2016.90
DOI
|