Picture for Mohit Sewak

Mohit Sewak

Making Large Language Models Better Data Creators

Add code
Oct 31, 2023
Viaarxiv icon

Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review

Add code
Jun 06, 2022
Viaarxiv icon

LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach

Add code
Sep 23, 2021
Figure 1 for LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach
Figure 2 for LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach
Figure 3 for LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach
Figure 4 for LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach
Viaarxiv icon

ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator

Add code
Sep 23, 2021
Figure 1 for ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator
Figure 2 for ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator
Figure 3 for ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator
Figure 4 for ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator
Viaarxiv icon

DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems

Add code
Sep 12, 2021
Figure 1 for DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems
Figure 2 for DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems
Figure 3 for DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems
Figure 4 for DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems
Viaarxiv icon

Identification of Significant Permissions for Efficient Android Malware Detection

Add code
Feb 28, 2021
Figure 1 for Identification of Significant Permissions for Efficient Android Malware Detection
Figure 2 for Identification of Significant Permissions for Efficient Android Malware Detection
Figure 3 for Identification of Significant Permissions for Efficient Android Malware Detection
Figure 4 for Identification of Significant Permissions for Efficient Android Malware Detection
Viaarxiv icon

Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering

Add code
Feb 28, 2021
Figure 1 for Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering
Figure 2 for Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering
Figure 3 for Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering
Figure 4 for Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering
Viaarxiv icon

DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware

Add code
Feb 01, 2021
Figure 1 for DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware
Figure 2 for DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware
Figure 3 for DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware
Figure 4 for DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware
Viaarxiv icon

Robust Android Malware Detection System against Adversarial Attacks using Q-Learning

Add code
Jan 27, 2021
Figure 1 for Robust Android Malware Detection System against Adversarial Attacks using Q-Learning
Figure 2 for Robust Android Malware Detection System against Adversarial Attacks using Q-Learning
Figure 3 for Robust Android Malware Detection System against Adversarial Attacks using Q-Learning
Figure 4 for Robust Android Malware Detection System against Adversarial Attacks using Q-Learning
Viaarxiv icon

Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS

Add code
Dec 26, 2020
Figure 1 for Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS
Figure 2 for Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS
Figure 3 for Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS
Figure 4 for Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS
Viaarxiv icon