Picture for Viliam Lisy

Viliam Lisy

Counteracting Concept Drift by Learning with Future Malware Predictions

Add code
Apr 14, 2024
Viaarxiv icon

Avast-CTU Public CAPE Dataset

Add code
Sep 06, 2022
Figure 1 for Avast-CTU Public CAPE Dataset
Figure 2 for Avast-CTU Public CAPE Dataset
Figure 3 for Avast-CTU Public CAPE Dataset
Figure 4 for Avast-CTU Public CAPE Dataset
Viaarxiv icon

Improving Robustness of Malware Classifiers using Adversarial Strings Generated from Perturbed Latent Representations

Add code
Oct 22, 2021
Figure 1 for Improving Robustness of Malware Classifiers using Adversarial Strings Generated from Perturbed Latent Representations
Figure 2 for Improving Robustness of Malware Classifiers using Adversarial Strings Generated from Perturbed Latent Representations
Figure 3 for Improving Robustness of Malware Classifiers using Adversarial Strings Generated from Perturbed Latent Representations
Figure 4 for Improving Robustness of Malware Classifiers using Adversarial Strings Generated from Perturbed Latent Representations
Viaarxiv icon

Mill.jl and JsonGrinder.jl: automated differentiable feature extraction for learning from raw JSON data

Add code
May 19, 2021
Figure 1 for Mill.jl and JsonGrinder.jl: automated differentiable feature extraction for learning from raw JSON data
Figure 2 for Mill.jl and JsonGrinder.jl: automated differentiable feature extraction for learning from raw JSON data
Viaarxiv icon

Multi-agent Reinforcement Learning in OpenSpiel: A Reproduction Report

Add code
Mar 02, 2021
Figure 1 for Multi-agent Reinforcement Learning in OpenSpiel: A Reproduction Report
Figure 2 for Multi-agent Reinforcement Learning in OpenSpiel: A Reproduction Report
Figure 3 for Multi-agent Reinforcement Learning in OpenSpiel: A Reproduction Report
Figure 4 for Multi-agent Reinforcement Learning in OpenSpiel: A Reproduction Report
Viaarxiv icon

Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection

Add code
Apr 22, 2020
Figure 1 for Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection
Figure 2 for Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection
Figure 3 for Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection
Figure 4 for Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection
Viaarxiv icon