Picture for Zahra Pooranian

Zahra Pooranian

SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment

Add code
Apr 16, 2022
Figure 1 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Figure 2 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Figure 3 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Figure 4 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Viaarxiv icon

Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features

Add code
Aug 13, 2019
Figure 1 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Figure 2 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Figure 3 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Figure 4 for Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Viaarxiv icon

On Defending Against Label Flipping Attacks on Malware Detection Systems

Add code
Aug 13, 2019
Figure 1 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Figure 2 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Figure 3 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Figure 4 for On Defending Against Label Flipping Attacks on Malware Detection Systems
Viaarxiv icon