Papers
This page contains a list of papers that I have found interested or referenced. The papers are categorised by topic and author.
Note, also check out Paper Stack from dreadnode.io.
| Name | Category | Author |
|---|---|---|
| EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models | Machine Learning Malware Detection Dataset | Hyrum S. Anderson Phil Roth |
| Application of Artificial Intelligence in the Study of Fishing Vessel Behavior | Artificial Intelligence Fishing Vessel Behavior | Xin Cheng Fan Zhang Xinjun Chen Jintao Wang |
| Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art | Adversarial Attacks Malware Detection Survey | Xiang Ling Lingfei Wu Jiangyu Zhang Zhenqing Qu Wei Deng Xiang Chen Yaguan Qian Chunming Wu Shouling Ji Tianyue Luo Jingzheng Wu Yanjun Wu |
| Machine learning and deep learning | Machine Learning Deep Learning Fundamentals | Christian Janiesch Patrick Zschech Kai Heinrich |
| CRISP-DM Twenty Years Later: From Data Mining Processes to Data Science Trajectories | Data Mining Data Science Processes | Fernando Martínez-Plumed Lidia Contreras-Ochando Cèsar Ferri José Hernández-Orallo Meelis Kull Nicolas Lachich |
| DMME: Data mining methodology for engineering applications – a holistic extension to the CRISP-DM model | Data Mining Engineering Applications CRISP-DM | Steffen Huber Hajo Wiemer Dorothea Schneider Steffen Ihlenfeldt |
| A heuristic approach for detection of obfuscated malware | Heuristic Approach Obfuscated Malware Detection | S. Treadwell M. Zhou |
| A survey on heuristic malware detection techniques | Heuristic Malware Detection Survey | Z. Bazrafshan H. Hashemi S.M. Hazrati Fard A. Hamzeh |
| Identifying useful features for malware detection in the Ember dataset | Malware Detection Ember Dataset | Y. Oyama T. Miyashita H. Kokubo |
| A comprehensive review on malware detection approaches | Malware Detection Review | Ö. Aslan R. Samet |
| Retrieval-Augmented Generation for Knowledge-Intensive NLP Tasks | NLP Knowledge-Intensive Tasks Retrieval-Augmented Generation | Lewis, P. Perez, E. Piktus, A. Petroni, F. Karpukhin, V. Goyal, N. Küttler, H. Lewis, M. Yih, W. Rocktäschel, T. Riedel, S. Kiela, D. |
| Improving language understanding by generative pre-training | Language Understanding Generative Pre-training | Radford, A. Narasimhan, K. Salimans, T. Sutskever, I. |
| An application of multi-agent simulation to traffic behavior for evacuation in earthquake disaster | Multi-agent Simulation Traffic Behavior Evacuation Planning Disaster Management | Seiichi Kagaya Ken'etsu Uchida Toru Hagiwara |
| ReAct: Synergizing Reasoning and Acting in Language Models | Language Models Reasoning NLP AI Agents | Shunyu Yao Jeffrey Zhao Dian Yu Nan Du Izhak Shafran Karthik Narasimhan Yuan Cao |
| Open-source DeepResearch – Freeing our search agents | Open Source Search Agents NLP AI Agents | Aymeric Roucher Albert Villanova del Moral Merve Noyan Thomas Wolf Clémentine Fourrier |
| On the Biology of a Large Language Model | Language Models Model Interpretability Circuit Analysis | Jack Lindsey Wes Gurnee Emmanuel Ameisen Brian Chen Adam Pearce Nicholas L. Turner Craig Citro Chris Olah Joshua Batson |
| EMBER2024 - A Benchmark Dataset for Holistic Evaluation of Malware Classifiers | Machine Learning Malware Detection Dataset Benchmark | R.J. Joyce G. Miller P. Roth R. Zak E. Zaresky-Williams H. Anderson E. Raff J. Holt |
| Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning | Adversarial Attacks Malware Detection Reinforcement Learning | H.S. Anderson A. Kharkar B. Filar D. Evans P. Roth |
| Adversarial Examples for CNN-Based Malware Detectors | Adversarial Examples Malware Detection CNN | B. Chen S. Su H. Wang S. He Y. Tang |
| A review of black-box adversarial attacks and defenses in machine learning-based malware detection | Survey Adversarial Attacks Malware Detection | J. Chen |
| HopSkipJumpAttack: A Query-Efficient Decision-Based Attack | Adversarial Attacks Black-Box Decision-Based | J. Chen M.I. Jordan M.J. Wainwright |
| Functionality-preserving Black-box Optimization of Adversarial Windows Malware | Adversarial Attacks Black-Box Malware Detection | L. Demetrio B. Biggio G. Lagorio F. Roli A. Armando |
| Towards a Practical Defense Against Adversarial Attacks on Deep Learning-Based Malware Detectors via Randomized Smoothing | Adversarial Defense Randomized Smoothing Malware Detection | D. Gibert G. Zizzo Q. Le |
| Black-Box Attacks against RNN based Malware Detection Algorithms | Adversarial Attacks RNN Malware Detection | W. Hu Y. Tan |
| Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection | Adversarial Attacks Malware Detection Evaluation | M. Imran A. Appice D. Malerba |
| Adversarial training for raw-binary malware classifiers | Adversarial Training Malware Detection Binary Classification | L. Keane M. Kantchelian I. Stoian T. Cassidy A. Javed M. Lash E. Raff C. Nicholas H. Anderson R. Zak |
| Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables | Adversarial Attacks Malware Detection Deep Learning | B. Kolosnjaji A. Demontis B. Biggio D. Maiorca G. Giacinto F. Roli C. Eckert |
| Deceiving Portable Executable Malware Classifiers into Targeted Misclassification with Practical Adversarial Examples | Adversarial Examples Malware Detection Targeted Attack | Y. Kucuk G. Yan |
| GAMBD: Generating adversarial malware against MalConv | Adversarial Attacks MalConv Malware Detection | K. Li M. Li Z. Liang Z. Qin |
| Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art | Survey Adversarial Attacks Malware Detection | X. Ling X. Chen Y. Qian C. Wu S. Ji |
| The Limitations of Deep Learning in Adversarial Settings | Adversarial Machine Learning Deep Learning Security | N. Papernot P. McDaniel S. Jha M. Fredrikson Z.B. Celik A. Swami |
| Practical Black-Box Attacks against Machine Learning | Black-Box Attacks Adversarial Attacks Machine Learning | N. Papernot P. McDaniel I. Goodfellow S. Jha Z.B. Celik A. Swami |
| Malware Detection by Eating a Whole EXE | Malware Detection Deep Learning PE Files | E. Raff J. Barker J. Sylvester R. Brandon B. Catanzaro C. Nicholas |
| Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers | Black-Box Attacks API Calls Malware Detection | I. Rosenberg A. Shabtai L. Rokach Y. Elovici |
| Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers | Black-Box Attacks Query Efficiency Malware Detection | I. Rosenberg A. Shabtai L. Rokach Y. Elovici |
| Exploring Adversarial Examples in Malware Detection | Adversarial Examples Malware Detection Evaluation | O. Suciu S.E. Coull J. Johns |
| Adversary Resistant Deep Neural Networks with an Application to Malware Detection | Adversarial Defense Deep Neural Networks Malware Detection | Q. Wang W. Guo K. Zhang A. Gunter G. Danezis Z. Chen |
| A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security | Survey Adversarial Attacks Malware Detection | S. Yan Z. Gu J. Liu T. Li Z. Li Z. Wu |
| Attribute-Aware Generative Design With Generative Adversarial Networks | Generative Adversarial Networks Attribute-Aware Design Machine Learning | C. Yuan M. Moghaddam |
| Concurrency and Computation: Practice and Experience | Journal Distributed Computing Parallel Computing Cloud Computing | Wiley |
| Future Internet | Journal Internet Technologies Information Society Open Access | MDPI |