Adversarial Example Remaining Availability and Functionality
Malware detection method based on gray images has received a lot of attention because it does not require disassembly and can obtain a high detection accuracy. There are some adversarial attacks against this type of detection method which has been put forward, but most of the current adversarial att...
Main Author: | XIAO Mao, GUO Chun, SHEN Guowei, JIANG Chaohui |
---|---|
Format: | Article |
Language: | zho |
Published: |
Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press
2022-10-01
|
Series: | Jisuanji kexue yu tansuo |
Subjects: | |
Online Access: | http://fcst.ceaj.org/fileup/1673-9418/PDF/1673-9418-16-10-2286.pdf |
Similar Items
-
Adversarial Examples with Unlimited Amount of Additions
by: JIANG Zhoujie, CHEN Yi, XIONG Ziman, GUO Chun, SHEN Guowei
Published: (2024-02-01) -
Adversarial Examples for CNN-Based Malware Detectors
by: Bingcai Chen, et al.
Published: (2019-01-01) -
LSGAN-AT: enhancing malware detector robustness against adversarial examples
by: Jianhua Wang, et al.
Published: (2021-12-01) -
A Survey on Adversarial Attacks for Malware Analysis
by: Kshitiz Aryal, et al.
Published: (2025-01-01) -
Enhancing reinforcement learning based adversarial malware generation to evade static detection
by: Dazhi Zhan, et al.
Published: (2024-07-01)