ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1802.10135
  4. Cited By
Microsoft Malware Classification Challenge

Microsoft Malware Classification Challenge

22 February 2018
Royi Ronen
Marian Radu
Corina Feuerstein
E. Yom-Tov
Mansour Ahmadi
ArXivPDFHTML

Papers citing "Microsoft Malware Classification Challenge"

38 / 38 papers shown
Title
On the Security Risks of ML-based Malware Detection Systems: A Survey
On the Security Risks of ML-based Malware Detection Systems: A Survey
Ping He
Yuhao Mao
Changjiang Li
Lorenzo Cavallaro
Ting Wang
Shouling Ji
23
0
0
16 May 2025
Security through the Eyes of AI: How Visualization is Shaping Malware Detection
Security through the Eyes of AI: How Visualization is Shaping Malware Detection
Matteo Brosolo
A. Aazami
R. Agarwal
M. Prabhakaran
S. Nicolazzo
Antonino Nocera
V. P.
AAML
39
0
0
12 May 2025
Malware Classification Based on Image Segmentation
Malware Classification Based on Image Segmentation
Wanhu Nie
13
0
0
06 Jun 2024
kNN Classification of Malware Data Dependency Graph Features
kNN Classification of Malware Data Dependency Graph Features
John Musgrave
Anca L. Ralescu
33
0
0
04 Jun 2024
SoK: Leveraging Transformers for Malware Analysis
SoK: Leveraging Transformers for Malware Analysis
Pradip Kunwar
Kshitiz Aryal
Maanak Gupta
Mahmoud Abdelsalam
Elisa Bertino
90
0
0
27 May 2024
Synthetic Datasets for Program Similarity Research
Synthetic Datasets for Program Similarity Research
Alex Interrante-Grant
Michael Wang
Lisa Baer
Ryan Whelan
Tim Leek
SyDa
41
1
0
06 May 2024
Generalizing Machine Learning Evaluation through the Integration of
  Shannon Entropy and Rough Set Theory
Generalizing Machine Learning Evaluation through the Integration of Shannon Entropy and Rough Set Theory
Olga Cherednichenko
Dmytro Chernyshov
Dmytro Sytnikov
Polina Sytnikova
57
0
0
18 Apr 2024
Use of Graph Neural Networks in Aiding Defensive Cyber Operations
Use of Graph Neural Networks in Aiding Defensive Cyber Operations
Shaswata Mitra
Trisha Chakraborty
Subash Neupane
Aritran Piplai
Sudip Mittal
AAML
50
3
0
11 Jan 2024
High-resolution Image-based Malware Classification using Multiple
  Instance Learning
High-resolution Image-based Malware Classification using Multiple Instance Learning
Tim Peters
H. Farhat
19
0
0
21 Nov 2023
MALITE: Lightweight Malware Detection and Classification for Constrained
  Devices
MALITE: Lightweight Malware Detection and Classification for Constrained Devices
Sidharth Anand
Barsha Mitra
Soumyadeep Dey
Abhinav Rao
Rupsa Dhar
Jaideep Vaidya
27
3
0
06 Sep 2023
A Survey on Malware Detection with Graph Representation Learning
A Survey on Malware Detection with Graph Representation Learning
Tristan Bilot
Nour El Madhoun
Khaldoun Al Agha
Anis Zouaoui
AAML
21
20
0
28 Mar 2023
Sequential Embedding-based Attentive (SEA) classifier for malware
  classification
Sequential Embedding-based Attentive (SEA) classifier for malware classification
Muhammad Ahmed
Anam Qureshi
J. Shamsi
Murk Marvi
19
1
0
11 Feb 2023
Behavioural Reports of Multi-Stage Malware
Behavioural Reports of Multi-Stage Malware
Marcus Carpenter
Chunbo Luo
25
3
0
30 Jan 2023
Adversarial Attacks on Transformers-Based Malware Detectors
Adversarial Attacks on Transformers-Based Malware Detectors
Yash Jakhotiya
Heramb Patil
Jugal Rawlani
Dr. Sunil B. Mane
AAML
23
4
0
01 Oct 2022
Feature Decoupling in Self-supervised Representation Learning for Open
  Set Recognition
Feature Decoupling in Self-supervised Representation Learning for Open Set Recognition
Jingyun Jia
P. Chan
BDL
19
2
0
28 Sep 2022
Avast-CTU Public CAPE Dataset
Avast-CTU Public CAPE Dataset
B. Bosanský
Dominik Kouba
Ondrej Manhal
Thorsten Sick
Viliam Lisý
J. Kroustek
P. Somol
75
5
0
06 Sep 2022
Sequence Feature Extraction for Malware Family Analysis via Graph Neural
  Network
Sequence Feature Extraction for Malware Family Analysis via Graph Neural Network
S. W. Hsiao
P. Chu
22
1
0
10 Aug 2022
Fusing Feature Engineering and Deep Learning: A Case Study for Malware
  Classification
Fusing Feature Engineering and Deep Learning: A Case Study for Malware Classification
Daniel Gibert
Carles Mateu
Jordi Planes
Quan Le
AAML
40
48
0
12 Jun 2022
Marvolo: Programmatic Data Augmentation for Practical ML-Driven Malware
  Detection
Marvolo: Programmatic Data Augmentation for Practical ML-Driven Malware Detection
Michael D. Wong
Edward Raff
James Holt
Ravi Netravali
34
2
0
07 Jun 2022
Deep Image: A precious image based deep learning method for online
  malware detection in IoT Environment
Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
Meysam Ghahramani
R. Taheri
Mohammad Shojafar
R. Javidan
Shaohua Wan
19
11
0
04 Apr 2022
MOTIF: A Large Malware Reference Dataset with Ground Truth Family Labels
MOTIF: A Large Malware Reference Dataset with Ground Truth Family Labels
R. Joyce
Dev Amlani
B. Hamilton
Edward Raff
49
21
0
29 Nov 2021
A Framework for Cluster and Classifier Evaluation in the Absence of
  Reference Labels
A Framework for Cluster and Classifier Evaluation in the Absence of Reference Labels
R. Joyce
Edward Raff
Charles K. Nicholas
48
16
0
23 Sep 2021
Malware Classification Using Transfer Learning
Malware Classification Using Transfer Learning
H. Farhat
Veronica Rammouz
17
2
0
29 Jul 2021
Identifying Authorship Style in Malicious Binaries: Techniques,
  Challenges & Datasets
Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets
J. Gray
D. Sgandurra
Lorenzo Cavallaro
21
8
0
15 Jan 2021
Classifying Malware Using Function Representations in a Static Call
  Graph
Classifying Malware Using Function Representations in a Static Call Graph
Thomas Dalton
M. Schmidtler
Alireza Hadj Khodabakhshi
8
0
0
01 Dec 2020
A survey on practical adversarial examples for malware classifiers
A survey on practical adversarial examples for malware classifiers
Daniel Park
B. Yener
AAML
44
14
0
06 Nov 2020
tf-Darshan: Understanding Fine-grained I/O Performance in Machine
  Learning Workloads
tf-Darshan: Understanding Fine-grained I/O Performance in Machine Learning Workloads
Steven W. D. Chien
Artur Podobas
Ivy Bo Peng
Stefano Markidis
16
11
0
10 Aug 2020
Random CapsNet Forest Model for Imbalanced Malware Type Classification
  Task
Random CapsNet Forest Model for Imbalanced Malware Type Classification Task
Aykut Çayır
U. Ünal
Hasan Dag
32
41
0
20 Dec 2019
Malware Makeover: Breaking ML-based Static Analysis by Modifying
  Executable Bytes
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes
Keane Lucas
Mahmood Sharif
Lujo Bauer
Michael K. Reiter
S. Shintre
AAML
31
67
0
19 Dec 2019
COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware
  Detection
COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Aminollah Khormali
Ahmed A. Abusnaina
Songqing Chen
Daehun Nyang
Aziz Mohaisen
AAML
34
28
0
20 Sep 2019
Malware Detection with LSTM using Opcode Language
Malware Detection with LSTM using Opcode Language
Renjie Lu
14
42
0
10 Jun 2019
Detection of Advanced Malware by Machine Learning Techniques
Detection of Advanced Malware by Machine Learning Techniques
Sanjay Sharma
C. Krishna
S. K. Sahay
14
67
0
07 Mar 2019
Adversarial Attacks on Deep Learning Models in Natural Language
  Processing: A Survey
Adversarial Attacks on Deep Learning Models in Natural Language Processing: A Survey
W. Zhang
Quan Z. Sheng
A. Alhazmi
Chenliang Li
AAML
24
57
0
21 Jan 2019
Machine Learning in Cyber-Security - Problems, Challenges and Data Sets
Machine Learning in Cyber-Security - Problems, Challenges and Data Sets
Idan Amit
John Matherly
W. Hewlett
Zhi Xu
Yinnon Meshi
Yigal Weinberger
21
50
0
19 Dec 2018
Deep learning at the shallow end: Malware classification for non-domain
  experts
Deep learning at the shallow end: Malware classification for non-domain experts
Quan Le
Oisín Boydell
Brian Mac Namee
Mark Scanlon
78
173
0
22 Jul 2018
WebEye - Automated Collection of Malicious HTTP Traffic
WebEye - Automated Collection of Malicious HTTP Traffic
Johann Vierthaler
Roman Kruszelnicki
J. Schütte
18
4
0
16 Feb 2018
On the Feasibility of Malware Authorship Attribution
On the Feasibility of Malware Authorship Attribution
S. Alrabaee
Paria Shirani
M. Debbabi
Lingyu Wang
DeLMO
18
48
0
10 Jan 2017
One-Class SVM with Privileged Information and its Application to Malware
  Detection
One-Class SVM with Privileged Information and its Application to Malware Detection
Evgeny Burnaev
Dmitry Smolyakov
19
70
0
26 Sep 2016
1