4.7 Article

Feed-Forward Deep Neural Network (FFDNN)-Based Deep Features for Static Malware Detection

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

COVID-19 classification using deep feature concatenation technique

Waleed Saad et al.

Summary: Detecting COVID-19 from medical images is a challenging yet exciting task for scientists globally. The use of deep learning convolution neural network (DL-CNN) technologies and deep feature concatenation (DFC) mechanism have shown promising results in automating the detection process effectively.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2022)

Article Computer Science, Software Engineering

Minimized feature overhead malware detection machine learning model employing MRMR-based ranking

Priyanka Singh et al.

Summary: To improve the speed and efficiency of malware detection, a machine learning model with optimized preprocessing, feature selection, and classifier parameter tuning is proposed. Experimental results demonstrate that the model achieves excellent performance on various metrics while reducing feature overhead.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2022)

Article Computer Science, Software Engineering

Credit Card Fraud Detection Based on Hyperparameters Optimization Using the Differential Evolution

Mohammed Tayebi et al.

Summary: Due to the emigration of world business to the internet, credit cards have become a tool for payments for both online and outline purchases. However, fraudsters try to attack those systems using various techniques, and credit card fraud has become dangerous. Different methods based on artificial intelligence are proposed to secure credit cards in the academic paper. The proposed solution aims at combining the robustness of three methods: the differential evolution algorithm (DE) for selecting the best hyperparameters, a resampling technique for handling imbalanced data issues, and the XGBoost technique for classification. The optimized XGBoost algorithm is used to classify fraudulent transactions, and the evaluation shows the superiority of the proposed approach compared to state-of-the-art machine learning models.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY (2022)

Article Multidisciplinary Sciences

Malware Analysis and Detection Using Machine Learning Algorithms

Muhammad Shoaib Akhtar et al.

Summary: Polymorphic malware is a highly adaptable form of malicious software that can be detected and countered using machine learning techniques, thus improving the security of computer networks.

SYMMETRY-BASEL (2022)

Article Computer Science, Artificial Intelligence

Image Matching from Handcrafted to Deep Features: A Survey

Jiayi Ma et al.

Summary: Image matching is a fundamental task in various visual applications, and with the development of deep learning techniques, there has been an increasing number of methods proposed in this field. However, the challenge remains in choosing the suitable method for specific applications and designing image matching methods with superior performance. This comprehensive review and analysis provide insights into classical and latest techniques, and offer prospects for future development in image matching technologies.

INTERNATIONAL JOURNAL OF COMPUTER VISION (2021)

Article Computer Science, Information Systems

A Method for Windows Malware Detection Based on Deep Learning

Xiang Huang et al.

Summary: This paper proposes a malware detection method based on deep learning, which combines malware visualization technology with convolutional neural network, and integrates static and dynamic analysis, enhancing the effectiveness of malware detection by visualizing the dynamic analysis results.

JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY (2021)

Article Computer Science, Information Systems

Detecting Portable Executable Malware by Binary Code Using an Artificial Evolutionary Fuzzy LSTM Immune System

Jian Jiang et al.

Summary: As the world grapples with the COVID-19 pandemic, new sophisticated and hard-to-detect malware poses a threat to society and the global economy. Machine learning techniques have become increasingly important in identifying and analyzing malware, but training intelligent systems to recognize advanced cyberthreats remains a challenge. The proposed Artificial Evolutionary Fuzzy LSTM Immune System effectively protects modern information systems from Portable Executable Malware, showing high accuracy in testing with a complex dataset. The system's unique application of machine learning trained from raw bytes of executable files demonstrates superiority over other machine learning algorithms in combating malware.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Multidisciplinary Sciences

Converting tabular data into images for deep learning with convolutional neural networks

Yitan Zhu et al.

Summary: The IGTD algorithm transforms tabular data into images by assigning similar features close to each other in the image through optimized allocation of features to pixel positions. Compared to existing methods, IGTD generates compact image representations with better preservation of feature neighborhood structure.

SCIENTIFIC REPORTS (2021)

Article Computer Science, Theory & Methods

A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices

Ruitao Feng et al.

Summary: The current approach for Android malware detection relies on server-side scanning, yet a final defense line on mobile devices is still necessary. This paper introduces an effective real-time detection system on mobile devices, evaluating the impact of different parameters on detection performance.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Telecommunications

COVID-19 pandemic cybersecurity issues

Bernardi Pranggono et al.

Summary: This paper examines cybersecurity issues during the COVID-19 pandemic, highlighting the correlation between the pandemic and increased cyber-attacks, with healthcare organizations being a main target. Practical approaches to reduce cyber-attack risks are provided, emphasizing the importance of implementing comprehensive cybersecurity measures to protect important data and assets.

INTERNET TECHNOLOGY LETTERS (2021)

Review Computer Science, Hardware & Architecture

The rise of machine learning for detection and classification of malware: Research developments, trends and challenges

Daniel Gibert et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Review Engineering, Multidisciplinary

Review and Classification of Bio-inspired Algorithms and Their Applications

Xumei Fan et al.

JOURNAL OF BIONIC ENGINEERING (2020)

Article Green & Sustainable Science & Technology

A Sustainable Deep Learning Framework for Object Recognition Using Multi-Layers Deep Features Fusion and Selection

Muhammad Rashid et al.

SUSTAINABILITY (2020)

Article Computer Science, Information Systems

Intelligent Vision-Based Malware Detection and Classification Using Deep Random Forest Paradigm

S. Abijah Roseline et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Bio-Inspired Feature Selection: An Improved Binary Particle Swarm Optimization Approach

Bai Ji et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Deep learning for image-based mobile malware detection

Francesco Mercaldo et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2020)

Article Computer Science, Information Systems

A Deep Learning Model Based on Concatenation Approach for the Diagnosis of Brain Tumor

Neelum Noreen et al.

IEEE ACCESS (2020)

Review Computer Science, Information Systems

A Comprehensive Review on Malware Detection Approaches

Omer Aslan et al.

IEEE ACCESS (2020)

Article Computer Science, Artificial Intelligence

Malware detection based on deep learning algorithm

Ding Yuxin et al.

NEURAL COMPUTING & APPLICATIONS (2019)

Article Computer Science, Information Systems

Analysis and classification of context-based malware behavior

Mohammadhadi Alaeiyan et al.

COMPUTER COMMUNICATIONS (2019)

Article Computer Science, Artificial Intelligence

Feed-forward neural network training using sparse representation

Jie Yang et al.

EXPERT SYSTEMS WITH APPLICATIONS (2019)

Article Engineering, Multidisciplinary

Malware Detection Based on Deep Learning of Behavior Graphs

Fei Xiao et al.

MATHEMATICAL PROBLEMS IN ENGINEERING (2019)

Article Computer Science, Artificial Intelligence

A multi-level deep learning system for malware detection

Wei Zhong et al.

EXPERT SYSTEMS WITH APPLICATIONS (2019)

Article Computer Science, Information Systems

Robust Intelligent Malware Detection Using Deep Learning

R. Vinayakumar et al.

IEEE ACCESS (2019)

Article Computer Science, Artificial Intelligence

DeepAM: a heterogeneous deep learning framework for intelligent malware detection

Yanfang Ye et al.

KNOWLEDGE AND INFORMATION SYSTEMS (2018)

Article Computer Science, Information Systems

Bio-inspired computational paradigm for feature investigation and malware detection: interactive analytics

Ahmad Firdaus et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Theory & Methods

Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM

Ajay M. A. Kumara et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

Construction and evaluation of the new heuristic malware detection mechanism based on executable files static analysis

A. V. Kozachok et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2018)

Article Computer Science, Information Systems

DeepMalNet: Evaluating shallow and deep networks for static PE malware detection

R. Vinayakumar et al.

ICT EXPRESS (2018)

Article Acoustics

Deep features for automatic spoofing detection

Yanmin Qian et al.

SPEECH COMMUNICATION (2016)

Article Engineering, Electrical & Electronic

Deep Neural Networks for Acoustic Modeling in Speech Recognition

Geoffrey Hinton et al.

IEEE SIGNAL PROCESSING MAGAZINE (2012)

Article Computer Science, Information Systems

Hunting for undetectable metamorphic viruses

Da Lin et al.

JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES (2011)

Article Computer Science, Artificial Intelligence

Random forests

L Breiman

MACHINE LEARNING (2001)