4.3 Article

A Method for Windows Malware Detection Based on Deep Learning

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT

Han Qiu et al.

Summary: In this paper, a novel data protection method is proposed by combining Selective Encryption (SE) concept with fragmentation and dispersion on storage, dividing data into three fragments with different levels of protection using invertible Discrete Wavelet Transform (DWT), and dispersing them over storage areas with different levels of trustworthiness to protect end users' data. The method optimizes storage cost by saving expensive, private, and secure storage spaces and utilizing cheap but low trustworthy storage space, with intensive security analysis performed to verify the high protection level. Additionally, efficiency is demonstrated by deploying tasks between CPU and General Purpose Graphic Processing Unit (GPGPU) in an optimized manner.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)

Article Automation & Control Systems

Deep Residual Learning-Based Enhanced JPEG Compression in the Internet of Things

Han Qiu et al.

Summary: This article proposes a novel method for improving the efficiency of multimedia big data transmission in edge computing through data compression methods and deep learning technology. The method significantly reduces the amount of data transmitted at the sender's end, while at the receiver's end, original data is recovered using signal processing and deep residual learning model to ensure image quality.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Artificial Intelligence

Selective encryption on ECG data in body sensor network based on supervised machine learning

Han Qiu et al.

INFORMATION FUSION (2020)

Article Computer Science, Information Systems

Malware Visualization for Fine-Grained Classification

Jianwen Fu et al.

IEEE ACCESS (2018)

Proceedings Paper Engineering, Manufacturing

A Shellcode Detection Method Based on Full Native API Sequence and Support Vector Machine

Yixuan Cheng et al.

2017 3RD INTERNATIONAL CONFERENCE ON APPLIED MATERIALS AND MANUFACTURING TECHNOLOGY (ICAMMT 2017) (2017)

Article Computer Science, Theory & Methods

A Survey on Malware Detection Using Data Mining Techniques

Yanfang Ye et al.

ACM COMPUTING SURVEYS (2017)

Article Computer Science, Information Systems

A comparison of static, dynamic, and hybrid analysis for malware detection

Anusha Damodaran et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2017)

Article Computer Science, Theory & Methods

A Survey on Automated Dynamic Malware-Analysis Techniques and Tools

Manuel Egele et al.

ACM COMPUTING SURVEYS (2012)

Article Computer Science, Information Systems

Using entropy analysis to find encrypted and packed malware

Robert Lyda et al.

IEEE SECURITY & PRIVACY (2007)