|
[1]
|
Maniriho, P., Mahmood, A.N. and Chowdhury, M.J.M. (2023) API-Maldetect: Automated Malware Detection Framework for Windows Based on API Calls and Deep Learning Techniques. Journal of Network and Computer Applications, 218, Article 103704. [Google Scholar] [CrossRef]
|
|
[2]
|
Zhu, H., Wei, H., Wang, L., Xu, Z. and Sheng, V.S. (2023) An Effective End-to-End Android Malware Detection Method. Expert Systems with Applications, 218, Article 119593. [Google Scholar] [CrossRef]
|
|
[3]
|
Hou, Z., Li, X., Li, L., Yuan, J. and Deng, K. (2022) An End-to-End Raw Bytes Based Malware Classifier via Self-Attention Residual Convolutional Network. 2022 IEEE 8th International Conference on Computer and Communications (ICCC), Chengdu, 9-12 December 2022, 1666-1670. [Google Scholar] [CrossRef]
|
|
[4]
|
陈岑, 李暖暖, 蔡军飞, 等. 基于动态行为特征加权聚类的加壳恶意软件未知变种检测方法[J]. 重庆大学学报, 2023, 46(3): 129-136.
|
|
[5]
|
欧阳坜伶, 彭国军. 面向安卓系统的环境感知API自动化检测方案[J/OL]. 武汉大学学报(理学版), 1-13. 2024-11-02. [Google Scholar] [CrossRef]
|
|
[6]
|
王金华. 端到端的基于深度学习的网络入侵检测方法[J]. 通信技术, 2022, 55(6): 762-770.
|
|
[7]
|
Dieleman, S. and Schrauwen, B. (2014) End-to-End Learning for Music Audio. 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, 4-9 May 2014, 6964-6968. [Google Scholar] [CrossRef]
|
|
[8]
|
Gopinath, M. and Sethuraman, S.C. (2023) A Comprehensive Survey on Deep Learning Based Malware Detection Techniques. Computer Science Review, 47, Article 100529.
|
|
[9]
|
Coull, S.E. and Gardner, C. (2019) Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification. 2019 IEEE Security and Privacy Workshops (SPW), San Francisco, 19-23 May 2019, 21-27. [Google Scholar] [CrossRef]
|
|
[10]
|
Karpathy, A., Toderici, G., Shetty, S., Leung, T., Sukthankar, R. and Fei-Fei, L. (2014) Large-Scale Video Classification with Convolutional Neural Networks. 2014 IEEE Conference on Computer Vision and Pattern Recognition, Columbus, 23-28 June 2014, 1725-1732. [Google Scholar] [CrossRef]
|
|
[11]
|
Snow, E., Alam, M., Glandon, A. and Iftekharuddin, K. (2020) End-to-End Multimodel Deep Learning for Malware Classification. 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, 19-24 July 2020, 1-7. [Google Scholar] [CrossRef]
|
|
[12]
|
卢法权, 陈丹伟. 基于改进CNN-LSTM融合的僵尸网络识别方法[J]. 计算机应用与软件, 2024, 41(3): 328-335.
|
|
[13]
|
Vaswani, A. (2017) Attention Is All You Need. Advances in Neural Information Processing Systems, 30, 5998-6008.
|
|
[14]
|
Voita, E., Talbot, D., Moiseev, F., Sennrich, R. and Titov, I. (2019) Analyzing Multi-Head Self-Attention: Specialized Heads Do the Heavy Lifting, the Rest Can Be Pruned. Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, Florence, July 2019, 5797-5808. [Google Scholar] [CrossRef]
|
|
[15]
|
Khan, R.U., Zhang, X. and Kumar, R. (2018) Analysis of Resnet and GoogleNet Models for Malware Detection. Journal of Computer Virology and Hacking Techniques, 15, 29-37. [Google Scholar] [CrossRef]
|
|
[16]
|
Raff, E., Barker, J., Sylvester, J., et al. (2018) Malware Detection by Eating a Whole Exe. Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence, New Orleans. 2-7 February 2018, 292-300.
|
|
[17]
|
Kakisim, A.G., Gulmez, S. and Sogukpinar, I. (2022) Sequential Opcode Embedding-Based Malware Detection Method. Computers & Electrical Engineering, 98, Article 107703. [Google Scholar] [CrossRef]
|
|
[18]
|
李道全, 李玉秀, 任大用. 小样本下基于决策树-SNN的恶意流量检测方法[J]. 计算机工程与应用, 2023, 59(21): 258-266.
|
|
[19]
|
Luo, X., Fan, H., Yin, L., Jia, S., Zhao, K. and Yang, H. (2024) CAG-Malconv: A Byte-Level Malware Detection Method with CBAM and Attention-GRU. IEEE Transactions on Network and Service Management, 21, 5859-5872. [Google Scholar] [CrossRef]
|
|
[20]
|
李红娇, 顾凡. 基于多注意力Bi-LSTM的恶意软件预测[J]. 计算机工程与设计, 2023, 44(12): 3529-3535.
|
|
[21]
|
高玮玮, 杨亦乐, 方宇, 等. 多特征尺度融合改进Faster-RCNN视网膜微动脉瘤自动检测算法[J]. 光子学报, 2023, 52(4): 228-239.
|
|
[22]
|
Fang, Y., Zhang, C., Huang, C., Liu, L. and Yang, Y. (2019) Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism. IEEE Access, 7, 56329-56340. [Google Scholar] [CrossRef]
|
|
[23]
|
王相月, 赵利辉. 基于多阶段特征选择和CNN-GRU的网络入侵检测模型[J]. 中北大学学报(自然科学版), 2024, 45(1): 66-73.
|
|
[24]
|
盛振威, 徐国天. 基于融合CNN与GRU的DGA恶意域名检测方法[J]. 网络安全技术与应用, 2022(12): 29-32.
|
|
[25]
|
Yang, L. and Liu, J. (2020) Tuningmalconv: Malware Detection with Not Just Raw Bytes. IEEE Access, 8, 140915-140922. [Google Scholar] [CrossRef]
|