2020
DOI: 10.1109/tifs.2020.3003571
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
82
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 117 publications
(82 citation statements)
references
References 30 publications
0
82
0
Order By: Relevance
“…More generic and stable approaches are therefore required to solve these problems. Researchers are developing ensemble classifiers [33][34][35][36][37] that are less vulnerable to the limitations of malware datasets. Ensemble methods [38,39] combine multiple machine learning algorithms to improve final prediction accuracy while minimizing the risk of overfitting in the training outcomes so that the training dataset can be used more efficiently and, as a consequence, higher generalization can be attained.…”
Section: Related Workmentioning
confidence: 99%
“…More generic and stable approaches are therefore required to solve these problems. Researchers are developing ensemble classifiers [33][34][35][36][37] that are less vulnerable to the limitations of malware datasets. Ensemble methods [38,39] combine multiple machine learning algorithms to improve final prediction accuracy while minimizing the risk of overfitting in the training outcomes so that the training dataset can be used more efficiently and, as a consequence, higher generalization can be attained.…”
Section: Related Workmentioning
confidence: 99%
“…Multiple independent models jointly constitute the AI system. And the possibility of the whole system being affected by the poisoning attack is further reduced due to the different training datasets adopted by multiple models [79].…”
Section: Ensemble Learningmentioning
confidence: 99%
“…The evasion attack has extensive applications using adversarial examples (Suciu et al 2019). Li and Li (2020) proposed a mixture of attacks to generate AME without ruining its malicious functionality using semantic characteristics and byte features. Grosse et al (2016) constructed highly effective AME crafting attacks using an improved FFNN.…”
Section: Adversarial Malware Examples For Evasion Attackmentioning
confidence: 99%