2022
DOI: 10.1007/978-3-031-21940-5_6
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Methodologies for Preventing Malware Obfuscation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…In a parallel development, the SkipGNN model \cite{huang2020skipgnn} adopts a dual architecture of Graph Neural Networks (GNN) to aggregate information and make predictions regarding drug-drug interactions. Meanwhile, the TriVec model pioneers a novel approach to knowledge graph embedding, where embedded vectors are deployed to predict polypharmacy side effects by modeling the available data as a knowledge graph [34]. In a more recent innovation [35], the GFAN model introduces a graph feature attention network designed to generate interpretable predictions concerning polypharmacy side effects [36].…”
Section: Recent Developments In Predicting Polypharmacy Side Effectsmentioning
confidence: 99%
“…In a parallel development, the SkipGNN model \cite{huang2020skipgnn} adopts a dual architecture of Graph Neural Networks (GNN) to aggregate information and make predictions regarding drug-drug interactions. Meanwhile, the TriVec model pioneers a novel approach to knowledge graph embedding, where embedded vectors are deployed to predict polypharmacy side effects by modeling the available data as a knowledge graph [34]. In a more recent innovation [35], the GFAN model introduces a graph feature attention network designed to generate interpretable predictions concerning polypharmacy side effects [36].…”
Section: Recent Developments In Predicting Polypharmacy Side Effectsmentioning
confidence: 99%
“…In [30], The authors addressed a consistency study against obfuscation performed on four CNNs, namely ResNet50, InceptionV3, VGG16, and MobileNet, which are frequently utilized for developing image-based malware classification systems. To that end, the authors proposed to retrain the CNN models using TL to classify malware from 9 distinct families using a well-known dataset benchmark.…”
Section: Related Workmentioning
confidence: 99%