2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2018
DOI: 10.1109/ntms.2018.8328749
|View full text |Cite
|
Sign up to set email alerts
|

Malware Classification with Deep Convolutional Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
155
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 273 publications
(157 citation statements)
references
References 13 publications
0
155
0
2
Order By: Relevance
“…These developments have allowed deep learning to progress from research to industrial applications. Recently, it has been shown to have comparable performance to human experts [52][53][54]. For PM 2.5 prediction with deep learning, there have been some attempts with different structures, including a deep neural network, long and short term memory (LSTM), and a convolutional neural network (CNN) [33,35,37,38,55,56].…”
Section: Deep Learningmentioning
confidence: 99%
“…These developments have allowed deep learning to progress from research to industrial applications. Recently, it has been shown to have comparable performance to human experts [52][53][54]. For PM 2.5 prediction with deep learning, there have been some attempts with different structures, including a deep neural network, long and short term memory (LSTM), and a convolutional neural network (CNN) [33,35,37,38,55,56].…”
Section: Deep Learningmentioning
confidence: 99%
“…Recently, an increasing number of contemporary methods using malware image to classify turn to employ deep learning models like CNN due to their powerful extraction ability, resistance to noise and robustness when processing different modalities of data [3,28,30,31]. VGG-based and ResNet-based advanced architectures are also exploited [26,[32][33][34]. Differently, Vu et al [35] developed a novel approach using hybrid transformation to convert malware to color images that convey malware semantics to perform malware classification tasks.…”
Section: Malware Imagementioning
confidence: 99%
“…2, The input layer has only one node as the frequency, 16 nodes inside the hidden layer to add a non-linearity to model and 6 nodes in the output layer as the representation of the ground plane height, triangle side length, circle diameters, return loss, gain and directivity of the antenna [14] [15]. The algorithm was experimented using a different-numbers of hidden layers and neurons [16] [17]. However, the architecture explained above is the best possible combination and has the best result in minimizing the loss and converge faster than any other combination.…”
Section: Network Achitecturementioning
confidence: 99%