Publisher
Springer Science and Business Media LLC
Reference65 articles.
1. Grosse, K.; Papernot, N.; Manoharan, P.; Backes, M.; McDaniel, P.: Adversarial examples for malware detection. In: Foley, S., Gollmann, D., Snekkenes, E. (eds.) Lecture Notes in Computer Science. Springer, Cham (2017)
2. Marastoni, N.; Giacobazzi, R.; Dalla Preda, M.: Data augmentation and transfer learning to classify malware images in a deep learning context. J. Comput. Virol. Hacking Tech. 17(4), 279–297 (2021)
3. Schrittwieser, S.; Katzenbeisser, S.; Kinder, J.; Merzdovnik, G.; Weippl, E.: Protecting software through obfuscation. ACM Comput. Surv. 49(1), 1–37 (2016)
4. Collberg, C.; Omborson, C.; Low, D.: A Taxonomy of Obfuscating Transformations. CiteSeer, Oxford (1997)
5. Marastoni, N.; Giacobazzi, R.; Dalla Preda, M.; A deep learning approach to program similarity. In: Proceedings of the 1st International Workshop on Machine Learning and Software Engineering in Symbiosis, MASES 2018 (New York, NY, USA: Association for Computing Machinery, 2018), 26 35.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献