1. Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., and Fergus, R. (2014, January 14–16). Intriguing properties of neural networks. Proceedings of the International Conference on Learning Representations (ICLR), Banff, AB, Canada.
2. Raff, E., Barker, J., Sylvester, J., Brandon, R., Catanzaro, B., and Nicholas, C. (2018, January 2–3). Malware detection by eating a whole EXE. Proceedings of the 32nd AAAI Workshops, New Orleans, LA, USA.
3. Peering Inside the PE: A Tour of the win32 (R) Portable Executable File Format;Pietrek;Microsoft Syst. J.,1994
4. Nataraj, L., Karthikeyan, S., Jacob, G., and Manjunath, B. (2011, January 20). Malware images: Visualization and automatic classification. Proceedings of the 8th International Symposium on Visualization for Cyber Security, Pittsburgh, PA, USA.
5. Simonyan, K., and Zisserman, A. (2014). Very deep convolutional networks for large-scale image recognition. arXiv.