End-to-end transformer-based models in textual-based NLP

A Rahali, MA Akhloufi - AI, 2023 - mdpi.com
Transformer architectures are highly expressive because they use self-attention
mechanisms to encode long-range dependencies in the input sequences. In this paper, we …

A review of advancements and applications of pre-trained language models in cybersecurity

Z Liu - 2024 12th International Symposium on Digital …, 2024 - ieeexplore.ieee.org
In this paper, we delve into the transformative role of pre-trained language models (PLMs) in
cybersecurity, offering a comprehensive examination of their deployment across a wide …

Sentiment Analysis of Comment Data Based on BERT-ETextCNN-ELSTM

L Deng, T Yin, Z Li, Q Ge - Electronics, 2023 - mdpi.com
With the rapid popularity and continuous development of social networks, users'
communication and interaction through platforms such as microblogs and forums have …

MalDetConv: automated behaviour-based malware detection framework based on natural language processing and deep learning techniques

P Maniriho, AN Mahmood, MJM Chowdhury - arXiv preprint arXiv …, 2022 - arxiv.org
The popularity of Windows attracts the attention of hackers/cyber-attackers, making Windows
devices the primary target of malware attacks in recent years. Several sophisticated malware …

Android malware detection using hybrid ANFIS architecture with low computational cost convolutional layers

İ Atacak, K Kılıç, İA Doğru - PeerJ Computer Science, 2022 - peerj.com
Background Android is the most widely used operating system all over the world. Due to its
open nature, the Android operating system has become the target of malicious coders …

Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights

O Kargarnovin, AM Sadeghzadeh, R Jalili - Journal of Computer Virology …, 2024 - Springer
With the growing use of Deep Learning (DL) to tackle various problems, securing these
models against adversaries has become a primary concern for researchers. Recent studies …

BejaGNN: behavior-based Java malware detection via graph neural network

P Feng, L Yang, D Lu, N Xi, J Ma - The Journal of Supercomputing, 2023 - Springer
As a popular platform-independent language, Java is widely used in enterprise applications.
In the past few years, language vulnerabilities exploited by Java malware have become …

Detecting novelty seeking from online travel reviews: A deep learning approach

T Chen, Y Duan, F Ahmad, Y Liu - IEEE Access, 2023 - ieeexplore.ieee.org
Travel online reviews is important experience related information for understanding an
inherent personality trait, novelty seeking (NS), which influences tourism motivation and the …

MalwareTotal: Multi-Faceted and Sequence-Aware Bypass Tactics against Static Malware Detection

S He, C Fu, H Hu, J Chen, J Lv, S Jiang - Proceedings of the IEEE/ACM …, 2024 - dl.acm.org
Recent methods have demonstrated that machine learning (ML) based static malware
detection models are vulnerable to adversarial attacks. However, the generated malware …

Unveiling AI-Generated Financial Text: A Computational Approach Using Natural Language Processing and Generative Artificial Intelligence

MA Arshed, ȘC Gherghina, C Dewi, A Iqbal, S Mumtaz - Computation, 2024 - mdpi.com
This study is an in-depth exploration of the nascent field of Natural Language Processing
(NLP) and generative Artificial Intelligence (AI), and it concentrates on the vital task of …