Comprehensive evaluation of Mal-API-2019 dataset by machine learning in malware detection

Z Li, H Zhu, H Liu, J Song, Q Cheng - arXiv preprint arXiv:2403.02232, 2024 - arxiv.org
This study conducts a thorough examination of malware detection using machine learning
techniques, focusing on the evaluation of various classification models using the Mal-API …

Aot-attack on things: A security analysis of iot firmware updates

M Ibrahim, A Continella… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
IoT devices implement firmware update mechanisms to fix security issues and deploy new
features. These mechanisms are often triggered and mediated by mobile companion apps …

Advanced network intrusion detection with tabtransformer

X Wang, Y Qiao, J Xiong, Z Zhao… - Journal of Theory …, 2024 - centuryscipub.com
In today's digital era, the security of networked systems is of utmost importance amidst the
increasing prevalence of cyber threats and sophisticated intrusion techniques. This paper …

Understand legal documents with contextualized large language models

X Jin, Y Wang - arXiv preprint arXiv:2303.12135, 2023 - arxiv.org
The growth of pending legal cases in populous countries, such as India, has become a
major issue. Developing effective techniques to process and understand legal documents is …

[HTML][HTML] Smartfix: Leveraging machine learning for proactive equipment maintenance in industry 4.0

F Ni, H Zang, Y Qiao - … in education: prospects and challenges of …, 2024 - books.google.com
In the fast-moving field of Industry 4.0, active equipment maintenance is becoming
increasingly critical. This article introduces an innovative solution called SmartFix that …

Prometheus: Infrastructure security posture analysis with ai-generated attack graphs

X Jin, C Katsis, F Sang, J Sun, E Bertino… - arXiv preprint arXiv …, 2023 - arxiv.org
The rampant occurrence of cybersecurity breaches imposes substantial limitations on the
progress of network infrastructures, leading to compromised data, financial losses, potential …

Decoding sentiments: Enhancing covid-19 tweet analysis through bert-rcnn fusion

J Xiong, M Feng, X Wang, C Jiang… - Journal of Theory and …, 2024 - centuryscipub.com
In the era of the COVID-19 pandemic, the surge in information sharing on social media,
particularly Twitter, necessitates a nuanced understanding of sentiments. Conventional …

Large Language Models for Forecasting and Anomaly Detection: A Systematic Literature Review

J Su, C Jiang, X Jin, Y Qiao, T Xiao, H Ma… - arXiv preprint arXiv …, 2024 - arxiv.org
This systematic literature review comprehensively examines the application of Large
Language Models (LLMs) in forecasting and anomaly detection, highlighting the current …

Robust Data-centric Graph Structure Learning for Text Classification

J Zhuang - Companion Proceedings of the ACM on Web …, 2024 - dl.acm.org
Over the past decades, text classification underwent remarkable evolution across diverse
domains. Despite these advancements, most existing model-centric methods in text …

IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis

D Schmidt, C Tagliaro, K Borgolte… - Proceedings of the 2023 …, 2023 - dl.acm.org
The number of" smart''devices, that is, devices making up the Internet of Things (IoT), is
steadily growing. They suffer from vulnerabilities just as other software and hardware …