A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system

A Gaurav, BB Gupta, PK Panigrahi - Enterprise Information …, 2023 - Taylor & Francis
ABSTRACT The Internet of Things (IoT) is a relatively new technology that has piqued
academics' and business information systems' attention in recent years. The Internet of …

A review of android malware detection approaches based on machine learning

K Liu, S Xu, G Xu, M Zhang, D Sun, H Liu - IEEE access, 2020 - ieeexplore.ieee.org
Android applications are developing rapidly across the mobile ecosystem, but Android
malware is also emerging in an endless stream. Many researchers have studied the …

Dos and don'ts of machine learning in computer security

D Arp, E Quiring, F Pendlebury, A Warnecke… - 31st USENIX Security …, 2022 - usenix.org
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …

The role of machine learning in cybersecurity

G Apruzzese, P Laskov, E Montes de Oca… - … Threats: Research and …, 2023 - dl.acm.org
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …

Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems

M Macas, C Wu, W Fuertes - Expert Systems with Applications, 2024 - Elsevier
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …

Wild patterns: Ten years after the rise of adversarial machine learning

B Biggio, F Roli - Proceedings of the 2018 ACM SIGSAC Conference on …, 2018 - dl.acm.org
Deep neural networks and machine-learning algorithms are pervasively used in several
applications, ranging from computer vision to computer security. In most of these …

A multimodal deep learning method for android malware detection using various features

TG Kim, BJ Kang, M Rho, S Sezer… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With the widespread use of smartphones, the number of malware has been increasing
exponentially. Among smart devices, android devices are the most targeted devices by …

The relationship between trust in AI and trustworthy machine learning technologies

E Toreini, M Aitken, K Coopamootoo, K Elliott… - Proceedings of the …, 2020 - dl.acm.org
To design and develop AI-based systems that users and the larger public can justifiably
trust, one needs to understand how machine learning technologies impact trust. To guide …

Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks

A Demontis, M Melis, M Pintor, M Jagielski… - 28th USENIX security …, 2019 - usenix.org
Transferability captures the ability of an attack against a machine-learning model to be
effective against a different, potentially unknown, model. Empirical evidence for …

Intriguing properties of adversarial ml attacks in the problem space

F Pierazzi, F Pendlebury, J Cortellazzi… - … IEEE symposium on …, 2020 - ieeexplore.ieee.org
Recent research efforts on adversarial ML have investigated problem-space attacks,
focusing on the generation of real evasive objects in domains where, unlike images, there is …