j40903272 / MalConv-kerasView external linksLinks
This is the implementation of MalConv proposed in [Malware Detection by Eating a Whole EXE](https://arxiv.org/abs/1710.09435) and its adversarial sample crafting.
☆95Nov 1, 2018Updated 7 years ago
Alternatives and similar repositories for MalConv-keras
Users that are interested in MalConv-keras are comparing it to the libraries listed below
Sorting:
- NTU CSIE Network Administration and System Administration☆12Jul 31, 2018Updated 7 years ago
- PRUNE: Preserving Proximity and Global Ranking for Network Embedding☆13Nov 8, 2018Updated 7 years ago
- NTU CSIE High Performance Computing 2018 fall☆12Jan 24, 2019Updated 7 years ago
- NTU CSIE system programming☆13Jul 31, 2018Updated 7 years ago
- NTU CSIE Special Direction Machine Learning☆12Jan 24, 2019Updated 7 years ago
- NTU CSIE Operating System☆13Jul 31, 2018Updated 7 years ago
- NTU CSIE Web Retrieval and Mining Information Retrieval 2019 spring☆13Jul 30, 2019Updated 6 years ago
- NTU CSIE compiler☆14Sep 26, 2019Updated 6 years ago
- Easy to use extractive text summarization with BERT☆11Jun 22, 2019Updated 6 years ago
- A library for efficient similarity search and clustering of dense vectors.☆10Feb 15, 2019Updated 7 years ago
- NTU CSIE Video Communications☆11Jul 3, 2018Updated 7 years ago
- Machine learning and deep structure☆13Jul 30, 2018Updated 7 years ago
- NTU CSIE Digital Speech Processing☆12Oct 6, 2018Updated 7 years ago
- NTU CSIE Cryptography and Network Security 2019 Spring☆13Dec 8, 2022Updated 3 years ago
- NTU CSIE Computer Architecture☆13Jul 31, 2018Updated 7 years ago
- NTU CSIE Digital Visual Effects☆12Jul 3, 2018Updated 7 years ago
- NTU CSIE Machine Learning Techniques☆11Jul 3, 2018Updated 7 years ago
- NTU CSIE Advanced Computer Network 2019 spring☆13Sep 26, 2019Updated 6 years ago
- NTU CSIE Systems and Network Security Laboratory (IOT) - 2019 spring☆15Jul 30, 2019Updated 6 years ago
- NTU CSIE computer vision☆10Jul 3, 2018Updated 7 years ago
- NTU CSIE Computer Network Lab 2019 spring☆13Jul 30, 2019Updated 6 years ago
- Bottom-up Summarization☆18Jul 30, 2019Updated 6 years ago
- NTU Computer Security 2019 fall☆10Mar 20, 2021Updated 4 years ago
- 台鐵自動訂票+驗證碼辨識☆22Jul 30, 2018Updated 7 years ago
- Pytorch implementation of MalConv☆72Feb 1, 2022Updated 4 years ago
- Malware detection demo using machine learning.☆25Feb 9, 2018Updated 8 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,124Nov 22, 2024Updated last year
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆76Oct 8, 2025Updated 4 months ago
- ☆13Jun 19, 2018Updated 7 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆242Nov 27, 2025Updated 2 months ago
- ☆80Dec 6, 2019Updated 6 years ago
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- Yossi Mandil & Tomer Gill's Bachelor Degree Final Project under the BIU Cyber Center - Malware & Benign File Classification using Machin…☆10Jun 24, 2018Updated 7 years ago
- 基于卷积神经网络的恶意软件检测方法☆59May 21, 2019Updated 6 years ago
- A neural approach to malware detection in portable executables☆79Mar 20, 2023Updated 2 years ago
- Malware Detection and Classification Using Machine Learning☆344Jun 5, 2017Updated 8 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆130Jul 20, 2018Updated 7 years ago
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆19May 21, 2018Updated 7 years ago
- Malware detection using CNN☆12Aug 14, 2018Updated 7 years ago