Skip to main navigation
Skip to search
Skip to main content
Bar-Ilan University Home
Help & FAQ
Home
Researchers
Organisations
Research output
Prizes
Student theses
Courses
Activities
Projects
Press/Media
Datasets
Equipment
Search by expertise, name or affiliation
Adversarial examples on discrete sequences for beating whole-binary malware detection
F. Kreuk
, A. Barak
, S. Aviv-Reuven
, M. Baruch
,
B. Pinkas
, J. Keshet
Department of Computer Science
Research output
:
Working paper / Preprint
›
Preprint
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Adversarial examples on discrete sequences for beating whole-binary malware detection'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Adversarial Examples
100%
Malware Detection
100%
Discrete Sequence
100%
Byte
66%
Small Section
33%
Input Signals
33%
Success Rate
33%
Deep Learning
33%
Image Segmentation
33%
Speech Recognition
33%
CNN-based
33%
Small Perturbation
33%
Image Detection
33%
Pose Estimation
33%
Binary File
33%
Deep Network
33%
Failed Attacks
33%
Small Modification
33%
Computer Science
Adversarial Example
100%
Malware Detection
100%
Speech Recognition
33%
Image Segmentation
33%
Convolutional Neural Network
33%
Malware Detector
33%
Based Malware Detection
33%
Deep Learning
33%
Successful Attack
33%
Pose Estimation
33%