Login / Signup
An IRL-based malware adversarial generation method to evade anti-malware engines.
Xintong Li
Qi Li
Published in:
Comput. Secur. (2021)
Keyphrases
</>
generation method
malware detection
reverse engineering
malicious code
detect malicious
dynamic analysis
business processes
static analysis
feature generation
databases
real world
anomaly detection
control flow