Malware Signature Generation Using Locality Sensitive Hashing.
Hassan NaderiP. VinodMauro ContiSaeed ParsaMohammad Hadi AlaeiyanPublished in: ISEA-ISAP (2018)
Keyphrases
- locality sensitive hashing
- nearest neighbor search
- locality sensitive
- nearest neighbor
- similarity search
- brute force
- knn
- hash functions
- space efficient
- sift features
- metric space
- approximate nearest neighbor
- multimedia retrieval
- hash tables
- range queries
- binary codes
- neural network
- indexing techniques
- hamming distance
- euclidean distance
- low dimensional