An Improved Method to Unveil Malware's Hidden Behavior.
Qiang LiYunan ZhangLiya SuYang WuXinjian MaZeming YangPublished in: Inscrypt (2017)
Keyphrases
- high accuracy
- theoretical analysis
- cost function
- experimental evaluation
- data sets
- fully automatic
- synthetic data
- error rate
- significant improvement
- computational cost
- probabilistic model
- support vector machine
- main contribution
- optimization method
- detection method
- feature set
- edge detection
- pairwise
- preprocessing
- objective function
- image processing