Login / Signup
Generation & Evaluation of Adversarial Examples for Malware Obfuscation.
Daniel Park
Haidar Khan
Bülent Yener
Published in:
ICMLA (2019)
Keyphrases
</>
reverse engineering
malware detection
control flow
multi agent
evaluation process
multiscale
evaluation method
generation process
artificial intelligence
reinforcement learning
data structure
test cases
bayesian networks
evaluation criteria
key concepts
evaluation methods
static analysis