Alert button
Picture for Deqiang Li

Deqiang Li

Alert button

PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks

Add code
Bookmark button
Alert button
Feb 22, 2023
Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu

Figure 1 for PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
Figure 2 for PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
Figure 3 for PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
Figure 4 for PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
Viaarxiv icon

Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?

Add code
Bookmark button
Alert button
Sep 20, 2021
Deqiang Li, Tian Qiu, Shuo Chen, Qianmu Li, Shouhuai Xu

Figure 1 for Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Figure 2 for Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Figure 3 for Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Figure 4 for Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Viaarxiv icon

Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection

Add code
Bookmark button
Alert button
Jun 30, 2020
Deqiang Li, Qianmu Li

Figure 1 for Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection
Figure 2 for Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection
Figure 3 for Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection
Figure 4 for Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection
Viaarxiv icon

SoK: Arms Race in Adversarial Malware Detection

Add code
Bookmark button
Alert button
Jun 15, 2020
Deqiang Li, Qianmu Li, Yanfang Ye, Shouhuai Xu

Figure 1 for SoK: Arms Race in Adversarial Malware Detection
Figure 2 for SoK: Arms Race in Adversarial Malware Detection
Figure 3 for SoK: Arms Race in Adversarial Malware Detection
Figure 4 for SoK: Arms Race in Adversarial Malware Detection
Viaarxiv icon

Enhancing Deep Neural Networks Against Adversarial Malware Examples

Add code
Bookmark button
Alert button
Apr 15, 2020
Deqiang Li, Qianmu Li, Yanfang Ye, Shouhuai Xu

Figure 1 for Enhancing Deep Neural Networks Against Adversarial Malware Examples
Figure 2 for Enhancing Deep Neural Networks Against Adversarial Malware Examples
Figure 3 for Enhancing Deep Neural Networks Against Adversarial Malware Examples
Figure 4 for Enhancing Deep Neural Networks Against Adversarial Malware Examples
Viaarxiv icon

HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples

Add code
Bookmark button
Alert button
Sep 18, 2018
Deqiang Li, Ramesh Baral, Tao Li, Han Wang, Qianmu Li, Shouhuai Xu

Figure 1 for HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples
Figure 2 for HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples
Figure 3 for HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples
Figure 4 for HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples
Viaarxiv icon