Alert button
Picture for Scott E. Coull

Scott E. Coull

Alert button

On the Limitations of Continual Learning for Malware Classification

Add code
Bookmark button
Alert button
Aug 13, 2022
Mohammad Saidur Rahman, Scott E. Coull, Matthew Wright

Figure 1 for On the Limitations of Continual Learning for Malware Classification
Figure 2 for On the Limitations of Continual Learning for Malware Classification
Figure 3 for On the Limitations of Continual Learning for Malware Classification
Figure 4 for On the Limitations of Continual Learning for Malware Classification
Viaarxiv icon

Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection

Add code
Bookmark button
Alert button
Aug 17, 2020
Luca Demetrio, Scott E. Coull, Battista Biggio, Giovanni Lagorio, Alessandro Armando, Fabio Roli

Figure 1 for Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection
Figure 2 for Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection
Figure 3 for Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection
Figure 4 for Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection
Viaarxiv icon

Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification

Add code
Bookmark button
Alert button
Mar 20, 2019
Scott E. Coull, Christopher Gardner

Figure 1 for Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification
Figure 2 for Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification
Figure 3 for Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification
Figure 4 for Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification
Viaarxiv icon

Exploring Adversarial Examples in Malware Detection

Add code
Bookmark button
Alert button
Oct 18, 2018
Octavian Suciu, Scott E. Coull, Jeffrey Johns

Figure 1 for Exploring Adversarial Examples in Malware Detection
Figure 2 for Exploring Adversarial Examples in Malware Detection
Figure 3 for Exploring Adversarial Examples in Malware Detection
Figure 4 for Exploring Adversarial Examples in Malware Detection
Viaarxiv icon