These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

156 related articles for article (PubMed ID: 35999895)

  • 21. Channel Features and API Frequency-Based Transformer Model for Malware Identification.
    Qian L; Cong L
    Sensors (Basel); 2024 Jan; 24(2):. PubMed ID: 38257673
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Robust image classification against adversarial attacks using elastic similarity measures between edge count sequences.
    Oregi I; Del Ser J; Pérez A; Lozano JA
    Neural Netw; 2020 Aug; 128():61-72. PubMed ID: 32442627
    [TBL] [Abstract][Full Text] [Related]  

  • 23. CSMC: A Secure and Efficient Visualized Malware Classification Method Inspired by Compressed Sensing.
    Wu W; Peng H; Zhu H; Zhang D
    Sensors (Basel); 2024 Jun; 24(13):. PubMed ID: 39001035
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Evaluation of Malware Classification Models for Heterogeneous Data.
    Bae H
    Sensors (Basel); 2024 Jan; 24(1):. PubMed ID: 38203154
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Android malware detection method based on highly distinguishable static features and DenseNet.
    Yang J; Zhang Z; Zhang H; Fan J
    PLoS One; 2022; 17(11):e0276332. PubMed ID: 36417464
    [TBL] [Abstract][Full Text] [Related]  

  • 26. MVDroid: an android malicious VPN detector using neural networks.
    Seraj S; Khodambashi S; Pavlidis M; Polatidis N
    Neural Comput Appl; 2023 Apr; ():1-11. PubMed ID: 37362571
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Feature Subset Selection for Malware Detection in Smart IoT Platforms.
    Abawajy J; Darem A; Alhashmi AA
    Sensors (Basel); 2021 Feb; 21(4):. PubMed ID: 33669191
    [TBL] [Abstract][Full Text] [Related]  

  • 28. A Feature Space-Restricted Attention Attack on Medical Deep Learning Systems.
    Wang Z; Shu X; Wang Y; Feng Y; Zhang L; Yi Z
    IEEE Trans Cybern; 2023 Aug; 53(8):5323-5335. PubMed ID: 36240037
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments.
    Nahmias D; Cohen A; Nissim N; Elovici Y
    Neural Netw; 2020 Apr; 124():243-257. PubMed ID: 32028053
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Convolution neural network with batch normalization and inception-residual modules for Android malware classification.
    Liu T; Zhang H; Long H; Shi J; Yao Y
    Sci Rep; 2022 Aug; 12(1):13996. PubMed ID: 35978023
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Gradient Correction for White-Box Adversarial Attacks.
    Liu H; Ge Z; Zhou Z; Shang F; Liu Y; Jiao L
    IEEE Trans Neural Netw Learn Syst; 2023 Oct; PP():. PubMed ID: 37819820
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Adversarial Robustness of Deep Reinforcement Learning Based Dynamic Recommender Systems.
    Wang S; Cao Y; Chen X; Yao L; Wang X; Sheng QZ
    Front Big Data; 2022; 5():822783. PubMed ID: 35592793
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Analyzing and comparing the effectiveness of malware detection: A study of machine learning approaches.
    Azeem M; Khan D; Iftikhar S; Bawazeer S; Alzahrani M
    Heliyon; 2024 Jan; 10(1):e23574. PubMed ID: 38187275
    [TBL] [Abstract][Full Text] [Related]  

  • 34. EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT.
    Li S; Wang J; Wang Y; Zhou G; Zhao Y
    Heliyon; 2023 Feb; 9(2):e13520. PubMed ID: 36846700
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Cyber-Threat Detection System Using a Hybrid Approach of Transfer Learning and Multi-Model Image Representation.
    Ullah F; Ullah S; Naeem MR; Mostarda L; Rho S; Cheng X
    Sensors (Basel); 2022 Aug; 22(15):. PubMed ID: 35957440
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation.
    Ullah F; Alsirhani A; Alshahrani MM; Alomari A; Naeem H; Shah SA
    Sensors (Basel); 2022 Sep; 22(18):. PubMed ID: 36146112
    [TBL] [Abstract][Full Text] [Related]  

  • 37. A Malicious Code Detection Method Based on Stacked Depthwise Separable Convolutions and Attention Mechanism.
    Huang H; Du R; Wang Z; Li X; Yuan G
    Sensors (Basel); 2023 Aug; 23(16):. PubMed ID: 37631621
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Removing Adversarial Noise in X-ray Images via Total Variation Minimization and Patch-Based Regularization for Robust Deep Learning-based Diagnosis.
    Sheikh BUH; Zafar A
    J Imaging Inform Med; 2024 Jun; ():. PubMed ID: 38886292
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.
    Ghaleb FA; Alsaedi M; Saeed F; Ahmad J; Alasli M
    Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35591061
    [TBL] [Abstract][Full Text] [Related]  

  • 40. A Modified ResNeXt for Android Malware Identification and Classification.
    Albahar MA; ElSayed MS; Jurcut A
    Comput Intell Neurosci; 2022; 2022():8634784. PubMed ID: 35634062
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 8.