Method for Generating Malicious Code Adversarial Samples Based on Genetic Algorithm

被引:0
|
作者
Yan, Jia [1 ,2 ]
Yan, Jia [1 ,2 ]
Nie, Chujiang [1 ,2 ]
Su, Purui [1 ,2 ]
机构
[1] School of Computer Science and Technology, University of Chinese Academy of Sciences, Beijing,100190, China
[2] Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing,100190, China
关键词
D O I
10.11999/JEITdzyxxxb-42-9-2126
中图分类号
学科分类号
摘要
引用
收藏
页码:2126 / 2133
相关论文
共 50 条
  • [1] Method for Generating Malicious Code Adversarial Samples Based on Genetic Algorithm
    Yan Jia
    Nie Chujiang
    Su Purui
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (09) : 2126 - 2133
  • [2] Adversarial training driven malicious code detection enhancement method
    Liu, Yanhua
    Li, Jiaqi
    Ou, Zhengui
    Gao, Xiaoling
    Liu, Ximeng
    Meng, Weizhi
    Liu, Baoxu
    [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (09): : 169 - 180
  • [3] An Efficient Method for Generating Adversarial Malware Samples
    Ding, Yuxin
    Shao, Miaomiao
    Nie, Cai
    Fu, Kunyang
    [J]. ELECTRONICS, 2022, 11 (01)
  • [4] An Android Malicious Code Detection Method Based on Improved DCA Algorithm
    Wang, Chundong
    Li, Zhiyuan
    Gong, Liangyi
    Mo, Xiuliang
    Yang, Hong
    Zhao, Yi
    [J]. ENTROPY, 2017, 19 (02):
  • [5] Adversarial sample generation technology of malicious code based on LIME
    Huang, Tianbo
    Li, Chengyang
    Liu, Yongzhi
    Li, Denghui
    Wen, Weiping
    [J]. Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2022, 48 (02): : 331 - 338
  • [6] A generative adversarial network-based method for generating negative financial samples
    Zhang, Zhaohui
    Yang, Lijun
    Chen, Ligong
    Liu, Qiuwen
    Meng, Ying
    Wang, Pengwei
    Li, Maozhen
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (02)
  • [7] A method of generating membership functions based on genetic algorithm
    Wu, Y
    Shi, HB
    [J]. NEW TECHNOLOGIES ON COMPUTER SOFTWARE, 1997, : 185 - 190
  • [8] Test Paper Generating Method Based on Genetic Algorithm
    Li Yan
    Li Shuhong
    Li Xiurong
    [J]. AASRI CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND BIOINFORMATICS, 2012, 1 : 549 - 553
  • [9] The Algorithm of Malicious Code Detection Based on Data Mining
    Yang, Yubo
    Zhao, Yang
    Liu, Xiabi
    [J]. GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I, 2017, 1864
  • [10] Generating Adversarial Text Samples
    Samanta, Suranjana
    Mehta, Sameep
    [J]. ADVANCES IN INFORMATION RETRIEVAL (ECIR 2018), 2018, 10772 : 744 - 749