no code implementations • 13 Apr 2023 • Fang Zhengxin, Yuan Yi, Zhang Jingyu, LIU Yue, Mu Yuechen, Lu Qinghua, Xu Xiwei, Wang Jeff, Wang Chen, Zhang Shuai, Chen Shiping
We hope that this paper can serve as a quick reference manual (a survey of surveys) for newcomers (e. g., researchers, practitioners) of ML to get an overview of the MLOps process, as well as a good understanding of the key technologies used in each step of the ML process, and know where to find more details.
no code implementations • Journal of Cyber Security 2021 • LIU Yue, LIU Baoxu, ZHAO Zihao, LIU Chaoge, WANG Xiaoxi, WU Xianda
For this reason, this paper proposes a mali- cious Powershell code detection method based on random forest features combination and deep learning.