Search Results for author: Mark Stamp

Found 42 papers, 4 papers with code

Feature Analysis of Encrypted Malicious Traffic

no code implementations6 Dec 2023 Anish Singh Shekhawat, Fabio Di Troia, Mark Stamp

In this paper, we apply three machine learning techniques to the problem of distinguishing malicious encrypted HTTP traffic from benign encrypted traffic and obtain results comparable to previous work.

Social Media Bot Detection using Dropout-GAN

no code implementations9 Nov 2023 Anant Shukla, Martin Jurecek, Mark Stamp

Bot activity on social media platforms is a pervasive problem, undermining the credibility of online discourse and potentially leading to cybercrime.

Data Augmentation

A Comparison of Adversarial Learning Techniques for Malware Detection

no code implementations19 Aug 2023 Pavla Louthánová, Matouš Kozák, Martin Jureček, Mark Stamp

Machine learning has proven to be a useful tool for automated malware detection, but machine learning models have also been shown to be vulnerable to adversarial attacks.

Malware Detection

Hidden Markov Models with Random Restarts vs Boosting for Malware Detection

no code implementations17 Jul 2023 Aditya Raghavan, Fabio Di Troia, Mark Stamp

One machine learning technique that has been used widely in the field of pattern matching in general-and malware detection in particular-is hidden Markov models (HMMs).

Malware Detection

A Natural Language Processing Approach to Malware Classification

no code implementations7 Jul 2023 Ritik Mehta, Olha Jurečková, Mark Stamp

Many different machine learning and deep learning techniques have been successfully employed for malware detection and classification.

Classification Feature Engineering +1

Keystroke Dynamics for User Identification

no code implementations7 Jul 2023 Atharva Sharma, Martin Jureček, Mark Stamp

In previous research, keystroke dynamics has shown promise for user authentication, based on both fixed-text and free-text data.

Classifying World War II Era Ciphers with Machine Learning

no code implementations2 Jul 2023 Brooke Dalton, Mark Stamp

We also find that ciphers that are more similar in design are somewhat more challenging to distinguish, but not as difficult as might be expected.

Steganographic Capacity of Deep Learning Models

no code implementations25 Jun 2023 Lei Zhang, Dong Li, Olha Jurečková, Mark Stamp

We find that the steganographic capacity of the learning models tested is surprisingly high, and that in each case, there is a clear threshold after which model performance rapidly degrades.

Malware Classification

Creating Valid Adversarial Examples of Malware

1 code implementation23 Jun 2023 Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia

Machine learning is becoming increasingly popular as a go-to approach for many tasks due to its world-class results.

Malware Detection reinforcement-learning +1

Classification and Online Clustering of Zero-Day Malware

no code implementations1 May 2023 Olha Jurečková, Martin Jureček, Mark Stamp, Fabio Di Troia, Róbert Lórencz

Based on the classification score of the multilayer perceptron, we determined which samples would be classified and which would be clustered into new malware families.

Classification Clustering +1

An Empirical Analysis of the Shift and Scale Parameters in BatchNorm

no code implementations22 Mar 2023 Yashna Peerthum, Mark Stamp

To conduct our experiments, we implement two new optimizers in PyTorch, namely, a version of BatchNorm that we refer to as AffineLayer, which includes the re-parameterization step without normalization, and a version with just the normalization step, that we call BatchNorm-minus.

A Comparison of Graph Neural Networks for Malware Classification

no code implementations22 Mar 2023 Vrinda Malhotra, Katerina Potika, Mark Stamp

Traditional detection strategies, such as signature scanning, rely on manual analysis of malware to extract relevant features, which is labor intensive and requires expert knowledge.

Graph Classification Malware Classification

Predicting Pedestrian Crosswalk Behavior Using Convolutional Neural Networks

no code implementations8 Aug 2022 Eric Liang, Mark Stamp

After extensive testing of our system in real-world environments, we conclude that it is feasible as a back-up system that can compliment existing crosswalk buttons, and thereby improve the overall safety of crossing the street.

Multifamily Malware Models

no code implementations27 Jun 2022 Samanvitha Basole, Fabio Di Troia, Mark Stamp

When training a machine learning model, there is likely to be a tradeoff between accuracy and the diversity of the dataset.

BIG-bench Machine Learning Malware Detection

Darknet Traffic Classification and Adversarial Attacks

no code implementations12 Jun 2022 Nhien Rust-Nguyen, Mark Stamp

Previous research has employed machine learning and deep learning techniques to automate the detection of darknet traffic in an attempt to block these criminal activities.

Adversarial Attack BIG-bench Machine Learning +2

Generative Adversarial Networks and Image-Based Malware Classification

no code implementations8 Jun 2022 Huy Nguyen, Fabio Di Troia, Genya Ishigaki, Mark Stamp

We also evaluate the utility of the GAN generative model for adversarial attacks on image-based malware detection.

BIG-bench Machine Learning Classification +1

Hidden Markov Models with Momentum

no code implementations8 Jun 2022 Andrew Miller, Fabio Di Troia, Mark Stamp

In this research, we experiment with adding momentum to the Baum-Welch expectation-maximization algorithm for training Hidden Markov Models.

Convolutional Neural Networks for Image Spam Detection

no code implementations2 Apr 2022 Tazmina Sharmin, Fabio Di Troia, Katerina Potika, Mark Stamp

In this research, we consider the problem of image spam detection, based on image analysis.

Spam detection

Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication

no code implementations3 Oct 2021 Elliu Huang, Fabio Di Troia, Mark Stamp

Although prior research has shown that deep learning models are vulnerable to adversarial attacks, relatively little research has been done in the adversarial domain for behavioral biometrics.

Adversarial Attack BIG-bench Machine Learning +1

Clickbait Detection in YouTube Videos

no code implementations26 Jul 2021 Ruchira Gothankar, Fabio Di Troia, Mark Stamp

YouTube videos often include captivating descriptions and intriguing thumbnails designed to increase the number of views, and thereby increase the revenue for the person who posted the video.

Clickbait Detection

Computer-Aided Diagnosis of Low Grade Endometrial Stromal Sarcoma (LGESS)

no code implementations9 Jul 2021 Xinxin Yang, Mark Stamp

Low grade endometrial stromal sarcoma (LGESS) is rare form of cancer, accounting for about 0. 2% of all uterine cancer cases.

Auxiliary-Classifier GAN for Malware Analysis

no code implementations4 Jul 2021 Rakesh Nagaraju, Mark Stamp

In this research, we generate fake malware images using auxiliary classifier GANs (AC-GAN), and we consider the effectiveness of various techniques for classifying the resulting images.

Malware Analysis

Free-Text Keystroke Dynamics for User Authentication

no code implementations1 Jul 2021 Jianwei Li, Han-Chih Chang, Mark Stamp

In this research, we consider the problem of verifying user identity based on keystroke dynamics obtained from free-text.

Feature Engineering

Machine Learning and Deep Learning for Fixed-Text Keystroke Dynamics

no code implementations1 Jul 2021 Han-Chih Chang, Jianwei Li, Ching-Seh Wu, Mark Stamp

Keystroke dynamics can be used to analyze the way that users type by measuring various aspects of keyboard input.

BIG-bench Machine Learning

Machine Learning-Based Analysis of Free-Text Keystroke Dynamics

no code implementations1 Jul 2021 Han-Chih Chang, Jianwei Li, Mark Stamp

Keystroke dynamics can be used to analyze the way that a user types based on various keyboard input.

BIG-bench Machine Learning

CNN vs ELM for Image-Based Malware Classification

no code implementations24 Mar 2021 Mugdha Jain, William Andreopoulos, Mark Stamp

In this paper, we conduct experiments to train and evaluate machine learning models for malware classification, based on features that can be obtained without disassembly or execution of code.

BIG-bench Machine Learning Classification +2

Cluster Analysis of Malware Family Relationships

no code implementations7 Mar 2021 Samanvitha Basole, Mark Stamp

We perform clustering based on pairs of families and use the results to determine relationships between families.

Clustering

A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classification

no code implementations7 Mar 2021 Aniket Chandak, Wendy Lee, Mark Stamp

We show that we can obtain better classification accuracy based on these feature embeddings, as compared to HMM experiments that directly use the opcode sequences, and serve to establish a baseline.

Classification Feature Engineering +4

Sentiment Analysis for Troll Detection on Weibo

no code implementations7 Mar 2021 Zidong Jiang, Fabio Di Troia, Mark Stamp

We employ the resulting techniques to develop and test a sentiment analysis approach for troll detection, based on a variety of machine learning strategies.

Sentence Sentence segmentation +1

Universal Adversarial Perturbations and Image Spam Classifiers

no code implementations7 Mar 2021 Andy Phung, Mark Stamp

In this chapter, we evaluate numerous adversarial techniques for the purpose of attacking deep learning-based image spam classifiers.

Adversarial Attack Spam detection

On Ensemble Learning

1 code implementation7 Mar 2021 Mark Stamp, Aniket Chandak, Gavin Wong, Allen Ye

Our common framework and empirical results are an effort to bring some sense of order to the chaos that is evident in the evolving field of ensemble learning -- both within the narrow confines of the malware analysis problem, and in the larger realm of machine learning in general.

BIG-bench Machine Learning Ensemble Learning +1

Malware Classification Using Long Short-Term Memory Models

no code implementations3 Mar 2021 Dennis Dang, Fabio Di Troia, Mark Stamp

We find that a model consisting of word embedding, biLSTMs, and CNN layers performs best in our malware classification experiments.

Classification General Classification +1

Malware Classification with GMM-HMM Models

no code implementations3 Mar 2021 Jing Zhao, Samanvitha Basole, Mark Stamp

Discrete hidden Markov models (HMM) are often applied to malware detection and classification problems.

Classification General Classification +1

Transfer Learning for Image-Based Malware Classification

1 code implementation21 Jan 2019 Niket Bhodia, Pratikkumar Prajapati, Fabio Di Troia, Mark Stamp

In this paper, we consider the problem of malware detection and classification based on image analysis.

Classification General Classification +2

A Comparative Analysis of Android Malware

no code implementations21 Jan 2019 Neeraj Chavan, Fabio Di Troia, Mark Stamp

In this paper, we present a comparative analysis of benign and malicious Android applications, based on static features.

Binary Classification Classification +2

Malware Detection Using Dynamic Birthmarks

no code implementations6 Jan 2019 Swapna Vemparala, Fabio Di Troia, Corrado A. Visaggio, Thomas H. Austin, Mark Stamp

In this paper, we explore the effectiveness of dynamic analysis techniques for identifying malware, using Hidden Markov Models (HMMs) and Profile Hidden Markov Models (PHMMs), both trained on sequences of API calls.

Malware Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.