no code implementations • 30 Apr 2019 • Li Chen, Carter Yagemann, Evan Downing
For both case studies, we first train deep learning models via transfer learning on malware images, demonstrate high classification effectiveness, apply an explanation method on the images, and correlate the results back to the samples to validate whether the algorithmic insights are consistent with security domain expertise.