Skip to main navigation
Skip to search
Skip to main content
Penn State Home
Help & FAQ
Home
Researchers
Research output
Research units
Equipment
Grants & Projects
Prizes
Activities
Search by expertise, name or affiliation
Adversarial examples for malware detection
Kathrin Grosse
, Nicolas Papernot
, Praveen Manoharan
, Michael Backes
,
Patrick McDaniel
Computer Science and Engineering
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
443
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Adversarial examples for malware detection'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Adversarial Examples
100%
Adversarial Training
25%
Adversary
25%
Classification Performance
25%
Computer Vision
25%
Defensive Mechanisms
25%
Distillation
25%
Existing Algorithms
25%
Highly Effective
25%
Machine Learning Models
25%
Malware
25%
Malware Detection
100%
Malware Sample
25%
Neural Network
25%
Performance Matching
25%
Computer Science
Adversarial Example
100%
Adversarial Machine Learning
25%
Classification Performance
25%
Computer Vision
25%
Learning System
25%
Machine Learning
25%
Malware
25%
Malware Detection
100%
Malware Sample
25%
Neural Network
25%