A survey on malware detection with graph representation learning

T Bilot, N El Madhoun, K Al Agha, A Zouaoui - ACM Computing Surveys, 2024 - dl.acm.org
Malware detection has become a major concern due to the increasing number and
complexity of malware. Traditional detection methods based on signatures and heuristics …

A Survey on Graph Neural Networks for Intrusion Detection Systems: Methods, Trends and Challenges

M Zhong, M Lin, C Zhang, Z Xu - Computers & Security, 2024 - Elsevier
Intrusion detection systems (IDS) play a crucial role in maintaining network security. With the
increasing sophistication of cyber attack methods, traditional detection approaches are …

GNN-based beamforming for sum-rate maximization in MU-MISO networks

Y Li, Y Lu, B Ai, OA Dobre, Z Ding… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The advantages of graph neural networks (GNNs) in leveraging the graph topology of
wireless networks have drawn increasing attentions. This paper studies the GNN-based …

Rethinking causal relationships learning in graph neural networks

H Gao, C Yao, J Li, L Si, Y Jin, F Wu… - Proceedings of the AAAI …, 2024 - ojs.aaai.org
Graph Neural Networks (GNNs) demonstrate their significance by effectively modeling
complex interrelationships within graph-structured data. To enhance the credibility and …

Generating Robust Counterfactual Witnesses for Graph Neural Networks

D Qiu, M Wang, A Khan, Y Wu - arXiv preprint arXiv:2404.19519, 2024 - arxiv.org
This paper introduces a new class of explanation structures, called robust counterfactual
witnesses (RCWs), to provide robust, both counterfactual and factual explanations for graph …

Network Intrusion Detection Based on Feature Image and Deformable Vision Transformer Classification

K He, W Zhang, X Zong, L Lian - IEEE Access, 2024 - ieeexplore.ieee.org
Network intrusion detection technology has always been an indispensable protection
mechanism for industrial network security. The rise of new forms of network attacks has …

SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter

YY Chang, WY Wang, WC Peng - … of the AAAI Conference on Artificial …, 2024 - ojs.aaai.org
In the dynamic and rapidly evolving world of social media, detecting anomalous users has
become a crucial task to address malicious activities such as misinformation and …

CGAAD: Centrality-and Graph-Aware Deep Learning Model for Detecting Cyberattacks Targeting Industrial Control Systems in Critical Infrastructure

TNI Alrumaih, MJF Alenazi - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Industrial control systems (ICSs) are crucial in managing critical infrastructure, making their
security a paramount concern. In recent years, their widespread adoption, together with the …

An Analysis of Botnet Detection Using Graph Neural Network

F Alizadeh, M Khansari - 2023 13th International Conference on …, 2023 - ieeexplore.ieee.org
The use of artificial intelligence, especially Graph Neural Network (GNN), in solving cyber
security issues brings challenges. We address three challenges of GNN for botnet detection …

Enhancing Multi-Class Attack Detection in Graph Neural Network through Feature Rearrangement

HD Le, M Park - Electronics, 2024 - mdpi.com
As network sizes grow, attack schemes not only become more varied but also increase in
complexity. This diversification leads to a proliferation of attack variants, complicating the …