Graph neural networks in node classification: survey and evaluation

S Xiao, S Wang, Y Dai, W Guo - Machine Vision and Applications, 2022 - Springer
Neural networks have been proved efficient in improving many machine learning tasks such
as convolutional neural networks and recurrent neural networks for computer vision and …

The threat of offensive ai to organizations

Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei… - Computers & …, 2023 - Elsevier
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …

Dos and don'ts of machine learning in computer security

D Arp, E Quiring, F Pendlebury, A Warnecke… - 31st USENIX Security …, 2022 - usenix.org
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …

Combining graph neural networks with expert knowledge for smart contract vulnerability detection

Z Liu, P Qian, X Wang, Y Zhuang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Smart contract vulnerability detection draws extensive attention in recent years due to the
substantial losses caused by hacker attacks. Existing efforts for contract security analysis …

Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks

Y Zhou, S Liu, J Siow, X Du… - Advances in neural …, 2019 - proceedings.neurips.cc
Vulnerability identification is crucial to protect the software systems from attacks for cyber
security. It is especially important to localize the vulnerable functions among the source code …

Combining graph-based learning with automated data collection for code vulnerability detection

H Wang, G Ye, Z Tang, SH Tan… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
This paper presents FUNDED (Flow-sensitive vUl-Nerability coDE Detection), a novel
learning framework for building vulnerability detection models. Funded leverages the …

Graph matching networks for learning the similarity of graph structured objects

Y Li, C Gu, T Dullien, O Vinyals… - … conference on machine …, 2019 - proceedings.mlr.press
This paper addresses the challenging problem of retrieval and matching of graph structured
objects, and makes two key contributions. First, we demonstrate how Graph Neural …

How machine learning is solving the binary function similarity problem

A Marcelli, M Graziano, X Ugarte-Pedrero… - 31st USENIX Security …, 2022 - usenix.org
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …

Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization

SHH Ding, BCM Fung… - 2019 ieee symposium on …, 2019 - ieeexplore.ieee.org
Reverse engineering is a manually intensive but necessary technique for understanding the
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …

GDroid: Android malware detection and classification with graph convolutional network

H Gao, S Cheng, W Zhang - Computers & Security, 2021 - Elsevier
The dramatic increase in the number of malware poses a serious challenge to the Android
platform and makes it difficult for malware analysis. In this paper, we propose a novel …