From: Using deep learning to solve computer security challenges: a survey
Order of Criteria for Paper Selection | 1 | 2 | 3 | 4 |
---|---|---|---|---|
RFBNN (Shin et al. 2015) | Pioneer | Top | Novelty | Citation |
EKLAVYA (Chua et al. 2017) | Top | Novelty | Citation | N/A |
ROPNN (Li et al. 2018) | Pioneer | Novelty | Effectiveness | N/A |
HeNet (Chen et al. 2018) | Effectiveness | Novelty | Citation | N/A |
Barnum (Yagemann et al. 2019) | Pioneer | Novelty | N/A | N/A |
CFG-CNN (Phan et al. 2017) | Representative | N/A | N/A | N/A |
50b(yte)-CNN(Millar et al. 2018) | Novelty | Effectiveness | N/A | N/A |
PCNN (Zhang et al. 2019) | Novelty | Effectiveness | N/A | N/A |
Resenberg (Rosenberg et al. 2018) | Novelty | Effectiveness | Top | Representative |
DeLaRosa (De La Rosa et al. 2018) | Novelty | Representative | N/A | N/A |
DeepLog (Du et al. 2017) | Pioneer | Top | Citation | N/A |
DeepMem (Song et al. 2018) | Pioneer | Top | N/A | N/A |
NeuZZ (Shi and Pei 2019) | Novelty | Top | Effectiveness | N/A |
Learn & Fuzz (Godefroid et al. 2017) | Pioneer | Novelty | Top | N/A |