Review Article
A Review of Deep Learning Security and Privacy Defensive Techniques
Table 4
Survey of Deep Learning approaches, methods, and security applications.
| DL method | Citation | No of times cited (as of 17.01.2020) | Security application |
| Autoencoder | Hardy et al. [98] | 59 | Malware detection | Autoencoder | Rhode et al. [99] | 50 | Malware detection | Autoencoder | Kalash et al. [100] | 35 | Malware classification | Autoencoder | Wang and Yiu [101] | 17 | Malware classification | Autoencoder | Chalapathy and Chawla [102] | 61 | Anomaly detection | Autoencoder | Chen and Ye [103] | 7 | Adversarial malware attacks | Autoencoder | Maniath et al. [104] | 10 | Ransomware detection | Autoencoder | Zakaria [105] | - | Ransomware detection | Autoencoder | Demetrio [106] | 10 | Adversarial malware binaries | Autoencoder | James and Aimone [107] | 18 | File Type Identification | Autoencoder | Wang [108] | 132 | Traffic Identification | Autoencoder | Fadlullah et al. [109] | 238 | Network traffic control systems | Autoencoder | Aminanto et al. [110] | 46 | Wi-Fi impersonation detection | Autoencoder | Aceto et al. [111] | 34 | Mobile encrypted traffic | Autoencoder | Mi et al. [112] | 15 | Spam identification | Autoencoder | Shi et al. [113] | 57 | User authentication | Autoencoder | Catak and Yazi [114] | — | Malware classification | CNN | Gibert [115] | 33 | Malware classification | CNN | Cha et al. [116] | 517 | Crack damage detection | CNN | Murata and Yamanishi [117] | 01 | Download attack | CNN | Vinayakumar et al. [118] | 58 | Network intrusion detection | CNN | Wang et al. [119] | 109 | Malware traffic classification | RNN | Yin et al. [120] | 225 | Intrusion detection | CNN RNN | Maleh [121] | - | Malware classification | CNN RNN | Kolosnjaji et al. [122] | 179 | Malware detection | CNN RNN | Tobiyama et al. [123] | 98 | Malware detection | CNN RNN | Yu et al. [124] | 33 | Intrusion detection | CNN (dynamic) | Hill and Bellekens [125] | 03 | Malware detection | DNN | M.-J. Kang and J.-W. Kang [126] | 224 | Intrusion detection | DNN | Potluri and Diedrich [127] | 67 | Intrusion detection | DNN | Dahl et al. [128] | 283 | Malware classification | DNN | Sebastián et al. [129] | 146 | Massive malware labeling | DNN RNN | Mi et al. [130] | 15 | Insider threat | DNN RNN | Mi et al. [131] | 03 | Spam detection | GAN | Anderson et al. [132] | 67 | Intrusion detection | GAN | Yu et al. [133] | 23 | Character detection | GAN | Zhauniarovich et al. [134] | 20 | Malicious domains detection | RBM | Alrawashdeh and Purdy [135] | 63 | Intrusion detection | RBM | Yuan et al. [136] | 202 | Malware detection | RBM | Wang et al. [137] | 216 | Defect prediction | RBM | Chen et al. [138] | 67 | Detecting android malware |
|
|