Review Article

A Review of Deep Learning Security and Privacy Defensive Techniques

Table 4

Survey of Deep Learning approaches, methods, and security applications.

DL methodCitationNo of times cited (as of 17.01.2020)Security application

AutoencoderHardy et al. [98]59Malware detection
AutoencoderRhode et al. [99]50Malware detection
AutoencoderKalash et al. [100]35Malware classification
AutoencoderWang and Yiu [101]17Malware classification
AutoencoderChalapathy and Chawla [102]61Anomaly detection
AutoencoderChen and Ye [103]7Adversarial malware attacks
AutoencoderManiath et al. [104]10Ransomware detection
AutoencoderZakaria [105]-Ransomware detection
AutoencoderDemetrio [106]10Adversarial malware binaries
AutoencoderJames and Aimone [107]18File Type Identification
AutoencoderWang [108]132Traffic Identification
AutoencoderFadlullah et al. [109]238Network traffic control systems
AutoencoderAminanto et al. [110]46Wi-Fi impersonation detection
AutoencoderAceto et al. [111]34Mobile encrypted traffic
AutoencoderMi et al. [112]15Spam identification
AutoencoderShi et al. [113]57User authentication
AutoencoderCatak and Yazi [114]Malware classification
CNNGibert [115]33Malware classification
CNNCha et al. [116]517Crack damage detection
CNNMurata and Yamanishi [117]01Download attack
CNNVinayakumar et al. [118]58Network intrusion detection
CNNWang et al. [119]109Malware traffic classification
RNNYin et al. [120]225Intrusion detection
CNN RNNMaleh [121]-Malware classification
CNN RNNKolosnjaji et al. [122]179Malware detection
CNN RNNTobiyama et al. [123]98Malware detection
CNN RNNYu et al. [124]33Intrusion detection
CNN (dynamic)Hill and Bellekens [125]03Malware detection
DNNM.-J. Kang and J.-W. Kang [126]224Intrusion detection
DNNPotluri and Diedrich [127]67Intrusion detection
DNNDahl et al. [128]283Malware classification
DNNSebastián et al. [129]146Massive malware labeling
DNN RNNMi et al. [130]15Insider threat
DNN RNNMi et al. [131]03Spam detection
GANAnderson et al. [132]67Intrusion detection
GANYu et al. [133]23Character detection
GANZhauniarovich et al. [134]20Malicious domains detection
RBMAlrawashdeh and Purdy [135]63Intrusion detection
RBMYuan et al. [136]202Malware detection
RBMWang et al. [137]216Defect prediction
RBMChen et al. [138]67Detecting android malware