Skip to content

Commit c04e28c

Browse files
authored
Update README.md
1 parent 3484985 commit c04e28c

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

malconv/README.md

+2-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ For more details about MalConv, please see (and cite) the [original paper](https
66
Raff, Edward, et al. "Malware detection by eating a whole exe." arXiv preprint arXiv:1710.09435 (2017).
77
```
88

9-
If you use the pre-trained weights or code in your work, we also ask that you please cite [our paper](https://arxiv.org/pdf/1804.04637.pdf) for the implementation of MalConv, is it differs in a few subtle ways from the original.
9+
If you use the pre-trained weights or code in your work, we also ask that you please cite [our paper](https://arxiv.org/pdf/1804.04637.pdf) for the implementation of MalConv, as it differs in a few subtle ways from the original.
1010

1111
```
1212
H. Anderson and P. Roth, "EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models”, in ArXiv e-prints. Apr. 2018.
@@ -29,6 +29,7 @@ H. Anderson and P. Roth, "EMBER: An Open Dataset for Training Static PE Malware
2929
The code provided is instructional and nonfunctional. With a few minor changes, it can be made functional. In particular, you must provide a URL to fetch file contents by sha256 hash.
3030

3131
## How does this MalConv model differ from that of Raff et al.?
32+
* Our model was trained on binary files from labeled samples in the EMBER training set.
3233
* The original paper used `batch_size = 256` and `SGD(lr=0.01, momentum=0.9, decay=UNDISCLOSED, nesterov=True )`. We used
3334
`decay=1e-3` and `batch_size=100`.
3435
* It is unknown whether the original paper used a special symbol for padding.

0 commit comments

Comments
 (0)