The vulnerability of transformers-based malware detectors to adversarial attacks

Cyber attackers are coming up with increasingly sophisticated techniques to steal users’ sensitive information, encrypt documents to receive a ransom, or damage computer systems. As a result, computer scientists have been trying to create more effective techniques to detect and prevent cyber attacks.