Abstract
I. INTRODUCTION
II. BACKGROUND
A. AI-applied Malware Detection
B. Adversarial Attacks
III. TOWARD ADVERSARY-ROBUST MALWARE DETECTION
A. Adversarial Training
B. Adversarial Detection
IV. SHORTCOMINGS AND RESEARCH DIRECTIONS
V. CONCLUSION
REFERENCES