咨询与建议

限定检索结果

文献类型

  • 129 篇 期刊文献
  • 86 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 217 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 206 篇 工学
    • 186 篇 计算机科学与技术...
    • 70 篇 电气工程
    • 55 篇 信息与通信工程
    • 38 篇 软件工程
    • 13 篇 控制科学与工程
    • 5 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 2 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
  • 19 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 理学
    • 10 篇 化学
    • 3 篇 生物学
    • 2 篇 数学
  • 3 篇 农学
    • 3 篇 水产
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学

主题

  • 217 篇 android malware ...
  • 63 篇 machine learning
  • 30 篇 deep learning
  • 29 篇 static analysis
  • 19 篇 feature extracti...
  • 17 篇 mobile security
  • 15 篇 malware
  • 11 篇 feature selectio...
  • 9 篇 graph neural net...
  • 9 篇 function call gr...
  • 7 篇 classification
  • 6 篇 ensemble learnin...
  • 5 篇 malware classifi...
  • 5 篇 adversarial mach...
  • 5 篇 semantics
  • 5 篇 smart phones
  • 5 篇 codes
  • 5 篇 security
  • 5 篇 artificial intel...
  • 5 篇 training

机构

  • 5 篇 chinese acad sci...
  • 5 篇 univ chinese aca...
  • 4 篇 univ elect sci &...
  • 3 篇 univ sci & techn...
  • 3 篇 beijing univ tec...
  • 3 篇 harbin inst tech...
  • 3 篇 sichuan univ sch...
  • 3 篇 southwest univ s...
  • 3 篇 beijing univ pos...
  • 3 篇 west virginia un...
  • 2 篇 shandong prov ke...
  • 2 篇 hong kong polyte...
  • 2 篇 cheikh anta diop...
  • 2 篇 natl taiwan univ...
  • 2 篇 tsinghua univ de...
  • 2 篇 shandong univ pe...
  • 2 篇 fujian normal un...
  • 2 篇 univ basque coun...
  • 2 篇 univ basque coun...
  • 2 篇 xinjiang univ sc...

作者

  • 5 篇 ye yanfang
  • 5 篇 hou shifu
  • 4 篇 yuan wei
  • 4 篇 ouya samuel
  • 4 篇 zhu dali
  • 4 篇 vinod p.
  • 4 篇 zhang yiming
  • 3 篇 xue jingfeng
  • 3 篇 nazir ahsan
  • 3 篇 wajahat ahsan
  • 3 篇 wang ruoyu
  • 3 篇 chen zhenxiang
  • 3 篇 moonsamy veelash...
  • 3 篇 ge xiuting
  • 3 篇 mahmood tariq
  • 3 篇 li heng
  • 3 篇 conti mauro
  • 3 篇 luo xiapu
  • 3 篇 sezer sakir
  • 3 篇 bostani hamid

语言

  • 216 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=Android Malware Detection"
217 条 记 录,以下是161-170 订阅
排序:
AProctor - A practical on-device antidote for android malware  23
AProctor - A practical on-device antidote for Android malwar...
收藏 引用
Australian Computer Science Week (ACSW)
作者: Patel, Akash Kumar, Nitesh Handa, Anand Shukla, Sandeep K. IIT Kanpur C3i Ctr Kanpur India
As the number of smartphone users increases, the attacker's interest in breaching android security also increases. To protect the user from malware attacks and enhance his mobile security, we present AProctor, an ... 详细信息
来源: 评论
Unveiling vulnerabilities in deep learning-based malware detection: Differential privacy driven adversarial attacks
收藏 引用
COMPUTERS & SECURITY 2024年 146卷
作者: Taheri, Rahim Shojafar, Mohammad Arabikhan, Farzad Gegov, Alexander Univ Portsmouth Fac Technol Sch Comp Portsmouth England Univ Surrey Inst Commun Syst 5G & 6G Innovat Ctr 5G 6GIC Guildford England
The exponential increase of android malware creates a severe threat, motivating the development of machine learning and especially deep learning-based classifiers to detect and mitigate malicious applications. However... 详细信息
来源: 评论
Strengthening LLM ecosystem security: Preventing mobile malware from manipulating LLM-based applications
收藏 引用
INFORMATION SCIENCES 2024年 681卷
作者: Huang, Lu Xue, Jingfeng Wang, Yong Chen, Junbao Lei, Tianwei Beijing Inst Technol Beijing 100081 Peoples R China
Large language model (LLM) platform vendors have begun to make their models available for developers to build for different use cases. However, the emergence of LLM-based applications may raise security and privacy is... 详细信息
来源: 评论
AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks
收藏 引用
AD HOC NETWORKS 2024年 161卷
作者: Nawshin, Faria Unal, Devrim Hammoudeh, Mohammad Suganthan, Ponnuthurai N. Qatar Univ Coll Engn KINDI Comp Res Ctr Doha Qatar Qatar Univ Coll Engn Dept Comp Sci & Engn Doha Qatar King Fahd Univ Petr & Minerals Informat & Comp Sci Dhahran Saudi Arabia
The widespread usage of android-powered devices in the Internet of Things (IoT) makes them susceptible to evolving cybersecurity threats. Most healthcare devices in IoT networks, such as smart watches, smart thermomet... 详细信息
来源: 评论
TraceDroid: Detecting android malware by Trace of Privacy Leakage  17th
TraceDroid: Detecting Android Malware by Trace of Privacy Le...
收藏 引用
17th International Conference on Wireless Algorithms, Systems, and Applications (WASA)
作者: Wu, Yueqing Fu, Hao Zhang, Guoming Zhao, Bin Xu, Minghui Zou, Yifei Feng, Xiaotao Hu, Pengfei Shandong Univ Qingdao 266237 Peoples R China Univ Calif Davis Davis CA 95616 USA JD Com Amer Technol Corp Mountain View CA 94043 USA
Along with the popularity of the android operating system, 98% of mobile malware targets android devices [1], which has become one of the primary source for privacy leakage. Detecting malicious network transmissions i... 详细信息
来源: 评论
android malware Classification: Updating Features Through Incremental Learning Approach(UFILA)  24
Android Malware Classification: Updating Features Through In...
收藏 引用
24th International Conference on Advanced Communication Technology (ICACT) - Artificial Intelligence Technologies toward Cybersecurity
作者: Sawadogo, Zakaria Mendy, Gervais Dembelle, Jean Marie Ouya, Samuel Gaston Berger Univ Lab LANI St Louis Senegal Univ Cheikh Anta Diop Dakar Lab LITA Dakar Senegal
exponential growth of the use of connected objects, in particular of smartphones, is the consequence of the digitization of services. All types of applications, from the least critical to the most critical are availab... 详细信息
来源: 评论
android malware classification using convolutional neural network and LSTM
收藏 引用
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2021年 第4期17卷 307-318页
作者: Hosseini, Soodeh Nezhad, Ali Emamali Seilani, Hossein Shahid Bahonar Univ Kerman Fac Math & Comp Dept Comp Sci Kerman Iran Bahmanyar Univ Kerman Sch Comp Engn Kerman Iran
Hand phone devices are the latest technological developments of the 20th century. There is an increasing number of fishing, sniffing and other kinds of attacks in this field of technology. Although signature-based met... 详细信息
来源: 评论
Breaking the structure of MaMaDroid
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2023年 第1期228卷
作者: Berger, Harel Dvir, Amit Mariconti, Enrico Hajaj, Chen Georgetown Univ Comp Sci Dept 37th & O St NW Washington DC 20057 USA Ariel Univ Ariel Cyber Innovat Ctr Comp Sci Dept 65 Ramat HaGolan st IL-4076414 Ariel Israel UCL Jill Dando Inst Dept Secur & Crime Sci Gower St London WC1E 6BT England Data Sci & Artificial Intelligence Res Ctr Dept Ind Engn & Management 65 Ramat HaGolan st IL-4076414 Ariel Israel
android malware is a continuously expanding threat to billions of mobile users around the globe. detection systems are updated constantly to address these threats. However, a backlash takes the form of evasion attacks... 详细信息
来源: 评论
Towards a fair comparison and realistic evaluation framework of android malware detectors based on static analysis and machine learning
收藏 引用
COMPUTERS & SECURITY 2023年 124卷
作者: Molina-Coronado, Borja Mori, Usue Mendiburu, Alexander Miguel-Alonso, Jose Univ Basque Country UPV EHU Dept Comp Architecture & Technol Ps Manuel Lardizabal 1 Donostia San Sebastian 20018 Gipuzkoa Spain Univ Basque Country UPV EHU Dept Comp Sci & Artificial Intelligence Ps Manuel Lardizabal 1 Donostia San Sebastian 20018 Gipuzkoa Spain
As in other cybersecurity areas, machine learning (ML) techniques have emerged as a promising solution to detect android malware. In this sense, many proposals employing a variety of algorithms and feature sets have b... 详细信息
来源: 评论
MulAV: Multilevel and Explainable detection of android malware with Data Fusion  18th
MulAV: Multilevel and Explainable Detection of Android Malwa...
收藏 引用
18th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP)
作者: Li, Qun Chen, Zhenxiang Yan, Qiben Wang, Shanshan Ma, Kun Shi, Yuliang Cui, Lizhen Univ Jinan Sch Informat Sci & Engn Jinan 250022 Shandong Peoples R China Shandong Prov Key Lab Network Based Intelligent C Jinan 250022 Shandong Peoples R China Univ Nebraska Lincoln NE USA Shandong Univ Jinan 250101 Shandong Peoples R China
With the popularization of smartphones, the number of mobile applications has grown substantially. However, many malware are emerging and thus pose a serious threat to the user's mobile phones. malware detection h... 详细信息
来源: 评论