咨询与建议

限定检索结果

文献类型

  • 128 篇 期刊文献
  • 86 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 216 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 206 篇 工学
    • 186 篇 计算机科学与技术...
    • 70 篇 电气工程
    • 55 篇 信息与通信工程
    • 38 篇 软件工程
    • 13 篇 控制科学与工程
    • 5 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 2 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
  • 19 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 理学
    • 10 篇 化学
    • 3 篇 生物学
    • 2 篇 数学
  • 3 篇 农学
    • 3 篇 水产
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学

主题

  • 216 篇 android malware ...
  • 62 篇 machine learning
  • 30 篇 deep learning
  • 29 篇 static analysis
  • 19 篇 feature extracti...
  • 17 篇 mobile security
  • 15 篇 malware
  • 11 篇 feature selectio...
  • 9 篇 graph neural net...
  • 9 篇 function call gr...
  • 7 篇 classification
  • 6 篇 ensemble learnin...
  • 5 篇 malware classifi...
  • 5 篇 adversarial mach...
  • 5 篇 semantics
  • 5 篇 smart phones
  • 5 篇 codes
  • 5 篇 security
  • 5 篇 artificial intel...
  • 5 篇 training

机构

  • 5 篇 chinese acad sci...
  • 5 篇 univ chinese aca...
  • 4 篇 univ elect sci &...
  • 3 篇 univ sci & techn...
  • 3 篇 beijing univ tec...
  • 3 篇 harbin inst tech...
  • 3 篇 sichuan univ sch...
  • 3 篇 southwest univ s...
  • 3 篇 beijing univ pos...
  • 3 篇 west virginia un...
  • 2 篇 shandong prov ke...
  • 2 篇 hong kong polyte...
  • 2 篇 cheikh anta diop...
  • 2 篇 natl taiwan univ...
  • 2 篇 tsinghua univ de...
  • 2 篇 shandong univ pe...
  • 2 篇 fujian normal un...
  • 2 篇 univ basque coun...
  • 2 篇 univ basque coun...
  • 2 篇 xinjiang univ sc...

作者

  • 5 篇 ye yanfang
  • 5 篇 hou shifu
  • 4 篇 yuan wei
  • 4 篇 ouya samuel
  • 4 篇 zhu dali
  • 4 篇 vinod p.
  • 4 篇 zhang yiming
  • 3 篇 xue jingfeng
  • 3 篇 nazir ahsan
  • 3 篇 wajahat ahsan
  • 3 篇 wang ruoyu
  • 3 篇 chen zhenxiang
  • 3 篇 moonsamy veelash...
  • 3 篇 ge xiuting
  • 3 篇 mahmood tariq
  • 3 篇 li heng
  • 3 篇 conti mauro
  • 3 篇 luo xiapu
  • 3 篇 sezer sakir
  • 3 篇 bostani hamid

语言

  • 215 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=Android Malware Detection"
216 条 记 录,以下是61-70 订阅
排序:
BERTDetect: A Neural Topic Modelling Approach for android malware detection  25
BERTDetect: A Neural Topic Modelling Approach for Android Ma...
收藏 引用
Companion Proceedings of the ACM on Web Conference 2025
作者: Nishavi Ranaweera Jiarui Xu Suranga Seneviratne Aruna Seneviratne University of New South Wales Sydney Australia University of Sydney Sydney Australia
Web access today occurs predominantly through mobile devices, with android representing a significant share of the mobile device market. This widespread usage makes android a prime target for malicious attacks. Despit... 详细信息
来源: 评论
Impact of Code Deobfuscation and Feature Interaction in android malware detection
收藏 引用
IEEE ACCESS 2021年 9卷 123208-123219页
作者: Chen, Yun-Chung Chen, Hong-Yen Takahashi, Takeshi Sun, Bo Lin, Tsung-Nan Natl Taiwan Univ Grad Inst Elect Engn Taipei 10617 Taiwan Natl Taiwan Univ Grad Inst Commun Engn Taipei 10617 Taiwan Natl Inst Informat & Commun Technol Koganei Tokyo 1848795 Japan Natl Taiwan Univ Dept Elect Engn Taipei 10617 Taiwan Natl Taiwan Univ Grad Inst Commun Engn GICE Taipei 10617 Taiwan
With more than three million applications already in the android marketplace, various malware detection systems based on machine learning have been proposed to prevent attacks from cybercriminals;most of these systems... 详细信息
来源: 评论
TSDroid: A Novel android malware detection Framework Based on Temporal & Spatial Metrics in IoMT
收藏 引用
ACM TRANSACTIONS ON SENSOR NETWORKS 2023年 第3期19卷 51-51页
作者: Zhang, Gaofeng Li, Yu Bao, Xudan Chakarborty, Chinmay Rodrigues, Joel J. P. C. Zheng, Liping Zhang, Xuyun Qi, Lianyong Khosravi, Mohammad R. Hefei Univ Technol Hefei Peoples R China Hefei Univ Technol Intelligent Interconnected Syst Lab Anhui Prov Hefei Peoples R China Birla Inst Technol Dept Elect Commun Engn Mesra 835215 Jharkhand India Univ Fed Piaui Teresina PI Brazil China Univ Petr East China Coll Comp Sci & Technol Qingdao Peoples R China Inst Telecomunicacoes Covilha Portugal Macquarie Univ Sydney Australia Qufu Normal Univ Qufu Peoples R China Persian Gulf Univ Bushehr Iran Shiraz Univ Technol Shiraz Iran
In the era of smart healthcare tremendous growth, plenty of smart devices facilitate cognitive computing for the purposes of lower cost, smarter diagnostic, etc. android system has been widely used in the field of IoM... 详细信息
来源: 评论
android malware analysis and detection: A systematic review
收藏 引用
EXPERT SYSTEMS 2025年 第1期42卷
作者: Dahiya, Anuradha Singh, Sukhdip Shrivastava, Gulshan Deenbandhu Chhotu Ram Univ Sci & Technol Dept CSE Murthal India Galgotias Univ Dept CSE Greater Noida India
android malware has been emerged as a significant threat, which includes exposure of confidential information, misrepresentation of facts and execution of applications without the knowledge of the users. malware analy... 详细信息
来源: 评论
android malware detection using Convolutional Deep Neural Networks  4
Android Malware Detection using Convolutional Deep Neural Ne...
收藏 引用
4th International Conference on Advanced Aspects of Software Engineering (ICAASE)
作者: Bourebaa, Fatima Benmohammed, Mohamed Univ Constantine 2 Abdelhamid Mehri Lire Lab Constantine Algeria
Deep learning in general and convolutional architectures, in particular, have pushed the limits of the current state of the art in the field of computer vision and the processing of natural languages and speech. Recen... 详细信息
来源: 评论
android malware detection based on multi-category and tag level ratio  5
Android malware detection based on multi-category and tag le...
收藏 引用
IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC)
作者: Yang, Zongjing Long, Zhaohua Chongqing Univ Posts & Telecommun Sch Comp Sci & Technol Chongqing 400000 Peoples R China
The arrival of the mobile platforms has brought much convenience to our life, people start to get used to social events, online shopping, and business activities with mobile phones, especially those with the android s... 详细信息
来源: 评论
Structural Attack against Graph Based android malware detection  21
Structural Attack against Graph Based Android Malware Detect...
收藏 引用
ACM SIGSAC Conference on Computer and Communications Security (ACM CCS)
作者: Zhao, Kaifa Zhou, Hao Zhu, Yulin Zhan, Xian Zhou, Kai Li, Jianfeng Yu, Le Yuan, Wei Luo, Xiapu Hong Kong Polytech Univ Hong Kong Peoples R China Huazhong Univ Sci & Technol Wuhan Peoples R China
malware detection techniques achieve great success with deeper insight into the semantics of malware. Among existing detection techniques, function call graph (FCG) based methods achieve promising performance due to t... 详细信息
来源: 评论
Robust android malware detection against Adversarial Example Attacks  21
Robust Android Malware Detection against Adversarial Example...
收藏 引用
30th World Wide Web Conference (WWW)
作者: Li, Heng Zhou, Shiyao Yuan, Wei Luo, Xiapu Gao, Cuiying Chen, Shuiyan Huazhong Univ Sci & Technol Wuhan Peoples R China Hong Kong Polytech Univ Hong Kong Peoples R China
Adversarial examples pose severe threats to android malware detection because they can render the machine learning based detection systems useless. How to effectively detect android malware under various adversarial e... 详细信息
来源: 评论
TL-GNN: android malware detection Using Transfer Learning
Applied AI Letters
收藏 引用
Applied AI Letters 2024年 第3期5卷
作者: Raza, Ali Qaisar, Zahid Hussain Aslam, Naeem Faheem, Muhammad Ashraf, Muhammad Waqar Chaudhry, Muhammad Naman Department of Computer Science NFC Institute of Engineering and Technology Multan Pakistan Department of Computing and Emerging Technologies Emerson University Multan Pakistan Department of Computing Science School of Technology and Innovations University of Vaasa Vaasa Finland Department of Computer Engineering Bahauddin Zakariya University Multan Pakistan
malware growth has accelerated due to the widespread use of android applications. android smartphone attacks have increased due to the widespread use of these devices. While deep learning models offer high efficiency ... 详细信息
来源: 评论
You are what the permissions told me! android malware detection based onhybrid tactics
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022年 66卷
作者: Wang, Huanran Zhang, Weizhe He, Hui Harbin Inst Technol Sch Cyberspace Sci Harbin Peoples R China Peng Cheng Lab Cyberspace Secur Res Ctr Shenzhen Peoples R China
Recent years have witnessed a significant increase in the use of android devices in many aspects of our ***, users can download android apps from third-party channels, which provides numerous opportunitiesfor malware.... 详细信息
来源: 评论