咨询与建议

限定检索结果

文献类型

  • 124 篇 期刊文献
  • 87 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 213 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 203 篇 工学
    • 183 篇 计算机科学与技术...
    • 67 篇 电气工程
    • 54 篇 信息与通信工程
    • 39 篇 软件工程
    • 14 篇 控制科学与工程
    • 6 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 2 篇 机械工程
    • 2 篇 石油与天然气工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
  • 20 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 1 篇 公共管理
  • 13 篇 理学
    • 10 篇 化学
    • 3 篇 数学
    • 3 篇 生物学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 农学
    • 1 篇 水产

主题

  • 213 篇 android malware ...
  • 62 篇 machine learning
  • 30 篇 deep learning
  • 29 篇 static analysis
  • 18 篇 feature extracti...
  • 17 篇 mobile security
  • 14 篇 malware
  • 11 篇 feature selectio...
  • 9 篇 function call gr...
  • 8 篇 graph neural net...
  • 7 篇 classification
  • 6 篇 ensemble learnin...
  • 5 篇 malware classifi...
  • 5 篇 semantics
  • 5 篇 smart phones
  • 5 篇 codes
  • 5 篇 artificial intel...
  • 5 篇 training
  • 5 篇 convolutional ne...
  • 5 篇 dynamic analysis

机构

  • 5 篇 chinese acad sci...
  • 5 篇 univ chinese aca...
  • 3 篇 univ sci & techn...
  • 3 篇 beijing univ tec...
  • 3 篇 harbin inst tech...
  • 3 篇 southwest univ s...
  • 3 篇 beijing univ pos...
  • 3 篇 univ elect sci &...
  • 3 篇 west virginia un...
  • 2 篇 shandong prov ke...
  • 2 篇 hong kong polyte...
  • 2 篇 cheikh anta diop...
  • 2 篇 natl taiwan univ...
  • 2 篇 tsinghua univ de...
  • 2 篇 shandong univ pe...
  • 2 篇 fujian normal un...
  • 2 篇 univ basque coun...
  • 2 篇 univ basque coun...
  • 2 篇 xinjiang univ sc...
  • 2 篇 south china univ...

作者

  • 5 篇 ye yanfang
  • 5 篇 hou shifu
  • 4 篇 yuan wei
  • 4 篇 ouya samuel
  • 4 篇 zhu dali
  • 4 篇 vinod p.
  • 4 篇 zhang yiming
  • 3 篇 xue jingfeng
  • 3 篇 nazir ahsan
  • 3 篇 wajahat ahsan
  • 3 篇 wang ruoyu
  • 3 篇 chen zhenxiang
  • 3 篇 ge xiuting
  • 3 篇 mahmood tariq
  • 3 篇 li heng
  • 3 篇 conti mauro
  • 3 篇 luo xiapu
  • 3 篇 sezer sakir
  • 3 篇 liu zhen
  • 3 篇 wu di

语言

  • 211 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=Android Malware Detection"
213 条 记 录,以下是81-90 订阅
排序:
Fine-grained android malware detection based on Deep Learning  6
Fine-grained Android Malware Detection based on Deep Learnin...
收藏 引用
6th IEEE Conference on Communications and Network Security (CNS)
作者: Li, Dongfang Wang, Zhaoguo Xue, Yibo Tsinghua Univ Dept Comp Sci & Technol Beijing Peoples R China Harbin Inst Technol Sch Comp Sci & Technol Harbin Heilongjiang Peoples R China Tsinghua Univ Tsinghua Natl Lab Informat Sci & Tech Beijing Peoples R China
android smartphone users have been suffering from the security problems these years. There is a serious threat to the network security and privacy brought by the mobile malware. In this paper, we use the deep-learning... 详细信息
来源: 评论
DroidRadar: android malware detection Based on Global Sensitive Graph Embedding  20
DroidRadar: Android Malware Detection Based on Global Sensit...
收藏 引用
20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom)
作者: Song, Qige Zhang, Yongzheng Yao, Junliang Chinese Acad Sci Univ Chinese Acad Sci Sch Cyber Secur Inst Informat Engn Beijing Peoples R China
android application markets face severe threats of malware attacks. Existing learning-based malware detection approaches rely on easily obfuscated features or unscalable sophisticated graph analysis techniques. In thi... 详细信息
来源: 评论
Proposed New Features to Improve android malware detection  8
Proposed New Features to Improve Android Malware Detection
收藏 引用
8th International Symposium on Telecommunications (IST)
作者: Vajdi, Mahdi Torkaman, Atefeh Bahrololum, Marjan Tadayon, M. H. Salajegheh, Afshin ITRC Tehran Iran Islamic Azad Univ ITRC South Tehran Branch Tehran Iran Islamic Azad Univ South Tehran Branch Tehran Iran
In recent years, android has become most popular and largest installed operating systems in smartphones. The openness capability of android applications let the users to easily download many applications from markets.... 详细信息
来源: 评论
Research and implementation of android malware detection algorithm based on Graph Convolutional Networks  24
Research and implementation of Android malware detection alg...
收藏 引用
International Conference on Algorithms, Software Engineering, and Network Security (ASENS)
作者: Wang, Yue Kezierbieke, Hailati Chen, Qinglin Xinjiang Univ Coll Software Urumqi 830046 Xinjiang Peoples R China Xinjiang Univ Coll Informat Sci & Engn Urumqi 830046 Xinjiang Peoples R China
android malware detection is one of the research hotspots in the field of malicious software. Traditional rule-based and feature-based methods face challenges in handling large-scale android malware detection. This pa... 详细信息
来源: 评论
An android malware detection System Based on Behavior Comparison Analysis  17th
An Android Malware Detection System Based on Behavior Compar...
收藏 引用
17th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP)
作者: Tao, Jing Zhang, Yan Cao, Pengfei Wang, Zheng Zhao, Qiqi Xi An Jiao Tong Univ Minist Educ Key Lab Intelligent Networks & Network Secur Xian 710049 Peoples R China
At present, android malwares become more and more subtle and intelligent, after their invasion, they often detect whether the running environment is a real environment, to decide whether to perform their malicious beh... 详细信息
来源: 评论
TFDroid: android malware detection by Topics and Sensitive Data Flows Using Machine Learning Techniques  2
TFDroid: Android Malware Detection by Topics and Sensitive D...
收藏 引用
2nd IEEE International Conference on Information and Computer Technologies (ICICT)
作者: Lou, Songhao Cheng, Shaoyin Huang, Jingjing Jiang, Fan Univ Sci & Technol China Sch Comp Sci & Technol Hefei Anhui Peoples R China Univ Sci & Technol China Informat Technol Secur Evaluat Ctr Hefei 230027 Anhui Peoples R China
With explosive growth of android malware and due to the severity of its damages to smart phone users, efficient android malware detection methods are urgently needed. As is known to us, different categories of applica... 详细信息
来源: 评论
Two Phase Static Analysis Technique for android malware detection  15
Two Phase Static Analysis Technique for Android Malware Dete...
收藏 引用
3rd International Symposium on Women in Computing and Informatics (WCI)
作者: Kate, Priyadarshani M. Dhavale, Sunita V. Def Inst Adv Technol Dept Comp Engn Pune 411025 Maharashtra India
The growing popularity of android based smart phones has greatly fuelled the spread of android malware. Further, these malwares are evolving rapidly to escape from traditional signature -based detection methods. Hence... 详细信息
来源: 评论
ByteDroid: android malware detection Using Deep Learning on Bytecode Sequences  1
收藏 引用
13th Chinese Conference on Trusted Computing and Information Security (CTCIS)
作者: Zou, Kewen Luo, Xi Liu, Pengfei Wang, Weiping Wang, Haodong Cent South Univ Sch Comp Sci & Engn Changsha 410083 Peoples R China Hunan Police Acad Dept Informat Technol Changsha 410083 Peoples R China Cleveland State Univ Dept Elect Engn & Comp Sci Cleveland OH 44115 USA
The explosive growth of the android malware poses a great threat to users' privacy and sensitive personal information. It is urgent to develop an effective and efficient android malware detection system. Existing ... 详细信息
来源: 评论
Impact of datasets on machine learning based methods in android malware detection: an empirical study  21
Impact of datasets on machine learning based methods in Andr...
收藏 引用
21st IEEE International Conference on Software Quality, Reliability and Security (QRS)
作者: Ge, Xiuting Huang, Yifan Hui, Zhanwei Wang, Xiaojuan Cao, Xu Nanjing Univ State Key Lab Novel Software Technol Nanjing Jiangsu Peoples R China Mil Acad Sci Beijing Peoples R China Southwest Univ Sci & Technol Dept Comp Sci & Technol Mianyang Sichuan Peoples R China
For android malware detection, machine learning-based (ML-based) methods show promising performance. However, limited studies are performed to investigate the impact of factors related to datasets on ML-based methods,... 详细信息
来源: 评论
Mining API Calls and Permissions for android malware detection  13
Mining API Calls and Permissions for Android Malware Detecti...
收藏 引用
13th International Conference on Cryptology and Network Security (CANS)
作者: Sharma, Akanksha Dash, Subrat Kumar LNM Inst Informat Technol Dept Comp Sci & Engn Jaipur Rajasthan India
The popularity of android platform is increasing very sharply due to the large market share of android and openness in nature. The increased popularity is making android an enticing target for malwares. A worrying tre... 详细信息
来源: 评论