Recognising a person with just one face or ear image is a challenging sub-problem in the field of biometric recognition. The difficulty arises as parameter estimation becomes challenging from a single image. This arti...
详细信息
The development of smart mobile devices brings convenience to people's lives, but also provides a breeding ground for Android malware. The sharp increasing malware poses a disastrous threat to personal privacy in ...
详细信息
The development of smart mobile devices brings convenience to people's lives, but also provides a breeding ground for Android malware. The sharp increasing malware poses a disastrous threat to personal privacy in the information age. Based on the fact that malware heavily resorts to system application programming interfaces(APIs) to perform its malicious actions,there has been a variety of API-based detection *** of them do not consider the relationship between APIs. We contribute a new approach based on the enhanced API order for Android malware detection, named EAODroid, which learns the similarity of system APIs from a large number of API sequences and groups similar APIs into clusters. The extracted API clusters are further used to enhance the original API calls executed by an app to characterize behaviors and perform classification. We perform multi-dimensional experiments to evaluate EAODroid on three datasets with ground truth. We compare with many state-of-the-art works, showing that EAODroid achieves effective performance in Android malware detection.
Clinical decision support systems (CDSSs) can effectively detect illnesses such as breast cancer (BC) using a variety of medical imaging techniques. BC is a key factor contributing to the rise in the death rate among ...
详细信息
The popularity of the Internet and digital consumer gadgets has fundamentally changed our society and daily lives by making digital data collection, transmission, and storage exceedingly easy and convenient. However, ...
详细信息
Unusual crowd analysis is an important problem in surveillance video due to their features cannot be extracted efficiently on the crowd scenes. To overcome this challenge, this paper introduced the appearance and moti...
详细信息
The event management mechanism matches messages that have been subscribed to and events that have been published. To identify the subscriptions that correspond to the occurrence inside the category, it must first run ...
详细信息
Standard chest X-rays are used to diagnose pneumonia, an infection of the lungs that can be highly contagious due to being caused by viruses and bacteria. Nevertheless, this method is more time-consuming and routine-d...
详细信息
With the exponential development in the usage of cloud data storage across a variety of applications, developing effective access control measures to secure sensitive user data has become critical. This research prese...
详细信息
In recent days, a wireless body area network (WBAN) has been developed as part of the Internet of Things (IoT) with sensors and actuators in three different modes, building its network, i.e., in-body sensors, wearable...
详细信息
The enormous developments of gaming devices as well as mobile apps have increased the demand of bandwidth. Development of wireless applications has been affected because of the insufficient spectrum resources in the 3...
详细信息
暂无评论