共 162 条
[21]
Bhunia S.S., 2017, 2017 27 INT TEL NETW, V11, P1
[22]
Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792
[23]
Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection
[J].
IWSPA'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS,
2016,
:50-57
[24]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[27]
Chan PPK, 2014, INT CONF MACH LEARN, P82, DOI 10.1109/ICMLC.2014.7009096
[28]
Malware Collusion Attack against SVM: Issues and Countermeasures
[J].
APPLIED SCIENCES-BASEL,
2018, 8 (10)
[29]
StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware
[J].
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:377-388