共 20 条
- [1] Burkov, 2019, 100 PAGE MACHINE LEA
- [2] cs cornell, SVM LIGHT SUPPORT VE
- [3] cs waikato ac, WEK
- [5] Checking App Behavior Against App Descriptions [J]. 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014), 2014, : 1025 - 1035
- [6] DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 211 - 219
- [7] Jing Y., 2014, P 4 ACM C DATA APPL, P99
- [8] Lin J., 2014, P 10 S USABLE PRIVAC, P199
- [9] McCallister E., 2010, SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
- [10] Merlo A., 2017, SEC