共 114 条
[3]
Ali-Gombe A., 2016, P 5 PROGR PROT REV E, P1
[5]
Identifying Malicious Software Using Deep Residual Long-Short Term Memory
[J].
IEEE ACCESS,
2019, 7
:163128-163137
[6]
Static malware detection and attribution in android byte-code through an end-to-end deep system
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2020, 102
:112-126
[7]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[9]
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]
[10]
Arzt Steven., 2015, Proceedings of the 4th ACM SIGPLAN International Workshop on State of the Art in Program Analysis, P1