共 40 条
[1]
Burgess C., 2014, EUVIP 14, P1
[2]
Cortesi A., 2016, Tech. Rep.
[3]
Dadkhah M., 2014, INT J INFORM TECHNOL, V3, P1
[4]
Dahl GE, 2013, INT CONF ACOUST SPEE, P3422, DOI 10.1109/ICASSP.2013.6638293
[5]
FALOUTSOS C, 1991, P 7 IEEE INT C DAT E, P152
[6]
Malware Detection Using Perceptrons and Support Vector Machines
[J].
2009 COMPUTATION WORLD: FUTURE COMPUTING, SERVICE COMPUTATION, COGNITIVE, ADAPTIVE, CONTENT, PATTERNS,
2009,
:283-288
[7]
Gove R., 2014, Proc. VizSec, P72, DOI DOI 10.1145/2671491.2671496
[8]
WiP: Are cracked applications really free? An empirical analysis on Android devices
[J].
2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH),
2018,
:730-735
[9]
Viewpoint Invariant Pedestrian Recognition with an Ensemble of Localized Features
[J].
COMPUTER VISION - ECCV 2008, PT I, PROCEEDINGS,
2008, 5302
:262-275
[10]
Han B, 2014, SCI WORLD J, DOI [10.1155/2014/724804, 10.1155/2014/132713]