共 36 条
[1]
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[2]
[Anonymous], 2010, 2010 INT C BROADBAND, DOI DOI 10.1109/BWCCA.2010.85
[3]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[4]
Aung Win Zaw Zarni, 2013, Int. J. Sci. Technol. Res., V2, P228
[6]
Bayes T, 1968, NAIVE BAYES CLASSIFI, P1
[7]
Boser B. E., 1992, Proceedings of the Fifth Annual ACM Workshop on Computational Learning Theory, P144, DOI 10.1145/130385.130401
[8]
Poster: Towards Adversarial Detection of Mobile Malware
[J].
MOBICOM'16: PROCEEDINGS OF THE 22ND ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING,
2016,
:415-416
[10]
Herron N., 2021, P 54 HAWAII INT C SY