共 50 条
[1]
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]
[Anonymous], 1997, Technical Report
[4]
Arp D., 2014, P 21 NDSS, P12
[5]
Barreno M, 2006, P 2006 ACM S INF COM, P16
[7]
A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:73-84
[8]
Biggio B., 2012, 29 INT C MACHINE LEA, P1467
[9]
Biggio B., 2013, MACHINE LEARNING KNO, P387, DOI [DOI 10.1007/978-3-642-40994, DOI 10.1007/978-3-642-40994-3_25]