共 59 条
- [2] [Anonymous], 2018, McAfee labs threats predictions report
- [3] [Anonymous], 2004, ACM SIGKDD EXPLOR NE, DOI DOI 10.1145/1007730.1007733
- [4] [Anonymous], 2004, P 21 INT C MACH LEAR, DOI DOI 10.1145/1015330.1015415
- [5] [Anonymous], 2011, Androguard
- [6] Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
- [7] Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]
- [8] Au K. W. Y., 2012, P 2012 ACM C COMP CO, DOI [10.1145/2382196.2382222, DOI 10.1145/2382196.2382222]
- [9] Mining Apps for Abnormal Usage of Sensitive Data [J]. 2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, 2015, : 426 - 436
- [10] Fully-Convolutional Siamese Networks for Object Tracking [J]. COMPUTER VISION - ECCV 2016 WORKSHOPS, PT II, 2016, 9914 : 850 - 865