共 59 条
[2]
[Anonymous], 2018, McAfee labs threats predictions report
[3]
[Anonymous], 2004, ACM SIGKDD Explorations Newsletter, DOI DOI 10.1145/1007730.1007733
[4]
[Anonymous], 2006 IEEE COMP VIS P, DOI 10.1109/CVPR.2006.100
[5]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[6]
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2594291.2594299, 10.1145/2666356.2594299]
[7]
Au K.W.Y., 2012, ACM C COMPUTER COMMU, P217
[8]
Mining Apps for Abnormal Usage of Sensitive Data
[J].
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1,
2015,
:426-436
[9]
Fully-Convolutional Siamese Networks for Object Tracking
[J].
COMPUTER VISION - ECCV 2016 WORKSHOPS, PT II,
2016, 9914
:850-865