共 25 条
[1]
Amini S, 2017, PROCEEDINGS OF THE 2017 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), P70, DOI 10.1109/ECRIME.2017.7945056
[2]
[Anonymous], 2020, ANALYTICS INDIA MAGA
[3]
[Anonymous], 2015, INTRO CONVOLUTIONAL
[4]
Chebyshev V, 2020, IT THREAT EVOLUTION
[5]
Xception: Deep Learning with Depthwise Separable Convolutions
[J].
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017),
2017,
:1800-1807
[6]
Dongfang Li, 2018, 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE), P184, DOI 10.1109/ICACCE.2018.8441737
[7]
Hutchinson S, 2019, IEEE INT CONF BIG DA, P4997, DOI [10.1109/bigdata47090.2019.9006100, 10.1109/BigData47090.2019.9006100]
[8]
Jianming Zhang, 2018, 2018 IEEE 4th International Conference on Computer and Communications (ICCC). Proceedings, P2190, DOI 10.1109/CompComm.2018.8781037
[9]
Android Malware Detection using Convolutional Neural Networks and Data Section Images
[J].
PROCEEDINGS OF THE 2018 CONFERENCE ON RESEARCH IN ADAPTIVE AND CONVERGENT SYSTEMS (RACS 2018),
2018,
:149-153
[10]
Kaushik P, 2018, NOVEL APPROACH DETEC, P1, DOI [10.1109/IC3.2018.8530668, DOI 10.1109/IC3.2018.8530668]