Reinforcement Learning Based Mobile Offloading for Cloud-Based Malware Detection
暂无分享,去创建一个
Xiaojiang Du | Liang Xiao | Geyi Sheng | Yanda Li | Xiaoyue Wan | Xiaojiang Du | Liang Xiao | Xiaoyue Wan | Yanda Li | Geyi Sheng
[1] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[2] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[3] Rajkumar Buyya,et al. Energy-traffic tradeoff cooperative offloading for mobile cloud computing , 2014, 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS).
[4] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[5] Sakir Sezer,et al. A New Android Malware Detection Approach Using Bayesian Classification , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).
[6] H. Vincent Poor,et al. A Mobile Offloading Game Against Smart Attacks , 2016, IEEE Access.
[7] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[8] Christian Bauckhage,et al. Malware Detection on Mobile Devices Using Distributed Machine Learning , 2010, 2010 20th International Conference on Pattern Recognition.
[9] Liang Xiao,et al. Mobile cloud offloading for malware detections with learning , 2015, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[10] Ali Feizollah,et al. Evaluation of machine learning classifiers for mobile malware detection , 2014, Soft Computing.
[11] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[12] Liang Xiao,et al. Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.
[13] Vincenzo Grassi,et al. A game-theoretic approach to computation offloading in mobile cloud computing , 2015, Mathematical Programming.
[14] Xiao Ma,et al. Game-theoretic Analysis of Computation Offloading for Cloudlet-based Mobile Cloud Computing , 2015, MSWiM.
[15] Xu Chen,et al. Decentralized Computation Offloading Game for Mobile Cloud Computing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[16] Xiaojiang Du,et al. Permission-combination-based scheme for Android mobile malware detection , 2014, 2014 IEEE International Conference on Communications (ICC).
[17] Rajasekhar Mungara,et al. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[18] H. Vincent Poor,et al. Two-dimensional anti-jamming communication based on deep reinforcement learning , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[19] Mohsen Guizani,et al. Stream-based cipher feedback mode in wireless error channel , 2009, IEEE Transactions on Wireless Communications.
[20] Saman A. Zonouz,et al. A cloud-based intrusion detection and response system for mobile phones , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).