Adversarial-Example Attacks Toward Android Malware Detection System
暂无分享,去创建一个
Henry Leung | Wei Yuan | Heng Li | ShiYao Zhou | Jiahuan Li | H. Leung | Heng Li | Wei Yuan | Shiyao Zhou | Jiahuan Li
[1] Logan Engstrom,et al. Black-box Adversarial Attacks with Limited Queries and Information , 2018, ICML.
[2] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[3] Ying Tan,et al. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN , 2017, DMBD.
[4] Neeraj Kumar,et al. MEnSuS: An efficient scheme for energy management with sustainability of cloud data centers in edge-cloud environment , 2017, Future Gener. Comput. Syst..
[5] W. Marsden. I and J , 2012 .
[6] Mohammad S. Obaidat,et al. Deep Learning-Based Content Centric Data Dissemination Scheme for Internet of Vehicles , 2018, 2018 IEEE International Conference on Communications (ICC).
[7] Jacques Klein,et al. AndroZoo++: Collecting Millions of Android Apps and Their Metadata for the Research Community , 2017, ArXiv.
[8] Jacques Klein,et al. AndroZoo: Collecting Millions of Android Apps for the Research Community , 2016, 2016 IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR).
[9] Joel J. P. C. Rodrigues,et al. SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment , 2018, IEEE Communications Magazine.
[10] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[11] Ajmal Mian,et al. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.
[12] Witawas Srisa-an,et al. Significant Permission Identification for Machine-Learning-Based Android Malware Detection , 2018, IEEE Transactions on Industrial Informatics.