DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks
暂无分享,去创建一个
Bhavya Shah | Vijay Laxmi | Manoj Singh Gaur | Parvez Faruki | Akka Zemmari | Bharat Buddhadev | Parvez Faruki | V. Laxmi | M. Gaur | A. Zemmari | B. Buddhadev | Bhavya Shah
[1] Vijay Laxmi,et al. AndroSimilar: robust statistical feature signature for Android malware detection , 2013, SIN.
[2] Mohammed S. Alam,et al. An Intelligent Multi-Agent Based Detection Framework for Classification of Android Malware , 2014, AMT.
[3] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[4] Jack W. Stokes,et al. Large-scale malware classification using random projections and neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[5] Konstantin Berlin,et al. Deep neural network based malware detection using two dimensional binary program features , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).
[6] Yann LeCun,et al. Towards Understanding the Role of Over-Parametrization in Generalization of Neural Networks , 2018, ArXiv.
[7] Jay Dave,et al. Securing SQL with Access Control for Database as a Service Model , 2016, ICTCS.
[8] Mansour Ahmadi,et al. DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware , 2017, CODASPY.
[9] Lior Rokach,et al. SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research , 2016, AISec@CCS.
[10] Vijay Laxmi,et al. DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis , 2016, Recent Advances in Computational Intelligence in Defense and Security.
[11] Yan Chen,et al. Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android , 2015, SecureComm.
[12] Vijay Laxmi,et al. Secure Random Encryption for Deduplicated Storage , 2017, ICISS.
[13] Ming Zeng,et al. Adaptive activity recognition with dynamic heterogeneous sensor fusion , 2014, 6th International Conference on Mobile Computing, Applications and Services.
[14] Jian Liu,et al. Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild , 2018, SecureComm.
[15] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[16] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[17] Shih-Hao Hung,et al. Real-time and intelligent private data protection for the Android platform , 2015, Pervasive Mob. Comput..
[18] Vijay Laxmi,et al. Android component vulnerabities: Proof of concepts and mitigation , 2016, 2016 International Conference on Information Networking (ICOIN).
[19] Patrick Traynor,et al. A Large Scale Investigation of Obfuscation Use in Google Play , 2018, ACSAC.
[20] Dafang Zhang,et al. Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion , 2017, Secur. Commun. Networks.
[21] Zhenlong Yuan,et al. Droid-Sec: deep learning in android malware detection , 2015, SIGCOMM 2015.
[22] Mauro Conti,et al. Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models , 2014, ESORICS.
[23] Muttukrishnan Rajarajan,et al. Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[24] Muttukrishnan Rajarajan,et al. Android Security: A Survey of Issues, Malware Penetration, and Defenses , 2015, IEEE Communications Surveys & Tutorials.
[25] Vijay Laxmi,et al. MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W).
[26] Christopher Krügel,et al. TriggerScope: Towards Detecting Logic Bombs in Android Applications , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[27] Geoffrey E. Hinton,et al. Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.
[28] Vijay Laxmi,et al. Secure and efficient proof of ownership for deduplicated cloud storage , 2017, SIN.
[29] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[30] Michael P. Wellman,et al. SoK: Security and Privacy in Machine Learning , 2018, 2018 IEEE European Symposium on Security and Privacy (EuroS&P).
[31] Vladimir Vovk,et al. Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection , 2016, AISec@CCS.
[32] Yanfang Ye,et al. Deep Neural Networks for Automatic Android Malware Detection , 2017, 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[33] Zhang Yi,et al. Some multistability properties of bidirectional associative memory recurrent neural networks with unsaturating piecewise linear transfer functions , 2009, Neurocomputing.
[34] Yuval Elovici,et al. “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.
[35] Juan E. Tapiador,et al. Evolution, Detection and Analysis of Malware for Smart Devices , 2014, IEEE Communications Surveys & Tutorials.
[36] Mansour Ahmadi,et al. DroidScribe: Classifying Android Malware Based on Runtime Behavior , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[37] Vijay Laxmi,et al. DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets , 2013, 2013 2nd International Conference on Advanced Computing, Networking and Security.
[38] Gianluca Stringhini,et al. Eight Years of Rider Measurement in the Android Malware Ecosystem , 2018, IEEE Transactions on Dependable and Secure Computing.
[39] Jules White,et al. Applying machine learning classifiers to dynamic Android malware detection at scale , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[40] Gianluca Dini,et al. MADAM: A Multi-level Anomaly Detector for Android Malware , 2012, MMM-ACNS.
[41] Benjamin Keinert,et al. Learning real-time ambient occlusion from distance representations , 2018, I3D.