Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network
出版年份 2018 全文链接
标题
Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network
作者
关键词
Deep learning, Convolutional neural network, Autoencoder, Malware detection, Android applications
出版物
Journal of Ambient Intelligence and Humanized Computing
Volume -, Issue -, Pages -
出版商
Springer Nature
发表日期
2018-04-28
DOI
10.1007/s12652-018-0803-6
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework
- (2018) Vasileios A. Memos et al. Future Generation Computer Systems-The International Journal of eScience
- Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers
- (2018) Wei Wang et al. Future Generation Computer Systems-The International Journal of eScience
- Transportation Spherical Watermarking
- (2018) Yuan-Gen Wang et al. IEEE TRANSACTIONS ON IMAGE PROCESSING
- Reservoir Computing Meets Smart Grids: Attack Detection Using Delayed Feedback Networks
- (2018) Kian Hamedani et al. IEEE Transactions on Industrial Informatics
- Anonymous and Traceable Group Data Sharing in Cloud Computing
- (2018) Jian Shen et al. IEEE Transactions on Information Forensics and Security
- Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication
- (2018) Chao Shen et al. IEEE Transactions on Information Forensics and Security
- A new dynamic firefly algorithm for demand estimation of water resources
- (2018) Hui Wang et al. INFORMATION SCIENCES
- Performance evaluation of implicit smartphones authentication via sensor-behavior analysis
- (2018) Chao Shen et al. INFORMATION SCIENCES
- Abstracting massive data for lightweight intrusion detection in computer networks
- (2018) Wei Wang et al. INFORMATION SCIENCES
- Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
- (2018) Jian Shen et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Distance metric optimization driven convolutional neural network for age invariant face recognition
- (2018) Ya Li et al. PATTERN RECOGNITION
- Cognitive Multiuser Energy Harvesting Decode-and-Forward Relaying System With Direct Links
- (2018) Dongqing Xie et al. IEEE Access
- An up-to-date comparison of state-of-the-art classification algorithms
- (2017) Chongsheng Zhang et al. EXPERT SYSTEMS WITH APPLICATIONS
- Characterizing Android apps’ behavior for effective detection of malapps at large scale
- (2017) Xing Wang et al. Future Generation Computer Systems-The International Journal of eScience
- Beyond Trace Ratio: Weighted Harmonic Mean of Trace Ratios for Multiclass Discriminant Analysis
- (2017) Zhihui Li et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- Semantic Pooling for Complex Event Analysis in Untrimmed Videos
- (2017) Xiaojun Chang et al. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
- Discovering and understanding android sensor usage behaviors with data flow analysis
- (2017) Xing Liu et al. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS
- Semisupervised Feature Analysis by Mining Correlations Among Multiple Tasks
- (2017) Xiaojun Chang et al. IEEE Transactions on Neural Networks and Learning Systems
- Bi-Level Semantic Representation Analysis for Multimedia Event Detection
- (2017) Xiaojun Chang et al. IEEE Transactions on Cybernetics
- A Comparative Evaluation of Atrial Fibrillation Detection Methods in Koreans Based on Optical Recordings Using a Smartphone
- (2017) Keonsoo Lee et al. IEEE Access
- Big Data Meet Green Challenges: Greening Big Data
- (2016) Jinsong Wu et al. IEEE Systems Journal
- Big Data Meet Green Challenges: Big Data Toward Green Applications
- (2016) Jinsong Wu et al. IEEE Systems Journal
- Droiddetector: android malware characterization and detection using deep learning
- (2016) Zhenlong Yuan et al. TSINGHUA SCIENCE AND TECHNOLOGY
- New Publicly Verifiable Databases with Efficient Updates
- (2015) Xiaofeng Chen et al. IEEE Transactions on Dependable and Secure Computing
- Constructing important features from massive network traffic for lightweight intrusion detection
- (2015) Wei Wang et al. IET Information Security
- TaintDroid
- (2014) William Enck et al. ACM TRANSACTIONS ON COMPUTER SYSTEMS
- Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection
- (2014) Wei Wang et al. IEEE Transactions on Information Forensics and Security
- Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks
- (2014) Wei Wang et al. KNOWLEDGE-BASED SYSTEMS
- Analysis of Bayesian classification-based approaches for Android malware detection
- (2013) Suleiman Y. Yerima et al. IET Information Security
- Fast intrusion detection based on a non-negative matrix factorization model
- (2008) Xiaohong Guan et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Processing of massive audit data streams for real-time anomaly intrusion detection
- (2007) Wei Wang et al. COMPUTER COMMUNICATIONS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExplorePublish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn More