1 |
Zewen Li, Wenjie Yang, Shouheng Peng, Fan Liu: A Survey of Convolutional Neural Networks: Analysis, Applications, and Prospects (2020). ArXiv:2004.02806.
|
2 |
Keiron O'Shea, Ryan Nash: An Introduction to Convolutional Neural Networks (2015). ArXiv:1511.08458.
|
3 |
Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu: Deep Learning for Android Malware Defenses: a Systematic Literature Review. ArXiv:2103.05292v1.
|
4 |
Yi Zhang, Yuexiang Yang, Xiaolei Wang: A Novel Android Malware Detection Approach Based on Convolutional Neural Network. In: Proc. of the 2nd International Conference on Cryptography, Security and Privacy, pp. 144-149 (March 2018). https://doi.org/10.1145/3199478.3199492
DOI
|
5 |
Leo Breiman: Random Forests. Machine Learning, vol. 4(1), pp. 5-32 (2001).
DOI
|
6 |
Minghui Cai, Yuan Jiang, Cuiying Gao, Heng Li, Wei Yuan: Learning features from enhanced function call graphs for Android malware detection. Neurocomputing, vol. 423, pp. 301-307 (2021).
DOI
|
7 |
Dataset android malware permission: https://www.kaggle.com/xwolf12/datasetandroidpermissions
|
8 |
JohnShawe-Taylor, ShiliangSun: Kernel Methods and Support Vector Machines. Academic Press Library in Signal Processing, vol. 1, pp. 857-881 (2014).
DOI
|
9 |
Daniel Svozil, Vladimir Kvasnicka, Jiri Pospichal: Introduction to multi-layer feed-forward neural networks. Chemometrics and Intelligent Laboratory Systems, vol. 39(1), pp. 43-62.
DOI
|
10 |
Sepp Hochreiter, Jurgen Schmidhuber: Long Short-Term Memory. Neural Computation, vol. 9(8), pp. 1735-1780 (1997).
DOI
|
11 |
https://www.kaggle.com/razgallah/apps-base
|
12 |
https://www.kaggle.com/tamirkh/apks-dataset
|
13 |
https://www.kaggle.com/covaanalyst1/cova-dataset
|
14 |
Ali Feizollahm, Nor Badrul Anuar, Rosli Salleh, Guillermo Suarez-Tangil, Steven Furnell: AndroDialysis: Analysis of Android Intent Effectiveness in Malware Dectection. In: 30th IEEE/ACM International Conference on Automated Software Engineering (ASE) (2015).
|
15 |
Wang W., Zhao M., Gao Z., Xu G., Xian H., Li Y., Zhang X.: Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions. IEEE Access, vol. 7, pp. 67602-67631 (2019). doi:10.1109/access.2019.2918139.
DOI
|
16 |
Xu Jiang, Baolei Mao, Jun Guan, Xingli Huang: Android Malware Detection Using Fine-Grained Features. Scientific Programming (2020). https://doi.org/10.1155/2020/5190138.
|
17 |
Abdurrahman Pekta, Tankut Acarman: Deep learning for effective Android malware detection using API call graph embeddings. Soft Computing. https://doi.org/10.1007/s00500-019-03940-5.
|
18 |
P. Faruki, V. Ganmoor, V. Laxmi, M.S. Gaur, A. Bharmal: AndroSimilar: robust statistical feature signature for Android malware detection. In: Proc. of the 6th International Conference on Security of Information and Networks, ACM, pp. 152-159 (2013).
|
19 |
S.S. Shai, B.D. Shai: Understanding Machine Learning: From Theory to Algorithms. Cambridge University Press (2014).
|
20 |
Asaf Shabtai Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss: Andromaly: a behavioral malware detection framework for android devices. Journal of Intelligent Information Systems, vol. 38, pp. 161-190 (2012).
DOI
|