| 1 |
|
| 2 |
|
|
|
| 3 |
DOǦRU A , ÖNDER M . AppPerm analyzer: malware detection system based on Android permissions and permission groups. International Journal of Software Engineering and Knowledge Engineering, 2020, 30 (3): 427- 450.
doi: 10.1142/S0218194020500175
|
| 4 |
ZOU D Q , WU Y M , YANG S R , et al. IntDroid: Android malware detection based on API intimacy analysis. ACM Transactions on Software Engineering and Methodology, 2021, 30 (3): 1- 32.
|
| 5 |
ALAZAB M , ALAZAB M , SHALAGINOV A , et al. Intelligent mobile malware detection using permission requests and API calls. Future Generation Computer Systems, 2020, 107, 509- 521.
doi: 10.1016/j.future.2020.02.002
|
| 6 |
MERCALDO F , SANTONE A . Formal equivalence checking for mobile malware detection and family classification. IEEE Transactions on Software Engineering, 2022, 48 (7): 2643- 2657.
doi: 10.1109/TSE.2021.3067061
|
| 7 |
CAI M H , JIANG Y , GAO C Y , et al. Learning features from enhanced function call graphs for Android malware detection. Neurocomputing, 2021, 423, 301- 307.
doi: 10.1016/j.neucom.2020.10.054
|
| 8 |
QIU J Y , HAN Q L , LUO W , et al. Cyber code intelligence for Android malware detection. IEEE Transactions on Cybernetics, 2023, 53 (1): 617- 627.
doi: 10.1109/TCYB.2022.3164625
|
| 9 |
DURAISAMY SOUNDRAPANDIAN P , SUBBIAH G . MULBER: effective Android malware clustering using evolutionary feature selection and mahalanobis distance metric. Symmetry, 2022, 14 (10): 2221.
doi: 10.3390/sym14102221
|
| 10 |
孙敏, 成倩, 丁希宁. 基于CBAM-CGRU-SVM的Android恶意软件检测方法. 计算机应用, 2024, 44 (5): 1539- 1545.
|
|
SUN M , CHENG Q , DING X N . CBAM-CGRU-SVM based malware detection method for Android. Journal of Computer Applications, 2024, 44 (5): 1539- 1545.
|
| 11 |
YADAV P , MENON N , RAVI V , et al. EfficientNet convolutional neural networks-based Android malware detection. Computers & Security, 2022, 115, 102622.
|
| 12 |
王海宽, 原锦明. 基于Swin-Transformer的可视化安卓恶意软件检测研究. 吉林大学学报(信息科学版), 2024, 42 (2): 339- 347.
|
|
WANG H K , YUAN J M . Research on visual Android malware detection based on Swin-Transformer. Journal of Jilin University (Information Science Edition), 2024, 42 (2): 339- 347.
|
| 13 |
SENEVIRATNE S , SHARIFFDEEN R , RASNAYAKA S , et al. Self-supervised vision transformers for malware detection. IEEE Access, 2022, 10, 103121- 103135.
doi: 10.1109/ACCESS.2022.3206445
|
| 14 |
李佳琳, 王雅哲, 罗吕根, 等. 面向安卓恶意软件检测的对抗攻击技术综述. 信息安全学报, 2021, 6 (4): 28- 43.
|
|
LI J L , WANG Y Z , LUO L G , et al. A survey of adversarial attack techniques for Android malware detection. Journal of Cyber Security, 2021, 6 (4): 28- 43.
|
| 15 |
|
| 16 |
WU W , LI B , CHEN L , et al. A review for weighted MinHash algorithms. IEEE Transactions on Knowledge and Data Engineering, 2022, 34 (6): 2553- 2573.
|
| 17 |
YU Z, YU J, FAN J P, et al. Multi-modal factorized bilinear pooling with co-attention learning for visual question answering[C]//Proceedings of the IEEE International Conference on Computer Vision (ICCV). Washington D.C., USA: IEEE Press, 2017: 1839-1848.
|
| 18 |
|
| 19 |
MNIH V, HEESS N, GRAVES A, et al. Recurrent models of visual attention[C]//Proceedings of the 28th International Conference on Neural Information Processing Systems. New York, USA: ACM Press, 2014: 2204-2212.
|
| 20 |
刘建伟, 刘俊文, 罗雄麟. 深度学习中注意力机制研究进展. 工程科学学报, 2021, 43 (11): 1499- 1511.
|
|
LIU J W , LIU J W , LUO X L . Research progress in attention mechanism in deep learning. Chinese Journal of Engineering, 2021, 43 (11): 1499- 1511.
|
| 21 |
LI J , SUN L C , YAN Q B , et al. Significant permission identification for machine-learning-based Android malware detection. IEEE Transactions on Industrial Informatics, 2018, 14 (7): 3216- 3225.
doi: 10.1109/TII.2017.2789219
|
| 22 |
YUAN W , JIANG Y , LI H , et al. A lightweight on-device detection method for Android malware. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2021, 51 (9): 5600- 5611.
doi: 10.1109/TSMC.2019.2958382
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
范铭, 刘烃, 刘均, 等. 安卓恶意软件检测方法综述. 中国科学(信息科学), 2020, 50 (8): 1148- 1177.
|
|
FAN M , LIU T , LIU J , et al. Android malware detection: a survey. Scientia Sinica (Informationis), 2020, 50 (8): 1148- 1177.
|