Computer Science ›› 2020, Vol. 47 ›› Issue (4): 298-304.doi: 10.11896/jsjkx.190700132
• Information Security • Previous Articles Next Articles
SUN Zhi-qiang, WAN Liang, DING Hong-wei
CLC Number:
[1]QING S H.Research Progress on Android Security [J].Journal of Software,2016,27(1):45-71. [2]VINOD P,AKKA Z,MAURO C.A machine learning based approach to detect malicious android apps using discriminant system calls[J].Future Generation Computer Systems,2019,94:333-350. [3]HE G F,XU B F,ZHU H T.AppFA:A Novel Approach to Detect Malicious Android Applications on the Network[J].Security and Communication Networks,2018,2018(4):1-15. [4]SAPNA M,KIRAN K.Malicious Application Detection andClassification System for Android Mobiles[J].International Journal of Ambient Computing and Intelligence,2018,9:95-114. [5]MARIOS A,NICOLA D,ANGELO S.Analysis and Evaluation of SafeDroid v2.0,a Framework for Detecting Malicious Android Applications[J].Security and Communication Networks,2018(1):1-15. [6]WANG W,LI Y Y,WANG X,et al.Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers[J].Future Generation Computer Systems,2018,78(3):987-994. [7]JUERGEN S.Deep Learning in Neural Networks:An Overview[J].Neural Networks,2015,61:85-117. [8]PRASHANT K,PANKAJ K.A Novel Approach for Detecting Malware in Android Applications Using Deep Learning[C]//2018 Eleventh International Conference on Contemporary Computing(IC3).IEEE Computer Society,2018,1:1-4. [9]LI D F,WANG Z G,XUE Y B.Fine-grained Android Malware Detection based on Deep Learning[C]//2018 IEEE Conference on Communications and Network Security(CNS).Beijing:IEEE,2018:1-2. |
[1] | ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270. |
[2] | LIU Zhang-hui, ZHENG Hong-qiang, ZHANG Jian-shan, CHEN Zhe-yi. Computation Offloading and Deployment Optimization in Multi-UAV-Enabled Mobile Edge Computing Systems [J]. Computer Science, 2022, 49(6A): 619-627. |
[3] | ZHANG Xin-ming, LI Shuang-qian, LIU Yan, MAO Wen-tao, LIU Shang-wang, LIU Guo-qi. Coyote Optimization Algorithm Based on Information Sharing and Static Greed Selection [J]. Computer Science, 2020, 47(5): 217-224. |
[4] | HU Jun-qin, ZHANG Jia-jun, HUANG Yin-hao, CHEN Xing, LIN Bing. Computation Offloading Scheduling Technology for DNN Applications in Edge Environment [J]. Computer Science, 2020, 47(10): 247-255. |
[5] | LIAO Yong, YANG Xin-yi, XIA Mao-han, WANG Bo, LI Shou-zhi, SHEN Xuan-fan. Improved Tomlinson-Harashima Precoding Based on Greedy Algorithm in High-speed Mobile Scenarios [J]. Computer Science, 2019, 46(8): 121-126. |
[6] | LI Zhuo, XU Zhe, CHEN Xin, LI Shu-qin. Location-related Online Multi-task Assignment Algorithm for Mobile Crowd Sensing [J]. Computer Science, 2019, 46(6): 102-106. |
[7] | ZHENG Fei-feng, JIANG Juan, MEI Qi-huang. Study on Stowage Optimization in Minimum Container Transportation Cost [J]. Computer Science, 2019, 46(6): 239-245. |
[8] | XIE Nian-nian, ZENG Fan-ping, ZHOU Ming-song, QIN Xiao-xia, LV Cheng-cheng, CHEN Zhao. Android Malware Detection with Multi-dimensional Sensitive Features [J]. Computer Science, 2019, 46(2): 95-101. |
[9] | YU Jian-jun, WU Chun-ming. Offline Static Virtual Network Mapping Algorithm Based on Tabu Search Genetic Optimization [J]. Computer Science, 2019, 46(12): 114-119. |
[10] | CHEN Jin-yin, HU Ke-ke,LI Yu-wei. Research on UAV Multi-point Navigation Algorithm Based on MB-RRT* [J]. Computer Science, 2018, 45(6A): 85-90. |
[11] | ZHU Rui-chao,QIAN Wen-hua,PU Yuan-yuan, XU Dan. Texture Synthesis Based on Self-similarity Matching [J]. Computer Science, 2018, 45(6A): 215-219. |
[12] | HU Qing-cheng, ZHANG Yong, XING Chun-xiao. K-clique Heuristic Algorithm for Influence Maximization in Social Network [J]. Computer Science, 2018, 45(6): 32-35. |
[13] | DU Xiu-li, GU Bin-bin, HU Xing, QIU Shao-ming and CHEN Bo. Support Similarity between Lines Based CoSaMP Algorithm for Image Reconstruction [J]. Computer Science, 2018, 45(4): 306-311. |
[14] | NING Zhuo, SHAO Da-cheng, CHEN Yong and SUN Zhi-xin. Android Static Analysis System Based on Signature and Data Flow Pattern Mining [J]. Computer Science, 2017, 44(Z11): 317-321. |
[15] | SUN Tao and ZHU Xiao-ming. Computing Longest Common Subsequences Approximately Based on Lattice [J]. Computer Science, 2017, 44(2): 270-274. |
|