Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 421-427.
• Information Security • Previous Articles Next Articles
XU Kai-yong, XIAO Jing-xu, GUO Song, DAI Le-yu, DUAN Jia-liang
CLC Number:
[1]Mobile Operating System Market Share Worldwide[OL].http://gs.statcounter.com/os-market-share. [2]Google Play[OL].https://play.google.com. [3]《2018年Android恶意软件专题报告》[OL].https://www.anquanke.com/post/id/171110. [4]QIN Z Y,WANG Z Y,WU F B,et al.Android malware detection based on multi-level signature matching[J].Application Research of Computers,2016,33(3):891-895. [5]NING Z,SHAO D C,et al.Android Static Analysis Based on Signature and Data Flow Pattern Mining[J].Computer Science,2017,44(S2). [6]YANG H,ZHANG Y Q,HU Y P,et al.Android malware detection method based on permission sequential pattern mining algorithm[J].Journal on Communications,2017,34(S1):106-115. [7]NAVARRO L C, NAVARRO A K W,GRÉGIO A,et al.Leveraging Ontologies and Machine-learning Techniques for Malware Analysis into Android Permissions Ecosystems[J].Computers & Security,2018,78:429-453. [8]KABAKUS A T,DOGRU I A.An in-depth analysis of Android malware using hybrid techniques[J].Digital Investigation,2018,24(3):25-33. [9]YANG H,ZHANG Y Q,HU Y P,et al.Malware Behavior Detection System of Android Applications Based on Multi-Class Features[J].Chinese Journal of Computers,2014,37(1):15-27. [10]马建光,姜巍.大数据的概念,特征及其应用[J].国防科技,2013(2):10-17. [11]ENCK W,GILBERT P,HAN S,et al.TaintDroid:an information-flow tracking system for realtime privacy monitoring on smartphones[J].ACM Transactions on Computer Systems (TOCS),2014,32(2):5. [12]Android SDK[OL].https://android-sdk.en.softonic.com. [13]Androlyze.py的使用方法[OL].https://blog.csdn.net/u013107656/article/details/51790153. [14]APImonitor-DroidBox的原理分析[OL].https://code.google.com/p/droidbox/wiki/APIMonitor. [15]AKBARI R,HEDAYATZADEH R,ZIARATI K,et al.Amulti-objective artificial bee colony algorithm[J].Swarm and Evolutionary Computation,2012,2:39-52. [16]PALANISAMY S,KANMANI S.Artificial bee colony approach for optimizing feature selection[J].International Journal of Computer Science Issues (IJCSI),2012,9(3):432. [17]HANCER E,XUE B,ZHANG M,et al.Paretofront feature selection based on artificial bee colony optimization[J].Information Sciences,2018,422:462-479. [18]YUAN Z,LU Y,XUE Y.Droiddetector:android malware characterization and detection using deep learning[J].清华大学学报自然科学版(英文版),2016,21(1):114-123. [19]SARACINO A,SGANDURRA D,DINI G,et al.MADAM:Effective and Efficient Behavior-based Android Malware Detection and Prevention[C]∥IEEE Transactions on Dependable and Secure Computing.2016. [20]HANCER E,XUE B,ZHANG M,et al.Pareto front feature selection based on artificial bee colony optimization[J].Information Sciences,2018,422:462-479. |
[1] | LI Bin, WAN Yuan. Unsupervised Multi-view Feature Selection Based on Similarity Matrix Learning and Matrix Alignment [J]. Computer Science, 2022, 49(8): 86-96. |
[2] | HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78. |
[3] | KANG Yan, WANG Hai-ning, TAO Liu, YANG Hai-xiao, YANG Xue-kun, WANG Fei, LI Hao. Hybrid Improved Flower Pollination Algorithm and Gray Wolf Algorithm for Feature Selection [J]. Computer Science, 2022, 49(6A): 125-132. |
[4] | CHU An-qi, DING Zhi-jun. Application of Gray Wolf Optimization Algorithm on Synchronous Processing of Sample Equalization and Feature Selection in Credit Evaluation [J]. Computer Science, 2022, 49(4): 134-139. |
[5] | SUN Lin, HUANG Miao-miao, XU Jiu-cheng. Weak Label Feature Selection Method Based on Neighborhood Rough Sets and Relief [J]. Computer Science, 2022, 49(4): 152-160. |
[6] | LI Zong-ran, CHEN XIU-Hong, LU Yun, SHAO Zheng-yi. Robust Joint Sparse Uncorrelated Regression [J]. Computer Science, 2022, 49(2): 191-197. |
[7] | WU Lin, BAI Lan, SUN Meng-wei, GOU Zheng-wei. Algal Bloom Discrimination Method Using SAR Image Based on Feature Optimization Algorithm [J]. Computer Science, 2021, 48(9): 194-199. |
[8] | ZHANG Ye, LI Zhi-hua, WANG Chang-jie. Kernel Density Estimation-based Lightweight IoT Anomaly Traffic Detection Method [J]. Computer Science, 2021, 48(9): 337-344. |
[9] | YANG Lei, JIANG Ai-lian, QIANG Yan. Structure Preserving Unsupervised Feature Selection Based on Autoencoder and Manifold Regularization [J]. Computer Science, 2021, 48(8): 53-59. |
[10] | HOU Chun-ping, ZHAO Chun-yue, WANG Zhi-peng. Video Abnormal Event Detection Algorithm Based on Self-feedback Optimal Subclass Mining [J]. Computer Science, 2021, 48(7): 199-205. |
[11] | HU Yan-mei, YANG Bo, DUO Bin. Logistic Regression with Regularization Based on Network Structure [J]. Computer Science, 2021, 48(7): 281-291. |
[12] | ZHOU Gang, GUO Fu-liang. Research on Ensemble Learning Method Based on Feature Selection for High-dimensional Data [J]. Computer Science, 2021, 48(6A): 250-254. |
[13] | DING Si-fan, WANG Feng, WEI Wei. Relief Feature Selection Algorithm Based on Label Correlation [J]. Computer Science, 2021, 48(4): 91-96. |
[14] | TENG Jun-yuan, GAO Meng, ZHENG Xiao-meng, JIANG Yun-song. Noise Tolerable Feature Selection Method for Software Defect Prediction [J]. Computer Science, 2021, 48(12): 131-139. |
[15] | ZHANG Ya-chuan, LI Hao, SONG Chen-ming, BU Rong-jing, WANG Hai-ning, KANG Yan. Hybrid Artificial Chemical Reaction Optimization with Wolf Colony Algorithm for Feature Selection [J]. Computer Science, 2021, 48(11A): 93-101. |
|