Computer Science ›› 2023, Vol. 50 ›› Issue (6A): 220300114-7.doi: 10.11896/jsjkx.220300114
• Software & Interdiscipline • Previous Articles Next Articles
FU Xiong, NIE Xiaohan, WANG Junchang
CLC Number:
[1]LI J L,WANG Y Z,LUO L G,et al.A Survey of Adversarial Attack Techniques for Android Malware Detection[J].Journal of Cyber Security,2021,6(4):28-43. [2]WANG S Y,ZHANG Y S,CENG J R,et al.Overviewof Android Malware Detection Methods[J].Computer Applications and Software,2021,38(9):1-9. [3]UTKARSH S,KULDEEP K,DEEPAKUMAR G.A Study ofCode Clone Detection Techniques in Software Systems[C]//Proceedings of the International Conference on Paradigms of Computing,Communication and Data Sciences.Springer,2021:347-359. [4]HAMID A B,STAN J.A Data Mining Approach for Detecting Higher-Level Clones in Software[J].IEEE Transactions on Software Engineering,2009,35(4):497-514. [5]CRUSSEL J,GIBLER C,HAO C.Attack of the Clones:Detecting Cloned Applications on Android Markets[C]//European Symposium on Research in Computer Secu-rity.Computer Security-ESORICS,2012:37-54. [6]NIU H,YANG T,NIU S.Clone Analysis and Detection in Android Applications[C]//International Conference on Systems and Informatics(ICSAI).IEEE,2016:520-525. [7]ZHOU W,ZHOU Y J,JIANG X X,et al.Detecting Repackaged Smartphone Applications in Third-party Android Marketplaces[C]//ACM Conference on Data and Application Security and Privacy.ACM,2012:317-326. [8]MALISA L,KOSTIAINEN K,CAPKUN S.Detecting MobileApplication Spoofing Attacks by Leveraging User Visual Similarity Perception[C]//ACM Conference on Data and Application Secu-rity and Privacy.ACM,2017:289-300. [9]SUN M,LI M,LUI J C S.DroidEagle:Seamless Detection of Visually Similar Android Apps[C]//ACM Conference on Secu-rity and Privacy in Wireless and Mobile Networks.ACM,2015:1-12. [10]ZHAUNIAROVICH Y,LEZZA A L,GADYATSKAYA O.Evaluation of Resource-Based App Repackaging Detection in Android[C]//Nordic Conference on Secure IT Systems.2016:135-151. [11]ZHU J,WU Z,ZHI G,et al.Appearance Similarity Evaluation for Android Applications[C]//International Conference on Advanced Computational Intelligence.IEEE,2015:323-328. [12]LIU B,NATH S,GOVINDAN R,et al.DECAF:Detecting and Characterizing Ad Fraud in Mobile Apps[C]//USENIX Confe-rence on Networked Systems Design and Implementation(NSDI’14).USENIX Association,2014:57-70. [13]KAICHEN.A List of Shared Libraries and AdLibraries Used in Android Apps[EB/OL].(2014-02-20)[2022-03-03].http://sites.psu.edu/kaichen/2014/02/20/a-list-of-shared-libraries-and-adlibraries-used-in-android-apps/. [14]LUXEMBOURG UNIVERSITY.AndroZoo[EB/OL].(2019-03-21)[2022-03-03].https://androzoo.uni.lu/repackaging. [15]ARP D,SPREITZENBARTH M,HUBNER M,et al.DREBIN:Effective and Explainable Detection of Android Malware in Your Pocket[C]//Network and Distributed System Security Sympo-sium.2014:23-38. [16]LI L,BISSYANDE T F,KLEIN J.SimiDroid:Identifying and Explaining Similarities in Android Apps[C]//IEEE Trustcom/BigDataSE/ICESS.IEEE,2017:136-143. |
[1] | YUAN Jiangfeng, LI Haoxiang, YOU Wei, HUANG Jianjun, SHI Wenchang, LIANG Bin. Locating Third-party Library Functions in Obfuscated Applications [J]. Computer Science, 2023, 50(7): 293-301. |
[2] | LIU Hongyi, WANG Rui, WU Guanfeng, ZHANG Yang. Diesel Engine Fault Diagnosis Based on Kernel Robust Manifold Nonnegative Matrix Factorizationand Fusion Features [J]. Computer Science, 2023, 50(6A): 220400128-8. |
[3] | HUANG Xundi, PANG Xiongwen. Review of Intelligent Device Fault Diagnosis Based on Deep Learning [J]. Computer Science, 2023, 50(5): 93-102. |
[4] | YU Xingzhan, LU Tianliang, DU Yanhui, WANG Xirui, YANG Cheng. Android Malware Family Classification Method Based on Synthetic Image and Xception Improved Model [J]. Computer Science, 2023, 50(4): 351-358. |
[5] | WU Han, NIE Jiahao, ZHANG Zhaowei, HE Zhiwei, GAO Mingyu. Deep Learning-based Visual Multiple Object Tracking:A Review [J]. Computer Science, 2023, 50(4): 77-87. |
[6] | YANG Xiaoyu, LI Chao, CHEN Shunyao, LI Haoliang, YIN Guangqiang. Text-Image Cross-modal Retrieval Based on Transformer [J]. Computer Science, 2023, 50(4): 141-148. |
[7] | ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112. |
[8] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[9] | ZHANG Yuan, KANG Le, GONG Zhao-hui, ZHANG Zhi-hong. Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM [J]. Computer Science, 2022, 49(7): 31-39. |
[10] | LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11. |
[11] | YAO Ye, ZHU Yi-an, QIAN Liang, JIA Yao, ZHANG Li-xiang, LIU Rui-liang. Android Malware Detection Method Based on Heterogeneous Model Fusion [J]. Computer Science, 2022, 49(6A): 508-515. |
[12] | WANG Yi, LI Zheng-hao, CHEN Xing. Recommendation of Android Application Services via User Scenarios [J]. Computer Science, 2022, 49(6A): 267-271. |
[13] | GAO Yuan-hao, LUO Xiao-qing, ZHANG Zhan-cheng. Infrared and Visible Image Fusion Based on Feature Separation [J]. Computer Science, 2022, 49(5): 58-63. |
[14] | ZUO Jie-ge, LIU Xiao-ming, CAI Bing. Outdoor Image Weather Recognition Based on Image Blocks and Feature Fusion [J]. Computer Science, 2022, 49(3): 197-203. |
[15] | REN Shou-peng, LI Jin, WANG Jing-ru, YUE Kun. Ensemble Regression Decision Trees-based lncRNA-disease Association Prediction [J]. Computer Science, 2022, 49(2): 265-271. |
|