Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 508-515.doi: 10.11896/jsjkx.210700103
• Information Security • Previous Articles Next Articles
YAO Ye, ZHU Yi-an, QIAN Liang, JIA Yao, ZHANG Li-xiang, LIU Rui-liang
CLC Number:
[1] China Internet Network Information Center.The 46th 《Statistical Reports on Internet Development in China》[EB/OL].http://www.gov.cn/xinwen/2020-09/29/content_5548176.htm. [2] 360 Beacon Lab,360 Security Brain.2019 Android Malware Special Report [EB/OL].https://blogs.360.cn/post/review android_malware_of_2019.html. [3] China Academy of Information and Communications Technology.White Paper on Mobile Application (App) Data Security and Personal Information Protection (2019) [EB/OL].http://www.caict.ac.cn/kxyj/qwfb/bps/201912/t20191229_272847.htm. [4] Network and Information Technology Center.Information Security Technology Personal Information Security Specification (2020 Edition) [EB/OL]. http://www.ahstu.edu.cn/wlzx/info/1011/1478.htm. [5] National Engineering Laboratory,China Academy of Informa-tion and Communications Technology,iJiami.National Mobile App Risk Monitoring and Evaluation Report (2020 3rd Quarter Edition)[EB/OL].https://www.anquanke.com/post/id/219502. [6] SHEN F,VECCHIO J D,MOHAISEN A,et al.Android Malware Detection Using Complex-Flows[C]//IEEE Transactions on Mobile Computing.2017. [7] ZHANG C,HU G,WANG Z,et al.A NOVEL SVM-BASED DETECTION METHOD FOR ANDROID MALWARE[J].Computer Applications and Software,2018,35(10):298-304. [8] LI C F ,LEE W L,SUN W.Android Malware Detection Algorithm Based on CNN and Naive Bayesian Method[J].Journal of Information Security Research,2019,5(6):470-476. [9] WANG W,LI Y,WANG X,et al.Detecting android malicious apps and categorizing benign apps with ensemble of classifiers[J].Future Generation Computer Systems,2018,78:987-994. [10] Android Developers.Motion Event [EB/OL].https://develo-per.android.com/reference/android/view/MotionEvent#getAction%28%29. [11] GREGORUTTI B ,MICHEL B ,SAINT-PIERRE P.Correlation and variable importance in random forests[J].Stats & Computing,2017,27(3):659-678. [12] SIKORA R ,AL-LAYMOUN O H.A Modified Stacking En-semble Machine Learning Algorithm Using Genetic Algorithms[J/OL].https://www.igi-global.com/Files/Ancillary/7a51f757-7e8d-4feb-8afd-2d16a8257b18_TOC.pdf. [13] DONG K Y.Research and implementation of Android malware detection method[D].Nanjing:Nanjing University of Science and Technology,2018. [14] DU W,LI J.Android malware detection and malicious behavior analysis based on semi-supervised learning[J].Journal of Information Security Research,2018,4(3):242-250. [15] QIU H J,LIAN G X,LIU Z J.Android malware detection based on combined machine learning algorithm[J].Journal of Information Technology,2019(7):59-64. [16] WANG T,LI J.Design and implementation of Android malware detection based on deep learning[J].Journal of Information Security Research,2018,4(2):140-144. [17] JIANG C.Research on Android malware detection technologybased on deep learning [D].Changsha:Hunan University. [18] HOU L Y,LUO L L,PAN L M,et al.Android Malware Detection Method Fusion Multi-feature[J].Chinese Journal of Network and Information Security,2020(1):67-74. [19] WANG G Y.Research on Android malware detection method based on multi-features [D].Xi'an:Xidian University,2020. [20] SONG L.Research on Android Local Layer Code Obfuscation Analysis Based on Machine Learning [D].Xi'an:Northwest University,2019. [21] WANG X.Research and implementation of Android mobile terminal data security protection technology [D].Beijing:Beijing University of Posts and Telecommunications,2019. [22] XU H.Research on Malware Detection Technology Based on Recurrent Neural Network [D].Beijing:Beijing University of Posts and Telecommunications,2016. [23] ALZAYLAEE M K,YERIMA S Y,SEZER S.DL-Droid:Deep learning based android malware detection using real devices[J].Computers & Security,2020,89(2):101663.1-101663.11. [24] JIANG F S.Research and implementation of malware identification based on deep learning [D].Beijing:Beijing University of Posts and Telecommunications,2019. [25] YAN B.Research on Android malware detection technologybased on multi-model fusion [D].Xi'an:Xidian University,2019. [26] MILOSEVIC N, DEHGHANTANHA A, CHOO K K R. Machine learning aided Android malware classification[J]. Compu-ters & Electrical Engineering,2017,61:266-227. |
[1] | LENG Dian-dian, DU Peng, CHEN Jian-ting, XIANG Yang. Automated Container Terminal Oriented Travel Time Estimation of AGV [J]. Computer Science, 2022, 49(9): 208-214. |
[2] | NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296. |
[3] | HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11. |
[4] | LI Yao, LI Tao, LI Qi-fan, LIANG Jia-rui, Ibegbu Nnamdi JULIAN, CHEN Jun-jie, GUO Hao. Construction and Multi-feature Fusion Classification Research Based on Multi-scale Sparse Brain Functional Hyper-network [J]. Computer Science, 2022, 49(8): 257-266. |
[5] | ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen. Study on Malware Classification Based on N-Gram Static Analysis Technology [J]. Computer Science, 2022, 49(8): 336-343. |
[6] | YU Bin, LI Xue-hua, PAN Chun-yu, LI Na. Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning [J]. Computer Science, 2022, 49(7): 248-253. |
[7] | CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323. |
[8] | WANG Jun-feng, LIU Fan, YANG Sai, LYU Tan-yue, CHEN Zhi-yu, XU Feng. Dam Crack Detection Based on Multi-source Transfer Learning [J]. Computer Science, 2022, 49(6A): 319-324. |
[9] | WANG Fei, HUANG Tao, YANG Ye. Study on Machine Learning Algorithms for Life Prediction of IGBT Devices Based on Stacking Multi-model Fusion [J]. Computer Science, 2022, 49(6A): 784-789. |
[10] | LI Ya-ru, ZHANG Yu-lai, WANG Jia-chen. Survey on Bayesian Optimization Methods for Hyper-parameter Tuning [J]. Computer Science, 2022, 49(6A): 86-92. |
[11] | ZHAO Lu, YUAN Li-ming, HAO Kun. Review of Multi-instance Learning Algorithms [J]. Computer Science, 2022, 49(6A): 93-99. |
[12] | XIAO Zhi-hong, HAN Ye-tong, ZOU Yong-pan. Study on Activity Recognition Based on Multi-source Data and Logical Reasoning [J]. Computer Science, 2022, 49(6A): 397-406. |
[13] | XU Jie, ZHU Yu-kun, XING Chun-xiao. Application of Machine Learning in Financial Asset Pricing:A Review [J]. Computer Science, 2022, 49(6): 276-286. |
[14] | YAO Xiao-ming, DING Shi-chang, ZHAO Tao, HUANG Hong, LUO Jar-der, FU Xiao-ming. Big Data-driven Based Socioeconomic Status Analysis:A Survey [J]. Computer Science, 2022, 49(4): 80-87. |
[15] | LI Ye, CHEN Song-can. Physics-informed Neural Networks:Recent Advances and Prospects [J]. Computer Science, 2022, 49(4): 254-262. |
|