Computer Science ›› 2020, Vol. 47 ›› Issue (1): 287-292.doi: 10.11896/jsjkx.181102118
• Information Security • Previous Articles Next Articles
JIANG Peng-fei,WEI Song-jie
CLC Number:
[1]GHORBANZADEH M,CHEN Y,MA Z M,et al.A neural network approach to category validation of Android applications[C]∥2013 International Conference on Computing,Networking and Communications (ICNC).San Diego:IEEE,2013:740-744. [2]HAO H K,LI Z J,YU H B.An effective approach to measuring and assessing the risk of android application[C]∥2015 International Symposium on Theoretical Aspects of Software Enginee-ring.Nanjing,China:IEEE,2015:31-38. [3]WANG R,FENG D G,YANG Y,et al.Semantics-Based Malware Behavior Signature Extraction and Detection Method[J]. Journal of Software,2012,23(2):378-393. [4]WEI S J,YANG L.Android Malware Characterization Based on Static Analysis of Hierarchical API Usage[J].Computer Science,2015,42(1):155-158. [5]CHUANG H Y,WANG S D.Machine learning based hybrid behavior models for Android malware analysis[C]∥2015 IEEE International Conference on Software Quality,Reliability and Security.Vancouver:IEEE,2015:201-206. [6]MINN S,FU S,LV T.Algorithm for exact recovery of Bayesian network for classification[J].Application Research of Compu-ters,2016,33(5):1327-1334. [7]ESTE A,GRINGOLI F,SALGARELLI L.Support vector machines for TCP traffic classification[J].Computer Networks,2009,53(14):2476-2490. [8]ZANDER S,NGUYEN T,ARMITAGE G.Automated traffic classification and application identification using machine lear-ning[C]∥The IEEE Conference on Local Computer Networks 30th Anniversary (LCN’05) l.Sydney:IEEE,2005:250-257. [9]ZHOU Z H,FENG J.Deep forest:Towards an alternative to deep neural networks[J].arXiv:1702.08835,2017. [10]WANG J Y,XU M K,WANG H Y,et al.Automated Detection of the Inconsistence between App Behavior and Privacy Policy of Android Apps[J].Journal of Frontiers of Computer Science and Technology,2019,13(1):56-69. [11]ZHOU Z H.Ensemble methods:foundations and algorithms [M].CRC Press,2012. [12]CHEN T Q,GUESTRIN C.Xgboost:A scalable tree boosting system[C]∥Proceedings of the 22nd Acmsigkdd International Conference on Knowledge Discovery and Data Mining.New York:ACM,2016:785-794. [13]WANG K F,GOU C,DUAN Y J,et al.Generative Adversarial Networks:The State of the Art and Beyond [J].Acta Automatica Sinica,2017,43(3):321-332. [14]ARJOVSKY M,CHINTALA S,BOTTOU L.Wasserstein gan[J].arXiv:1701.07875,2017. [15]GULRAJANI I,AHMED F,ARJOVSKY M,et al.Improved training of wasserstein gans[C]∥Advances in Neural Information Processing Systems.Long Beach,USA:Neural Informaton Processing Sysmtes,2017:5767-5777. |
[1] | ZHANG Jia, DONG Shou-bin. Cross-domain Recommendation Based on Review Aspect-level User Preference Transfer [J]. Computer Science, 2022, 49(9): 41-47. |
[2] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[3] | DAI Zhao-xia, LI Jin-xin, ZHANG Xiang-dong, XU Xu, MEI Lin, ZHANG Liang. Super-resolution Reconstruction of MRI Based on DNGAN [J]. Computer Science, 2022, 49(7): 113-119. |
[4] | XU Guo-ning, CHEN Yi-peng, CHEN Yi-ming, CHEN Jin-yin, WEN Hao. Data Debiasing Method Based on Constrained Optimized Generative Adversarial Networks [J]. Computer Science, 2022, 49(6A): 184-190. |
[5] | YIN Wen-bing, GAO Ge, ZENG Bang, WANG Xiao, CHEN Yi. Speech Enhancement Based on Time-Frequency Domain GAN [J]. Computer Science, 2022, 49(6): 187-192. |
[6] | XU Hui, KANG Jin-meng, ZHANG Jia-wan. Digital Mural Inpainting Method Based on Feature Perception [J]. Computer Science, 2022, 49(6): 217-223. |
[7] | DOU Zhi, WANG Ning, WANG Shi-jie, WANG Zhi-hui, LI Hao-jie. Sketch Colorization Method with Drawing Prior [J]. Computer Science, 2022, 49(4): 195-202. |
[8] | GAO Zhi-yu, WANG Tian-jing, WANG Yue, SHEN Hang, BAI Guang-wei. Traffic Prediction Method for 5G Network Based on Generative Adversarial Network [J]. Computer Science, 2022, 49(4): 321-328. |
[9] | LI Si-quan, WAN Yong-jing, JIANG Cui-ling. Multiple Fundamental Frequency Estimation Algorithm Based on Generative Adversarial Networks for Image Removal [J]. Computer Science, 2022, 49(3): 179-184. |
[10] | SHI Da, LU Tian-liang, DU Yan-hui, ZHANG Jian-ling, BAO Yu-xuan. Generation Model of Gender-forged Face Image Based on Improved CycleGAN [J]. Computer Science, 2022, 49(2): 31-39. |
[11] | LI Jian, GUO Yan-ming, YU Tian-yuan, WU Yu-lun, WANG Xiang-han, LAO Song-yang. Multi-target Category Adversarial Example Generating Algorithm Based on GAN [J]. Computer Science, 2022, 49(2): 83-91. |
[12] | TAN Xin-yue, HE Xiao-hai, WANG Zheng-yong, LUO Xiao-dong, QING Lin-bo. Text-to-Image Generation Technology Based on Transformer Cross Attention [J]. Computer Science, 2022, 49(2): 107-115. |
[13] | CHEN Gui-qiang, HE Jun. Study on Super-resolution Reconstruction Algorithm of Remote Sensing Images in Natural Scene [J]. Computer Science, 2022, 49(2): 116-122. |
[14] | JIANG Zong-li, FAN Ke, ZHANG Jin-li. Generative Adversarial Network and Meta-path Based Heterogeneous Network Representation Learning [J]. Computer Science, 2022, 49(1): 133-139. |
[15] | ZHANG Wei-qi, TANG Yi-feng, LI Lin-yan, HU Fu-yuan. Image Stream From Paragraph Method Based on Scene Graph [J]. Computer Science, 2022, 49(1): 233-240. |
|