Can we trust your explanations? Sanity checks for interpreters in Android malware analysis

M Fan, W Wei, X Xie, Y Liu, X Guan… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the rapid growth of Android malware, many machine learning-based malware analysis
approaches are proposed to mitigate the severe phenomenon. However, such classifiers …

Nt-gnn: Network traffic graph for 5g mobile iot android malware detection

T Liu, Z Li, H Long, A Bilal - Electronics, 2023 - mdpi.com
IoT Android application is the most common implementation system in the mobile
ecosystem. As assaults have increased over time, malware attacks will likely happen on 5G …

Android malware classification using convolutional neural network and LSTM

S Hosseini, AE Nezhad, H Seilani - Journal of Computer Virology and …, 2021 - Springer
Hand phone devices are the latest technological developments of the 20th century. There is
an increasing number of fishing, sniffing and other kinds of attacks in this field of technology …

Call graph and model checking for fine-grained android malicious behaviour detection

G Iadarola, F Martinelli, F Mercaldo, A Santone - Applied Sciences, 2020 - mdpi.com
The increasing diffusion of mobile devices, widely used for critical tasks such as the
transmission of sensitive and private information, corresponds to an increasing need for …

Modeling correlation between android permissions based on threat and protection level using exploratory factor plane analysis

M Ashawa, S Morris - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
The evolution of mobile technology has increased correspondingly with the number of
attacks on mobile devices. Malware attack on mobile devices is one of the top security …

[PDF][PDF] Optimal Unification of Static and Dynamic Features for Smartphone Security Analysis.

S Kumar, S Indu, GS Walia - Intelligent Automation & Soft …, 2023 - cdn.techscience.cn
Android Smartphones are proliferating extensively in the digital world due to their
widespread applications in a myriad of fields. The increased popularity of the android …

基于特征选择的恶意Android 应用检测方法.

潘建文, 张志华, 林高毅… - Journal of Computer …, 2023 - search.ebscohost.com
随着移动互联网和Android 操作系统的快速发展, 运行于Android 系统的应用程序同样发展迅速,
但隐藏在其中的恶意应用对用户的财产和隐私安全带来了严重威胁. 针对Android …

Learning on graphs with graph convolution

Q Li - 2023 - theses.lib.polyu.edu.hk
Graph convolutional neural networks (GCNN) have been the model of choice for graph
representation learning, which is mainly due to the effective design of graph convolution that …

Research on family classification based on graph similarity

Z Guo, X Liu - Second International Symposium on Computer …, 2022 - spiedigitallibrary.org
With the continuous development of mobile devices, the rapid increase in the number of
Android malware poses a huge threat to malware detection systems. By classifying malware …

[PDF][PDF] FRAUD AND MALWARE DETECTION FROM ANDROID APPLICATIONS USING THE SUPPORT VECTOR MACHINE

A Panda, PP Ray, N Sahoo - jcdronline.org
Intrusion Recognition method is software which is utilized for observing network as well as
securing from attacker. Due to tremendous change in these modern technology areas of …