Hadm: Hybrid analysis for detection of malware

L Xu, D Zhang, N Jayasena, J Cavazos - Proceedings of SAI Intelligent …, 2018 - Springer
Android is the most popular mobile operating system with a market share of over 80%[1].
Due to its popularity and also its open source nature, Android is now the platform most …

A survey of graph comparison methods with applications to nondeterminism in high-performance computing

S Bhowmick, P Bell, M Taufer - The International Journal of …, 2023 - journals.sagepub.com
The convergence of extremely high levels of hardware concurrency and the effective overlap
of computation and communication in asynchronous executions has resulted in increasing …

Dynamic android malware classification using graph-based representations

L Xu, D Zhang, MA Alvarez, JA Morales… - 2016 IEEE 3rd …, 2016 - ieeexplore.ieee.org
Malware classification for the Android ecosystem can be performed using a range of
techniques. One major technique that has been gaining ground recently is dynamic analysis …

graphkit-learn: A Python library for graph kernels based on linear patterns

L Jia, B Gaüzère, P Honeine - Pattern Recognition Letters, 2021 - Elsevier
This paper presents graphkit-learn, the first Python library for efficient computation of graph
kernels based on linear patterns, able to address various types of graphs. Graph kernels …

Graph kernels based on linear patterns: theoretical and experimental comparisons

L Jia, B Gaüzère, P Honeine - Expert Systems with Applications, 2022 - Elsevier
Graph kernels are powerful tools to bridge the gap between machine learning and data
encoded as graphs. Most graph kernels are based on the decomposition of graphs into a set …

Parallelization of machine learning applied to call graphs of binaries for malware detection

R Searles, L Xu, W Killian… - 2017 25th Euromicro …, 2017 - ieeexplore.ieee.org
Malicious applications have become increasingly numerous. This demands adaptive,
learning-based techniques for constructing malware detection engines, instead of the …

Evolutionary binary classification using cuckoo search for malware perception in api call sequences

GB Krishna, V Radha, KVG Rao - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Malware threats are continuing to grow in volume and sophistication. Current anti-virus
software is ineffective on the new generation malware threats. Ongoing developments in …

Bridging graph and kernel spaces: a pre-image perspective

L Jia - 2021 - theses.hal.science
Graphs are able to represent a wide range of real-world data due to the nature of their
structure and their rich expressiveness. With the advance of state-of-the-artmachine learning …

Predicting the Impact of Android Malicious Samples Via Machine Learning

A Lopes, S Dave, Y Kane - Second International Conference on …, 2022 - Springer
The Android operating system, as well as smartphone apps for just about everything, is
widely available in the official Google Play store and several third-party markets …

Optimal parameter updating for optical diffusion imaging

JC Ye, KJ Webb, RP Millane… - … Conference on Image …, 1998 - ieeexplore.ieee.org
Because optical diffusion imaging is a highly nonlinear inverse problem, iterative inversion
algorithms based on the Born approximation have usually been employed as reconstruction …