[1] ZHOU Y, WANG Z, ZHOU W, et al. Hey, you, get off of my market:detecting malicious apps in official and alternative Android markets[EB/OL].[2015-02-10]. http://www.internetsociety.org/sites/default/files/P07_5.pdf. [2] GRACE M, ZHOU Y, ZHANG Q, et al. RiskRanker:scalable and accurate zero-day Android malware detection[C]//Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services. New York:ACM, 2012:281-294. [3] ENCK W, ONGTANG M, McDANIEL P. On lightweight mobile phone application certification[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security. New York:ACM, 2009:235-245. [4] PANDITA R, XIAO X, YANG W, et al. WHYPER:towards automating risk assessment of mobile applications[C]//SEC 2013:Proceedings of the 22nd USENIX Conference on Security. Berkeley:USENIX, 2013:527-542. [5] WEI F, ROY S, OU X. Amandroid:a precise and general inter-component data flow analysis framework for security vetting of Android APPs[C]//Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM, 2014:1329-1341. [6] ZHANG M, DUAN Y, YIN H, et al. Semantics-aware Android malware classification using weighted contextual API dependency graphs[C]//Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM, 2014:1105-1116. [7] SHABTAI A, KANONOV U, ELOVICI Y, et al. "Andromaly":a behavioral malware detection framework for Android devices[J]. Journal of Intelligent Information Systems, 2012, 38(1):161-190. [8] 彭国军, 李晶雯, 孙润康, 等. Android恶意软件检测研究与进展[J]. 武汉大学学报(理学版), 2015(1):21-33.(PENG G J, LI J W, SUN R K, et al. Android malware detection research and development[J]. Journal of Wuhan University (Natural Science Edition), 2015(1):21-33.) [9] LING G C, ASAHARA M, MATSUMOTO Y. Chinese unknown word identification using character-based tagging and chunking[C]//ACL 2003:Proceedings of the 41st Annual Meeting on Association for Computational Linguistics. Stroudsburg, PA:Association for Computational Linguistics, 2003, 2:197-200. [10] XU Y, CHEN L. Term-frequency based feature selection methods for text categorization[C]//Proceedings of the 2010 4th International Conference on Genetic and Evolutionary Computing. Piscataway, NJ:IEEE, 2010:280-283. [11] JIANG S, PANG G, WU M, et al. An improved K-nearest-neighbor algorithm for text categorization[J]. Expert Systems with Applications, 2012, 39(1):1503-1509. [12] BASRI R, JACOBS D W. Lambertian reflectance and linear subspaces[J]. IEEE Transactions on Pattern Analysis & Machine Intelligence, 2000, 25(2):383-390. [13] CAO L, LI J, SUN Y, et al. EEG-based vigilance analysis by using Fisher score and PCA algorithm[C]//Proceedings of the 2010 IEEE International Conference on Progress in Informatics and Computing. Piscataway, NJ:IEEE, 2010:175-179. [14] 丁世飞, 齐丙娟, 谭红艳. 支持向量机理论与算法研究综述[J]. 电子科技大学学报, 2011, 40(1):2-10.(DING S F, QI B J, TAN H Y. An overview on theory and algorithm of support vector machines[J]. Journal of the University of Electronic Science and Technology of China, 2011, 40(1):2-10.) [15] DING S, LI X, ZHU H, et al. Research and progress of cluster algorithms based on granular computing[J]. International Journal of Digital Content Technology & its Applications, 2010, 4(5):96-102. [16] JOLNTTI V. Do we need more anesthesia EEG indexes?[J]. Journal of Clinical Monitoring & Computing, 2013, 27(2):105-106. [17] WANG L, CHEN H, ZHAO L, et al. Efficiently mining co-location rules on interval data[C]//ADMA 2010:Proceedings of the 6th International Conference on Advanced Data Mining and Applications, LNCS 6440. Berlin:Springer, 2010:477-488. [18] SU J, ZHANG H. Full Bayesian network classifiers[EB/OL].[2015-02-10]. http://www.cs.unb.ca/profs/hzhang/publications/icml06.pdf. |