[1] ZHU J W, WU Z G, GUAN Z, et al. API sequences based malware detection for Android[C]//Proceedings of the 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing. Piscataway, NJ:IEEE, 2016:673-676. [2] ZHANG F Y, ZHAO T Z. Malware detection and classification based on n-grams attribute similarity[C]//Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering and IEEE International Conference on Embedded and Ubiquitous Computing, 2017:793-796. [3] TANG W, JIN G, HE J, et al. Extending Android security enforcement with a security distance model[C]//Proceedings of the 2011 International Conference on Internet Technology and Applications. Piscataway, NJ:IEEE, 2011:1-4. [4] 李寅, 范明钰, 王光卫. 基于反编译的Android平台恶意代码静态分析[J]. 计算机系统应用, 2012, 21(11):187-189. (LI Y, FAN M Y, WANG G W. Decompilation-based static analysis for malware on Android platform[J]. Computer Systems and Applications, 2012, 21(11):187-189.) [5] 毛蔚轩, 蔡忠闽, 童力. 一种基于主动学习的恶意代码检测方法[J]. 软件学报, 2017, 28(2):384-397. (MAO Y X, CAI Z M, TONG L. Malware detection method based on active learning[J]. Journal of Software, 2017, 28(2):384-397.) [6] 林鑫.基于沙盒的Android恶意软件检测技术研究[J]. 电子设计工程, 2016, 24(12):48-50, 53. (LIN X. Malware detection technology research of Android platform based on sandbox[J]. Electronic Design Engineering, 2016, 24(12):48-50, 53.) [7] YEWALE A, SINGH M. Malware detection based on opcode frequency[C]//Proceedings of the 2016 International Conference on Advanced Communication Control and Computing Technologies. Piscataway, NJ:IEEE, 2016:646-649. [8] ENCK W,GILBERT P, HAN S, et al. TaintDroid:an information-flow tracking system for realtime privacy monitoring on smartphones[J]. ACM Transactions on Computer Systems, 2014, 32(2):Article No. 5. [9] 韩晓光, 曲武, 姚宣霞, 等. 基于纹理指纹的恶意代码变种检测方法研究[J]. 通信学报, 2014, 35(8):125-136. (HAN X G, QU W, YAO X X, et al. Research on malicious code variants detection based on texture fingerprint[J]. Journal on Communications, 2014, 35(8):125-136.) [10] YANN L C, KAVUKCUOGLU K, FARABET C. Convolutional networks and applications in vision[C]//Proceedings of the 2010 IEEE International Symposium on Circuits and Systems. Piscataway, NJ:IEEE, 2010:253-256. [11] LIU W Y, WEN Y D, YU Z D, et al. Large-margin softmax loss for convolutional neural networks[C]//ICML 2016:Proceedings of the 33rd International Conference on International Conference on Machine Learning. New York:[s.n.], 2016:507-516. [12] WONGSUPHASAWAT K, SMILKOV D, WEXLlER J, et al. Visualizing dataflow graphs of deep learning models in TensorFlow[J]. IEEE Transactions on Visualization and Computer Graphics, 2018, 24(1):1-12. |