[1] 杨欢.协议漏洞挖掘及Android平台恶意应用检测技术研究[D].西安:西安电子科技大学,2014:2-3.(YANG H. Research on protocols vulnerability discovery and Android malware detection[D]. Xi'an:Xidian University, 2014:2-3.) [2] 360互联网安全中心.2015年中国手机安全状况报告[R/OL].[2016-09-15].http://zt.360.cn/1101061855.php?dtid=1101061451&did=1101593997.(360 Internet Security Center. China mobile security status report 2015[R/OL].[2016-09-15]. http://zt.360.cn/1101061855.php?dtid=1101061451&did=1101593997.) [3] SCHMIDT A D, BYE R, SCHMIDT H G, et al. Static analysis of executables for collaborative malware detection on Android[C]//Proceedings of the 2009 IEEE International Conference on Communications. Piscataway, NJ:IEEE, 2009:631-635. [4] SHABTAI A, KANONOV U, ELOVICI Y, et al. "Andromaly":a behavioral malware detection framework for android devices[J]. Journal of Intelligent Information Systems, 2012, 38(1):161-190. [5] BURGUERA I, ZURUTUZA U, NADJM-TEHRANI S. Crowdroid:behavior-based malware detection system for Android[C]//SPSM'11:Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. New York:ACM, 2011:15-26. [6] HINTON G E, OSINDERO S, TEH Y W. A fast learning algorithm for deep belief nets[J]. Neural Computation, 2006, 18(7):1527-1554 [7] SALAKHUTDINOV R, HINTON G E. Deep Boltzmann machines[C]//Proceedings of the 12th International Conference on Artificial Intelligence and Statistics.[S.l.]:AISTATS, 2009:448-455. [8] 孙志军,薛磊,许阳明,等.深度学习研究综述[J].计算机应用研究,2012,29(8):2806-2810.(SUN Z J, XUE L, XU Y M, et al. Overview of deep learning[J]. Application Research of Computers, 2012, 29(8):2806-2810.) [9] YUAN Z L, LU Y Q, XUE Y B. DroidDetector:Android malware characterization and detection using deep learning[J]. Tsinghua Science and Technology, 2016, 21(1):114-123. [10] 陈宇,郑德权,赵铁军.基于Deep Belief Nets 的中文名实体关系抽取[J].软件学报,2012,23(10):2572-2585.(CHEN Y, ZHENG D Q, ZHAO T J. Chinese relation extraction based on deep belief nets[J]. Journal of Software, 2012, 23(10):2572-2585.) [11] HINTON G E, SEJNOWSKI T J. Learning and relearning in Boltzmann machines[M]//Parallel Distributed Processing:Explorations in the Microstructure of Cognition. Cambridge, MA:MIT Press, 1986:282-317. [12] HINTON G E. A practical guide to training restricted Boltzmann machines[R]. Toronto:University of Toronto, Machine Learning Group, 2010. [13] HINTON G E. Training products of experts by minimizing contrastive divergence[J]. Neural Computation, 2002, 14(8):1771-1800. [14] CARREIRA-PERPINAN M A, HINTON G E. On contrastive divergence learning[C]//Proceedings of the 2005 Tenth International Conference on Artificial Intelligence and Statistics.[S.l.]:AISTATS, 2005:33-40. |