2020
DOI: 10.1007/s00500-019-04589-w
|View full text |Cite
|
Sign up to set email alerts
|

DroidDeep: using Deep Belief Network to characterize and detect android malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(17 citation statements)
references
References 31 publications
0
17
0
Order By: Relevance
“…A total of 32,856 features were extracted, unique features were learned using a deep learning model based on a deep belief network, and benign and malicious Android software were classified using a support vector machine. On a data set consisting of 3,986 benign applications and 3,986 malicious applications, the model's detection accuracy reached 97.4% when the ratio of benign to malicious applications was 1:1, and the average cost is 6 seconds to analyze and detect each Android application [25].…”
Section: A Malware Detection Using Deep Learning Based On Static Anamentioning
confidence: 99%
See 4 more Smart Citations
“…A total of 32,856 features were extracted, unique features were learned using a deep learning model based on a deep belief network, and benign and malicious Android software were classified using a support vector machine. On a data set consisting of 3,986 benign applications and 3,986 malicious applications, the model's detection accuracy reached 97.4% when the ratio of benign to malicious applications was 1:1, and the average cost is 6 seconds to analyze and detect each Android application [25].…”
Section: A Malware Detection Using Deep Learning Based On Static Anamentioning
confidence: 99%
“…In [17] [27], the deep automatic encoder is used as the deep neural network's pre-training method to reduce the original feature vector's dimension and shorten the training time. In [16] [17] [25], it has processed the features, in [16], it uses the existing or similarity-based feature extraction method to improve the static features, to achieve the effective feature representation in malware detection. In [17], it codes all features and uses the feature code to represent each application.…”
Section: Research Status Analysismentioning
confidence: 99%
See 3 more Smart Citations