2021
DOI: 10.1049/ise2.12030
|View full text |Cite
|
Sign up to set email alerts
|

Feature selection‐based android malware adversarial sample generation and detection method

Abstract: With the popularisation of Android smartphones, the value of mobile application security research has increased. The emergence of adversarial technology makes it possible for malware to evade detection. Therefore, research is conducted on Android malicious applications of adversarial attack. To clarify the process and theory of adversarial sample generation, an adversarial sample generation algorithm is proposed that filters features based on feature spatial distribution and definition. These features are modi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 42 publications
0
4
0
Order By: Relevance
“…A novel feature selection was used in detecting malwares, which relies on modi ed whale optimization algorithm [32]. Malware attacks are most common among android mobiles, a new technique based on frequency differential enhancement was used in detecting android malware [33]. As malware can change their appearance or behavior to avoid detection, a e cient method was used with the combination of structural and behavioral features for reducing dimensionality and improve the quality of features [34].…”
Section: Cic Dataset Autoencoder-decoders Binarymentioning
confidence: 99%
“…A novel feature selection was used in detecting malwares, which relies on modi ed whale optimization algorithm [32]. Malware attacks are most common among android mobiles, a new technique based on frequency differential enhancement was used in detecting android malware [33]. As malware can change their appearance or behavior to avoid detection, a e cient method was used with the combination of structural and behavioral features for reducing dimensionality and improve the quality of features [34].…”
Section: Cic Dataset Autoencoder-decoders Binarymentioning
confidence: 99%
“…In recent years, many methods have been proposed to improve the robustness of models. In general, there are three kinds of defense methods, including adversarial training [15,[23][24][25], adversarial detection [26][27][28], and input transformation defenses [29][30][31][32][33][34].…”
Section: Adversarial Defensesmentioning
confidence: 99%
“…The adversarial sample generation algorithm is based on feature space [15] distribution and feature filtering.…”
Section: Xiangjun LI Et Almentioning
confidence: 99%