2021
DOI: 10.1016/j.future.2021.02.015
|View full text |Cite
|
Sign up to set email alerts
|

Research on unsupervised feature learning for Android malware detection based on Restricted Boltzmann Machines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 49 publications
(14 citation statements)
references
References 41 publications
0
14
0
Order By: Relevance
“…Nowadays, the application of cloud database in the field of modern education has already become a trend [1,2]. e cloud database platform has the advantages of large capacity, high reliability, strong scalability, strong compatibility, and high transmission efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, the application of cloud database in the field of modern education has already become a trend [1,2]. e cloud database platform has the advantages of large capacity, high reliability, strong scalability, strong compatibility, and high transmission efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…However, it is a shocking fact that the examined 26 Android malware detection frameworks using hybrid analysis, that only nine frameworks just consider few evasion techniques such as RiskRanker ( Grace et al, 2012 ) that has initiated the issue in 2012, Mobile-Sandbox ( Hoffmann et al, 2016 ), Marvin ( Lindorfer, Neugschwandtner & Platzer, 2015 ). Recently some hybrid analysis based detection Puerta ( de la Puerta et al, 2019 ), Surendrean ( Surendran, Thomas & Emmanuel, 2020 ), Lu ( Lu et al, 2020 ), Dhalaria ( Dhalaria & Gandotra, 2021 ), Zhu ( Zhu et al, 2021 ), Nawaz ( Nawaz, 2021 ), Liu ( Liu et al, 2021 ), PNSDroid ( Kandukuru & Sharma, 2018 ), Bacci ( Bacci et al, 2018 ), DAMBA ( Zhang et al, 2020 ) has highlighted the complex evasions detection resiliency issue in their research literature; however, the proposed malware detection methods and experiments of excluded the obfuscated malware from their evaluation sheets.…”
Section: Discussionmentioning
confidence: 99%
“…Hei et al [ 18 ] used the system API call sequence as the basis for determining malware, which can be able to restore the deformed call software dynamically, partially solving the software deformation problem. Liu et al [ 19 ] used the program data stored in the PE format file to analyze and obtain the DLL file from which the program calls the system. Huang et al [ 20 ] proposed an inference tree-based analysis method.…”
Section: Related Workmentioning
confidence: 99%