Proceedings of the Web Conference 2021 2021
DOI: 10.1145/3442381.3450044
|View full text |Cite
|
Sign up to set email alerts
|

Robust Android Malware Detection against Adversarial Example Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 24 publications
0
10
0
Order By: Relevance
“…Recent works have revealed that the CNNs could effectively find the salient statistical differences between samples in different classes [10]. Similar to the hypothesis in [14,35], we consider that malware might have special codes for attacks, and CNNs could explore the distance between malicious and benign samples. Also, several researchers point out that DSC and self-attention mechanism [52] which is widely used in natural language processing tasks have similar effects on generating final results [11,13].…”
Section: Convolution Methodsmentioning
confidence: 61%
See 2 more Smart Citations
“…Recent works have revealed that the CNNs could effectively find the salient statistical differences between samples in different classes [10]. Similar to the hypothesis in [14,35], we consider that malware might have special codes for attacks, and CNNs could explore the distance between malicious and benign samples. Also, several researchers point out that DSC and self-attention mechanism [52] which is widely used in natural language processing tasks have similar effects on generating final results [11,13].…”
Section: Convolution Methodsmentioning
confidence: 61%
“…Feature-based Methods. In early works, deep learning models are trained from carefully crafted malware features [7,15,16,18,26,28,34,58,63]. When checking a suspicious sample, models need to extract the specific features, process them in specific ways, and then detect malicious codes to give their results.…”
Section: Deep Malware Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…According to our reviewed results, the majority of research constructs feature vectors by recording the existence of various categorical features of Android applications. Many studies create a look-up table to list all the potential features based on prior knowledge or feature selection approaches, and then build a ixed-size one-hot feature vector to represent each application [16,17,36,40,41,43,50,53,64,65,91,92,105,112,129,157,159,161,167,184,185]. For instance, Wu et al [167] identiied 158 high-risk features to construct feature vectors (including 97 API calls and 61 permissions).…”
Section: 23mentioning
confidence: 99%
“…Next, we train an MLP binary classifier with one hidden layer of 1,024 neurons and a dropout rate of 0.2. We use an MLP model because it has been successfully applied to malware classification in prior work [19,30,41,60,73].…”
Section: Experiments Setupmentioning
confidence: 99%