Related references
Note: Only part of the references are listed.PARCIV: Recognizing physical activities having complex interclass variations using semantic data of smartphone
Muhammad Usman Sarwar et al.
SOFTWARE-PRACTICE & EXPERIENCE (2021)
Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system
Mohit Mittal et al.
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2021)
Analyzing the Effectiveness and Contribution of Each Axis of Tri-Axial Accelerometer Sensor for Accurate Activity Recognition
Abdul Rehman Javed et al.
SENSORS (2020)
Intelligent Reward-Based Data Offloading in Next-Generation Vehicular Networks
Gunasekaran Raja et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
IoT malicious traffic identification using wrapper-based feature selection mechanisms
Muhammad Shafiq et al.
COMPUTERS & SECURITY (2020)
KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks
Celestine Iwendi et al.
IEEE ACCESS (2020)
Research on data mining of permissions mode for Android malware detection
Chao Wang et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique
Nguyen Tan Cam et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
Personal Volunteer Computing
Erick Lavoie et al.
CF '19 - PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS (2019)
AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection
Ali Feizollah et al.
COMPUTERS & SECURITY (2017)
Droiddetector: android malware characterization and detection using deep learning
Zhenlong Yuan et al.
TSINGHUA SCIENCE AND TECHNOLOGY (2016)
Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization
Monika et al.
11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS (2016)
Droid-Sec: Deep Learning in Android Malware Detection
Zhenlong Yuan et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2014)