Related references
Note: Only part of the references are listed.Deep learning for effective Android malware detection using API call graph embeddings
Abdurrahman Pektas et al.
SOFT COMPUTING (2020)
DL-Droid: Deep learning based android malware detection using real devices
Mohammed K. Alzaylaee et al.
COMPUTERS & SECURITY (2020)
Similarity-based Android malware detection using Hamming distance of static binary features
Rahim Taheri et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
Intelligent mobile malware detection using permission requests and API calls
Moutaz Alazab et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning
Weina Niu et al.
SENSORS (2020)
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection
Xiao Chen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
A Systematic Literature Review of Android Malware Detection Using Static Analysis
Ya Pan et al.
IEEE ACCESS (2020)
FAMD: A Fast Multifeature Android Malware Detection Framework, Design, and Implementation
Hongpeng Bai et al.
IEEE ACCESS (2020)
Android malware detection based on system call sequences and LSTM
Xi Xiao et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2019)
AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach
Amr Amin et al.
INFORMATION (2019)
A survey on dynamic mobile malware detection
Ping Yan et al.
SOFTWARE QUALITY JOURNAL (2018)
Android User Privacy Preserving Through Crowdsourcing
Bahman Rashidi et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Detecting Android malware using Long Short-term Memory (LSTM)
R. Vinayakumar et al.
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2018)
DroidDet: Effective and robust detection of android malware using static analysis along with rotation forest model
Hui-Juan Zhu et al.
NEUROCOMPUTING (2018)
Evaluating Convolutional Neural Network for Effective Mobile Malware Detection
Fabio Martinelli et al.
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (2017)
Android resource usage risk assessment using hidden Markov model and online learning
Bahman Rashidi et al.
COMPUTERS & SECURITY (2017)
The Evolution of Android Malware and Android Analysis Techniques
Kimberly Tam et al.
ACM COMPUTING SURVEYS (2017)
MATRIX FACTORIZATION TECHNIQUES FOR RECOMMENDER SYSTEMS
Yehuda Koren et al.
COMPUTER (2009)