相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Dynamic Prototype Network Based on Sample Adaptation for Few-Shot Malware Detection
Yuhan Chai et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2023)
A Malicious Mining Code Detection Method Based on Multi-Features Fusion
Shudong Li et al.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)
A new secure arrangement for privacy-preserving data collection
Jingcheng Song et al.
COMPUTER STANDARDS & INTERFACES (2022)
A Privacy-Enhanced Retrieval Technology for the Cloud-Assisted Internet of Things
Tian Wang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)
Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices
Weizheng Wang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)
Malicious mining code detection based on ensemble learning in cloud computing environment
Shudong Li et al.
SIMULATION MODELLING PRACTICE AND THEORY (2021)
A Novel Web Attack Detection System for Internet of Things via Ensemble Classification
Chaochao Luo et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)
Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques
Shudong Li et al.
SECURITY AND COMMUNICATION NETWORKS (2021)
Blockchain-Based On-Demand Computing Resource Trading in IoV-Assisted Smart City
Xi Lin et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2021)
A Comprehensive Study on Learning-Based PE Malware Family Classification Methods
Yixuan Ma et al.
PROCEEDINGS OF THE 29TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '21) (2021)
IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture
Danish Vasan et al.
COMPUTER NETWORKS (2020)
Secrecy Performance Analysis of UAV Assisted Relay Transmission for Cognitive Network With Energy Harvesting
Baofeng Ji et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
Emerging Technologies for 5G-IoV Networks: Applications, Trends and Opportunities
Wei Duan et al.
IEEE NETWORK (2020)
Malware Classification on Imbalanced Data through Self-Attention
Yu Ding et al.
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) (2020)
Multimodal Machine Learning: A Survey and Taxonomy
Tadas Baltrusaitis et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2019)
A Novel Solutions for Malicious Code Detection and Family Clustering Based on Machine Learning
Hangfeng Yang et al.
IEEE ACCESS (2019)
Decentralized On-Demand Energy Supply for Blockchain in Internet of Things: A Microgrids Approach
Jianan Li et al.
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2019)
Learning under Concept Drift: A Review
Jie Lu et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2019)
Malware identification using visualization images and deep learning
Sang Ni et al.
COMPUTERS & SECURITY (2018)
Extremely randomized trees
P Geurts et al.
MACHINE LEARNING (2006)