4.6 Article

Research on data mining of permissions mode for Android malware detection

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

A new algorithm of stock data mining in Internet of Multimedia Things

Jinfei Yang et al.

JOURNAL OF SUPERCOMPUTING (2020)

Article Computer Science, Information Systems

被撤回的出版物: A novel technique applied to the economic investigation of recommender system (Retracted article. See SEP, 2022)

Jinfei Yang et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

Thermal comfort research on human CT data modeling

Qingzhen Xu et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Mathematics, Applied

Lower bounds for the blow-up time to a nonlinear viscoelastic wave equation with strong damping

Xiaoming Peng et al.

APPLIED MATHEMATICS LETTERS (2018)

Article Mathematics, Applied

Pure Weierstrass gaps from a quotient of the Hermitian curve

Shudi Yang et al.

FINITE FIELDS AND THEIR APPLICATIONS (2018)

Article Statistics & Probability

Generalized varying coefficient partially linear measurement errors models

Jun Zhang et al.

ANNALS OF THE INSTITUTE OF STATISTICAL MATHEMATICS (2017)

Article Computer Science, Interdisciplinary Applications

Correlation analysis with additive distortion measurement errors

Jun Zhang et al.

JOURNAL OF STATISTICAL COMPUTATION AND SIMULATION (2017)

Article Mathematics, Applied

The weight distributions of two classes of p-ary cyclic codes with few weights

Shudi Yang et al.

FINITE FIELDS AND THEIR APPLICATIONS (2017)

Article Mathematics, Applied

Weierstrass semigroups from Kummer extensions

Shudi Yang et al.

FINITE FIELDS AND THEIR APPLICATIONS (2017)

Article Computer Science, Information Systems

Social media analytics and value creation in urban smart tourism ecosystems

Tobias Brandt et al.

INFORMATION & MANAGEMENT (2017)

Article Mathematics

Convexity of level sets of minimal graph on space form with nonnegative curvature

Peihe Wang et al.

JOURNAL OF DIFFERENTIAL EQUATIONS (2017)

Article Mathematics, Applied

On the pullback attractor for the non-autonomous SIR equations with diffusion

Wen Tan et al.

JOURNAL OF MATHEMATICAL ANALYSIS AND APPLICATIONS (2017)

Article Mathematics

On small bases which admit points with two expansions

Derong Kong et al.

JOURNAL OF NUMBER THEORY (2017)

Article Computer Science, Artificial Intelligence

One-class collaborative filtering based on rating prediction and ranking prediction

Gai Li et al.

KNOWLEDGE-BASED SYSTEMS (2017)

Article Computer Science, Artificial Intelligence

An algorithm for event detection based on social media data

Wenjuan Cui et al.

NEUROCOMPUTING (2017)

Article Statistics & Probability

A moderate deviation principle for stochastic Volterra equation

Yumeng Li et al.

STATISTICS & PROBABILITY LETTERS (2017)

Article Computer Science, Interdisciplinary Applications

Extraction and analysis of city's tourism districts based on social media data

Hu Shao et al.

COMPUTERS ENVIRONMENT AND URBAN SYSTEMS (2017)

Article Mathematics, Applied

Existence and concentration of solutions of Schrodinger Poisson system

Anmin Mao et al.

APPLIED MATHEMATICS LETTERS (2017)

Article Mathematics

Complete weight enumerators of a class of linear codes

Shudi Yang et al.

DISCRETE MATHEMATICS (2017)

Article Computer Science, Theory & Methods

Arbitrary-Order Trigonometric Fourier Collocation Methods for Multi-Frequency Oscillatory Systems

Bin Wang et al.

FOUNDATIONS OF COMPUTATIONAL MATHEMATICS (2016)

Article Mathematics

EXISTENCE OF WEAK SOLUTIONS FOR SOME SINGULAR PARABOLIC EQUATION

Li Xia et al.

ACTA MATHEMATICA SCIENTIA (2016)

Article Mathematics, Applied

Kirchhoff type problems in RN with radial potentials and locally Lipschitz functional

Anmin Mao et al.

APPLIED MATHEMATICS LETTERS (2016)

Article Mathematics, Applied

Iterative technique for a third-order differential equation with three-point nonlinear boundary value conditions

Xiuli Lin et al.

ELECTRONIC JOURNAL OF QUALITATIVE THEORY OF DIFFERENTIAL EQUATIONS (2016)

Article Mathematics, Applied

Equilibrium states of the Charney-DeVore quasi-geostrophic equation in mid-latitude atmosphere

Zhi-Min Chen et al.

JOURNAL OF MATHEMATICAL ANALYSIS AND APPLICATIONS (2016)

Article Mathematics

Quantitative versions of the joint distributions of Hecke eigenvalues

Hengcai Tang et al.

JOURNAL OF NUMBER THEORY (2016)

Article Engineering, Multidisciplinary

Exploiting Explicit and Implicit Feedback for Personalized Ranking

Gai Li et al.

MATHEMATICAL PROBLEMS IN ENGINEERING (2016)

Article Computer Science, Information Systems

A Novel Exercise Thermophysiology Comfort Prediction Model with Fuzzy Logic

Nan Jia et al.

MOBILE INFORMATION SYSTEMS (2016)

Article Computer Science, Artificial Intelligence

Data mining techniques in social media: A survey

MohammadNoor Injadat et al.

NEUROCOMPUTING (2016)

Article Computer Science, Artificial Intelligence

Pairwise probabilistic matrix factorization for implicit feedback collaborative filtering

Gai Li et al.

NEUROCOMPUTING (2016)

Article Mathematics, Applied

Local well-posedness of strong solutions to density-dependent liquid crystal system

Huajun Gong et al.

NONLINEAR ANALYSIS-THEORY METHODS & APPLICATIONS (2016)

Article Mathematics, Applied

Padovan numbers as sums over partitions into odd parts

Cristina Ballantine et al.

JOURNAL OF INEQUALITIES AND APPLICATIONS (2016)

Article Computer Science, Information Systems

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

Ala Al-Fuqaha et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)

Proceedings Paper Computer Science, Information Systems

Drebin: Effective and Explainable Detection of Android Malware in Your Pocket

Daniel Arp et al.

21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014) (2014)

Article Mathematics, Applied

Global existence and blow-up phenomena for nonlinear divergence form parabolic equations with inhomogeneous Neumann boundary conditions

Fushan Li et al.

JOURNAL OF MATHEMATICAL ANALYSIS AND APPLICATIONS (2012)

Proceedings Paper Computer Science, Artificial Intelligence

Mining Permission Request Patterns from Android and Facebook Applications

Mario Frank et al.

12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2012) (2012)

Article Mathematics, Applied

Noisy image segmentation based on wavelet transform and active contour model

Bo Chen et al.

APPLICABLE ANALYSIS (2011)

Article Mathematics, Applied

M-x/G/1 queue with multiple vacations

Qingzhen Xu et al.

STOCHASTIC ANALYSIS AND APPLICATIONS (2007)