최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.31 no.3, 2021년, pp.433 - 441
Android applications are released across various categories, including productivity apps and games, and users are exposed to various applications and even malware depending on their usage patterns. On the other hand, most analysis engines train using existing datasets and do not reflect user pattern...
Forbes, "Many Popular Android Apps Leak Sensitive Data, Leaving Millions Of Consumers At Risk", https://www.forbes.com/sites/ajdellinger/2019/06/07/many-popular-android-apps-leak-sensitive-data-leaving-millions-of-consumers-at-risk/#69643a7b521e, last accessed Jan 2021.
D. H. Wolpert and W. G. Macready, " No free lunch theorems for optimization," IEEE Transactions on Evolutionary Computation, vol.1, no.1, pp. 67-82, Apr, 1997.
Tensorflow lite, "Deploy machine learning models on mobile and IoT devices", https://www.tensorflow.org/lite, last accessed Feb 2021.
N. Peiravian and X. Zhu, "Machine Learning for Android Malware Detection Using Permission and API Calls", 2013 IEEE 25th International Conference on Tools with Artificial Intelligence, pp.300-305, 2013.
M. Backes, S. Bugiel, O. Schranz, P. Von Styp-Rekowsky and S. Weisgerber, "ARTist: The Android Runtime Instrumentation and Security Toolkit," 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pp.481-495, 2017.
J. Wang, Y. Chen, S. Hao, W. Feng and Z. Shen, "Balanced Distribution Adaptation for Transfer Learning," 2017 IEEE International Conference on Data Mining (ICDM), pp. 1129-1134, 2017.
Tasfia Shermin et al., "Enhanced Transfer Learning with ImageNet Trained Classification Layer," Pacific-Rim Symposium on Image and Video Technology, pp.142-155, 2019.
Jason Yosinski, Jeff Clune, Yoshua Bengio and Hod Lipson, "How transferable are features in deep neural networks?," Advances in Neural Information Processing Systems, pp.3320-3328, 2014.
Ruitao Feng et al., "MobiDroid: A Performance-Sensitive Malware Detection System on Mobile Platform," 2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS), pp.61-70, 2019.
W. Yuan, Y. Jiang, H. Li and M. Cai, "A Lightweight On-Device Detection Method for Android Malware," IEEE Transactions on Systems, Man, and Cybernetics: Systems, pp.1-12, 2019.
Ryszard Wisniewski, Connor Tumbleson, "APKtool", https://ibotpeaches.github.io/Apktool/install/, 2020, last accessed Jan 2021.
Steve Norum, "Toco", https://pypi.org/project/toco/, last accessed Feb 2021.
Hyunseok Shim and Souhwan Jung, "Semantic-aware Comment Analysis Approach for API Permission Mapping on Android," NLPIR 2020: Proceedings of the 4th International Conference on Natural Language Processing and Information Retrieval, pp.61-69, 2020.
Google Play, "Android distribution", https://developer.android.com/distribute/google-play, last accessed Jan 2021.
Google, "VirusTotal", https://www.virustotal.com/, last accessed Jan 2021.
Wei Fengguo, Li Yuping, Roy Sankardas, Ou Xinming and Zhou Wu, "Deep Ground Truth Analysis of Current Android Malware," International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp.252-276, 2017.
Trend Micro, "Adware Campaign Identified From 182 Game and Camera Apps on Google Play and Third-Party Sto res Like 9Apps", https://blog.trendmicro.com/trendlabs-security-intelligence/adware-campaign-identified-from-182-game-and-camera-apps-on-google-play-and-third-party-stores-like-9apps/, last accessed Jan 2021.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.