参考文献/References:
[1] Anastasia S,Dennis G.Review of the mobile malware detection approaches[C]//Proceedings of the 23rd International Conference on Parallel,Distributed and Network-Based Processing.Washington,USA:IEEE Computer Society,2015:600-603.
[2]Islam R,Tian R,Batten L M,et al.Review:classification of malware based on integrated static and dynamic features[J].Journal of Network and Computer Applications,2013,36(2):646-656.
[3]Mas’Ud M Z,Sahib S,Abdollah M F,et al.Analysis of features selection and machine learning classifier in Android malware detection[C]//Proceedings of IEEE International Conference on Information Science and Applications.Washington,USA:IEEE Computer Society,2014:1-5.
[4]Zhou Yajin,Wang Zhi,Zhou Wu,et al.Hey,you,get off of my market:detecting malicious Apps in official and alternative Android markets[C]//Proceedings of the 19th Annual Network & Distributed System Security Symposium.Washington,USA:Internet Society,2012:123-129.
[5]Zhang Yuan,Yang Min,Yang Zhemin,et al.Permission use analysis for vetting undesirable behaviors in Android Apps[J].IEEE Transactions on Information Forensics and Security,2014,9(11):1828-1842.
[6]Pandita R,Xiao X,Yang W,et al.WHYPER:towards automating risk assessment of mobile applications[C]//Proceedings of the 22nd USENIX Security Symposium.Berkeley,USA:USENIX,2013:89-97.
[7]Salehi Z,Ghiasi M,Sami A.A miner for malware detection based on API function calls and their arguments[C]//Proceedings of the 16th CSI International Symposium on Artificial Intelligence and Signal Processing.Washington,USA:IEEE Computer Society,2012:563-568.
[8]卢文清,何加铭,曾兴斌,等.基于混合特征的android恶意软件静态检测[J].无线电通信技术,2014,40(6):64-68.Lu Wenqing,He Jiaming,Zeng Xingbin,et al.Android malware static detection based on hybrid features[J].Radio Communications Technology,2014,40(6):64-68.
[9]杨欢,张玉清,胡予濮,等.基于多类特征的Android应用恶意行为检测系统[J].计算机学报,2014,37(1):15-27.
Yang Huan,Zhang Yuqing,Hu Yupu,et al.A malware behavior detection system of Android applications based on multi-class features[J].Chinese Journal of Computers,2014,37(1):15-27.
[10]戚湧,胡俊,於东军.基于自组织映射与概率神经网络的增量式学习算法[J].南京理工大学学报,2013,37(1):1-6.
Qi Yong,Hu Jun,Yu Dongjun.Incremental learning algorithm based on self-organizing map and probabilistic neural network[J].Journal of Nanjing University of Science and Technology,2013,37(1):1-6.
[11]Yerima S Y,Sezer S,Muttik I.High accuracy Android malware detection using ensemble learning[J].IET Information Security,2015,9(6):313-320.
[12]胡扬波,王成现,袁杰.配网抢修移动应用系统的设计与实现[J].江苏电机工程,2014,33(3):49-52.
Hu Yangbo,Wang Chengxian,Yuan Jie.Design and realization of a mobile application system for electric distribution network rush repair[J].Jiangsu Electrical Engineering,2014,33(3):49-52.
相似文献/References:
[1]余正涛,邹俊杰,赵兴,等.基于主动学习的最小二乘支持向量机稀疏化[J].南京理工大学学报(自然科学版),2012,36(01):12.
YU Zheng-tao,ZOU Jun-jie,ZHAO Xing,et al.Sparseness of Least Squares Support Vector Machines Based on Active Learning[J].Journal of Nanjing University of Science and Technology,2012,36(01):12.
[2]潘志松,燕继坤,杨绪兵,等.单实例分类算法研究[J].南京理工大学学报(自然科学版),2009,(04):444.
PAN Zhi-song,YAN Ji-kun,YANG Xu-bing,et al.Classification Algorithm Based on Single Sample[J].Journal of Nanjing University of Science and Technology,2009,(01):444.
[3]黄双喜,张友良.并行、协同设计环境下的产品建模[J].南京理工大学学报(自然科学版),1999,(04):312.
HuangShuangxi ZhangYouliang.The Product Modeling in Concurrent and Cooperative Environment[J].Journal of Nanjing University of Science and Technology,1999,(01):312.
[4]郭英智,申继平,李大庆.平面反射系统分类方法[J].南京理工大学学报(自然科学版),1994,(04):61.
Guo Yingzhi.Research on Classified Method of Plane Reflecting System。[J].Journal of Nanjing University of Science and Technology,1994,(01):61.
[5]朱 虹,李千目,戚湧.一种基于改进最近邻算法的忠诚度预测方法[J].南京理工大学学报(自然科学版),2017,41(04):448.[doi:10.14177/j.cnki.32-1397n.2017.41.04.008]
Zhu Hong,Li Qianmu,Qi Yong.Loyalty prediction method based on improvednearest neighbor algorithm[J].Journal of Nanjing University of Science and Technology,2017,41(01):448.[doi:10.14177/j.cnki.32-1397n.2017.41.04.008]
[6]陈 昊,姜海涛,郭 静,等.基于系统调用的安卓恶意应用检测方法[J].南京理工大学学报(自然科学版),2017,41(06):720.[doi:1005-9830(2017)06-0720-05]
Chen Hao,Jiang Haitao,Guo Jing,et al.Android malware detection method based on system calls[J].Journal of Nanjing University of Science and Technology,2017,41(01):720.[doi:1005-9830(2017)06-0720-05]
[7]陆 兵,周国华,顾晓清,等.迁移拉普拉斯总间隔支持向量机[J].南京理工大学学报(自然科学版),2020,44(01):40.[doi:10.14177/j.cnki.32-1397n.2020.44.01.007]
Lu Bing,Zhou Guohua,Gu Xiaoqing,et al.Transfer learning Laplacian total margin support vector machine[J].Journal of Nanjing University of Science and Technology,2020,44(01):40.[doi:10.14177/j.cnki.32-1397n.2020.44.01.007]
[8]陈琳琳,朱惠娟,朱 俊,等.基于卷积神经网络的多尺度注意力图像分类模型[J].南京理工大学学报(自然科学版),2020,44(06):669.[doi:10.14177/j.cnki.32-1397n.2020.44.06.005]
Chen Linlin,Zhu Huijuan,Zhu Jun,et al.Multiscale attention model for image classificationbased on convolutional neural network[J].Journal of Nanjing University of Science and Technology,2020,44(01):669.[doi:10.14177/j.cnki.32-1397n.2020.44.06.005]