[1] |
CHEN Y , GAN L , ZHANG S . Plagiarism detection in homework based on image hashing[C]// The Third International Conference of Pioneering Computer Scientists,Engineers and Educator. ICPCSEE, 2017: 424-432.
|
[2] |
ANDREWS S , VARUNBABU B S , SUBASH U . Finding the high probabilistic potential fishing zone by accelerated SVM classification[J]. International Journal of Information and Communication Technology, 2017,11(4): 576-585.
|
[3] |
PAPALEXAKIS E E , FALOUTSOS C , SIDIROPOULOS ND . Tensors for data mining and data fusion:models,applications and scalable algorithms[J]. ACM Transaction Intelligence,System,Technology, 2017,8(16): 1-4.
|
[4] |
FU D , XU Y . WASTK:a weighted abstract syntax tree kernel method for source code plagiarism detection[J]. Scientific Programming, 2017: 1-8.
|
[5] |
FANG L , LIN Y , YANG J . An efficient and packing-resilient two-phase Android cloned application detection approach[J]. Mobile Information Systems, 2017: 1-12.
|
[6] |
DU Y , WANG J LI Q . An Android malware detection approach using community structures of weighted function call graphs[J].,2017:1. IEEE Access, 2017:1.
|
[7] |
LYU F , LIN Y , YANG J . Suidroid:an efficient hardening-resilient approach to Android App clone detection[C]// 2016 IEEE Trustcom BigdataSE ISPA. IEEE, 2016: 511-518.
|
[8] |
SIVIC J , ZISSERMAN A , . Video google:a text retrieval approach to object matching in videos[C]// The Ninth IEEE International Conference on Computer Vision. IEEE, 2003: 1470-1477.
|
[9] |
SOH C , TAN H B K , ARNAATOVICH Y L . Detecting clones in Android applications through analyzing user interfaces[C]// 2015 IEEE 23rd International Conference on Program Comprehension. IEEE, 2015: 163-173.
|
[10] |
CHEN Q , WANG J , WANG Y . An online approach for detecting repackaged Android applications based on multi-user collaboration[C]// Ubiquitous Intelligence and Computing and 2015 IEEE International Conference on Autonomic and Trusted Computing. 2016: 312-315.
|
[11] |
DREBIN A . Reverse engineering,malware and goodware analysis of Android applications and more[R]. Technical Report, 2013.
|
[12] |
ZHAUNIAROVICH Y , GADYATSKAYA O , CRISPO B . Fsquadra:fast detection of repackaged applications[R]. Working Conference on Data and Applications Security and Privacy, 2014.
|
[13] |
KHOO W , MYCROFT M A , ANDERSON R . Rendezvous:a search engine for binary code[C]// The 10th Working Conference on Mining Software Repositories (MSR). IEEE, 2013: 329-338.
|
[14] |
PEWNY J , GARMANY B , GAWLIK R ,et al. Cross-architecture bug search in binary executables[C]// 2015 IEEE Symposium on Security and Privacy. IEEE, 2015: 709-724.
|
[15] |
FENG Q , ZHOU R . Scalable graph-based bug search for malware images[C]// The 2016 ACM SIGSA. 2016: 480-491.
|
[16] |
ZHOU W , ZHOU Y,GRACEM . fast,scalable detection of piggy- backed mobile applications[C]// The Third ACM Conference on Data and Application Security and Privacy. 2013: 185-196.
|
[17] |
DAVID Y , YAHAV E . Tracelet-based code search in executables[C]// The 35th ACM SIGPLAN Conference on Programming Language Design and Implementation. 2014: 349-360.
|
[18] |
ARP D , SPREITZENBARTH M , HUBNER M . Drebin:effective and explainable detection of Android malware in your pocket[C]// In Network and Distributed System Security Symposium. 2014.
|
[19] |
LUKAS W , MATTHIAS N , MARTINA L . Andrubis:Android malware under the magnifying glass[R]. Vienna Univeristy of Technology, 2014.
|
[20] |
ENCK W , GILBERT P , CHUN B . Taintdroid:an information tracking system for realtime privacy monitoring on smartphones[C]// The 9th USENIX Conference on Operating Systems Design and Implementation. 2010: 393-407.
|
[21] |
TANG J QU M , . LINE:large-scale information network embedding[C]// The 24th International Conference on World Wide Web. 2015: 1067-1077.
|
[22] |
LIU Z , CHEN C . POSTER:neural network-based graph embedding for malicious accounts detection[C]// The 2017 ACM CCS. 2017: 2543-2545.
|
[23] |
CHEN K , LIU P , ZHANG Y . Achieving accuracy and scalability simultaneously in detecting application clones on android markets[C]// 36th International Conference on Software Engineering. 2014: 175-186.
|
[24] |
WANG H , GUO Y , MA Z . Wukong:a scalable and accurate two-phase approach to Android App clone detection[C]// The 2015 Internatinal Symposium on Software,Testing and Analysis. ACM, 2015: 71-82.
|