[1] |
HE D , CHAN S , GUIZANI M . Mobile application security:malware threats and defenses[J]. IEEE Wireless Communications, 2015,22(1): 138-144.
|
[2] |
冯勇, 张丽颖, 顾兆旭 ,等. 面向高校多源异构数据环境的元数据集成方法[J]. 辽宁大学学报(自然科学版), 2019,46(2): 135-141.
|
|
FENG Y , ZHANG L Y , GU Z X ,et al. A metadata integration method for multi-source heterogeneous data environment in universities[J]. Journal of Liaoning University:Natural Science, 2019,46(2): 135-141.
|
[3] |
SAYYAR S , . Enhanced TWOACK based AODV protocol for intrusion detection system[C]// International Conference on Computing,Mathematics and Engineering Technologies. 2018: 1-4.
|
[4] |
MIMURA M , TANAKA H . Long-term performance of a generic intrusion detection method using Doc2vec[C]// 2017 Fifth International Symposium on Computing and Networking (CANDAR). 2017: 456-462.
|
[5] |
KHATRI V , ABENDROTH J . Mobile guard demo:network based malware detection[C]// IEEE International Conference on Trust,Security and Privacy in Computing and Communications. 2015: 1177-1179.
|
[6] |
ADEEL M , TOKARCHUK L N . Analysis of mobile P2P malware detection framework through cabir & commwarrior families[C]// IEEE Third International Conference on Privacy,Security,Risk and Trust. 2011: 1335-1343.
|
[7] |
MOGHADDAM S H , . Sensitivity analysis of static features for Android malware detection[C]// 22nd Iranian Conference on Electrical Engineering. 2014: 920-924.
|
[8] |
TRIPP O , PISTOIA M , FERRARA P ,et al. Pinpointing mobile malware using code analysis[C]// IEEE/ACM International Conference on Software Engineering and Systems. 2016: 275-276.
|
[9] |
NGUYEN TRI-HAI , YOO M . A behavior-based mobile malware detection model in software-defined networking[C]// International Conference on Information Science and Communications Technologies. 2017: 1-3.
|
[10] |
LI D F , WANG Z G , XUE Y B . Fine-grained Android malware detection based on deep learning[C]// IEEE Conference on Communications and Network Security. 2018: 1-2.
|
[11] |
YUAN Z L , LU Y Q , XUE Y B . Droiddetector:Android malware characterization and detection using deep learning[J]. Tsinghua Science and Technology, 2016,22(1): 114-123.
|
[12] |
KIM T G , KANG B J , RHO M ,et al. A multimodal deep learning method for Android malware detection using various features[J]. IEEE Transactions on Information Forensics and Security, 2019,14(3): 773-788.
|
[13] |
SU X , ZHANG D F , LI W J ,et al. A deep learning approach to Android malware feature learning and detection[C]// IEEE International Conference on Trust,Security and Privacy in Computing and Communications. 2016: 244-251.
|
[14] |
CHEN Z X , YAN Q B , HAN H B . Machine learning based mobile malware detection using highly imbalanced network traffic[C]// IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing. 2017: 588-595.
|
[15] |
ZHANG L , FAN X P . A fusion financial prediction strategy based on RNN and representative pattern discovery[C]// International Conference on Parallel and Distributed Computing,Applications and Technologies. 2017: 92-97.
|
[16] |
BENGIO Y . Learning long-term dependencies with gradient descent is difficult[J]. IEEE Transactions on Neural Networks, 2002,5(2): 157-166.
|
[17] |
BEAUFAYS S S . Long short-term memory recurrent neural network architectures for large scale acoustic modeling[J]. Computer Science, 2014,15(3): 338-342.
|
[18] |
CHO K , MERRIENBOER VAN B , GULCEHRE C . Learning phrase representations using RNN encoder-decoder for statistical machine translation[J]. Computer Science, 2014,12(1): 236-248.
|