An Android Malware Detection Method Using Better API Contextual Information

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Conference on Information Security and Cryptology (19. : 2023 : Hangzhou) Information security and cryptology ; Part 2
1. Verfasser: Yang, Hongyu (VerfasserIn)
Weitere Verfasser: Wang, Youwei (VerfasserIn), Zhang, Liang (VerfasserIn), Hu, Ze (VerfasserIn), Jiang, Laiwei (VerfasserIn), Cheng, Xiang (VerfasserIn)
Pages:2
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2024
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Text Laundering: Mitigating Malicious Features Through Knowledge Distillation of Large Foundation Models 2024 Jiang, Yi
An Android Malware Detection Method Using Better API Contextual Information 2024 Yang, Hongyu
EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operations 2024 Chen, Dong
TIA: Token Importance Transferable Attack on Vision Transformers 2024 Fu, Tingchao
Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128 2024 Xu, Zhichao
Automatic Search of Linear Structure: Applications to Keccak and Ascon 2024 Li, Huina
Quantum Attacks: A View of Data Complexity on Offline Simon’s Algorithm 2024 Yu, Bo
Differential Privacy Enhanced Dynamic Searchable Symmetric Encryption for Cloud Environments 2024 Tu, Peiyi
Clustered Federated Learning with Inference Hash Codes Based Local Sensitive Hashing 2024 Tan, Zhou
Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber 2024 Yang, Hang
FaBFT: Flexible Asynchronous BFT Protocol Using DAG 2024 Song, Yu
An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things 2024 Jiang, Changsong
Partial Key Exposure Attack on Common Prime RSA 2024 Zheng, Mengce
An Efficient Autonomous Path Proxy Re-encryption Without Pairing for Cloud-Assisted mHealth 2024 Chen, Linghui
Improved Integral Cryptanalysis of Block Ciphers BORON and Khudra 2024 Guo, Yi
Full Round Distinguishing and Key-Recovery Attacks on SAND-2 2024 Zhang, Zhuolong
Quantum Augmented Lattice Attack on NTRU with Side Information 2024 Cheng, Qingfeng
DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection 2024 Zhang, Yinghui
Power of Randomness Recovery: Tighter CCA-Secure KEM in the QROM 2024 Li, Ziyi
TAElog: A Novel Transformer AutoEncoder-Based Log Anomaly Detection Method 2024 Zhao, Changzhi
Alle Artikel auflisten