共 50 条
- [31] Control dependency analyses for detecting remote control Android malware Li, J. (lijingzhe@ruc.edu.cn), 1600, Tsinghua University (54):
- [33] Mining Dominance Tree of API Calls for Detecting Android Malware 2018 2ND INTERNATIONAL SYMPOSIUM ON MULTIDISCIPLINARY STUDIES AND INNOVATIVE TECHNOLOGIES (ISMSIT), 2018, : 192 - 195
- [35] FLSH: A Framework Leveraging Similarity Hashing for Android Malware and Variant Detection IEEE ACCESS, 2025, 13 : 26142 - 26156
- [36] Appearance Similarity Evaluation for Android Applications 2015 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE (ICACI), 2015, : 323 - 328
- [38] A review of cloned mobile malware applications for android devices 2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 394 - 398
- [40] Multilevel Permission Extraction in Android Applications for Malware Detection PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 221 - 225