Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Mobile devices have become an essential element in our day-to-day lives. The chances of
mobile attacks are rapidly increasing with the growing use of mobile devices. Exploiting …
mobile attacks are rapidly increasing with the growing use of mobile devices. Exploiting …
[HTML][HTML] Android spyware detection using machine learning: a novel dataset
MK Qabalin, M Naser, M Alkasassbeh - sensors, 2022 - mdpi.com
Smartphones are an essential part of all aspects of our lives. Socially, politically, and
commercially, there is almost complete reliance on smartphones as a communication tool, a …
commercially, there is almost complete reliance on smartphones as a communication tool, a …
Mobile spyware identification and categorization: A systematic review
Smartphones have revolutionized the way we live, work, and interact with the world. They
have become indispensable companions, seamlessly integrating into our daily routines …
have become indispensable companions, seamlessly integrating into our daily routines …
Protecting Android Devices from Malware Attacks: A State-of-the-Art Report of Concepts, Modern Learning Models and Challenges
Advancements in microelectronics have increased the popularity of mobile devices like
cellphones, tablets, e-readers, and PDAs. Android, with its open-source platform, broad …
cellphones, tablets, e-readers, and PDAs. Android, with its open-source platform, broad …
A dynamic weighted federated learning for android malware classification
Android malware attacks are increasing daily at a tremendous volume, making android
users more vulnerable to cyber-attacks. Researchers have developed many machine …
users more vulnerable to cyber-attacks. Researchers have developed many machine …
Are we really protected? An investigation into the play protect service
S Hutchinson, B Zhou… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Android smartphones are becoming more and more popular each year. With this increased
user base, comes an increased need for Android OS to protect its users from malicious …
user base, comes an increased need for Android OS to protect its users from malicious …
Android trojan horse spyware attack: a practical implementation
CM Mwange, EC Cankaya - 2024 12th International …, 2024 - ieeexplore.ieee.org
Considering the popularity of rapidly growing mobile device use, this study delves into the
persistent threat of Trojan horses, focusing on one select mobile OS platform, Android. To …
persistent threat of Trojan horses, focusing on one select mobile OS platform, Android. To …
Servdroid: detecting service usage inefficiencies in android applications
Services in Android applications are frequently-used components for performing time-
consuming operations in the background. While services play a crucial role in the app …
consuming operations in the background. While services play a crucial role in the app …
A Survey of Trojan Attacks and Defenses to Deep Neural Networks
L **, X Wen, W Jiang, J Zhan - arxiv preprint arxiv:2408.08920, 2024 - arxiv.org
Deep Neural Networks (DNNs) have found extensive applications in safety-critical artificial
intelligence systems, such as autonomous driving and facial recognition systems. However …
intelligence systems, such as autonomous driving and facial recognition systems. However …
Cscdroid: Accurately detect android malware via contribution-level-based system call categorization
S Zhang, X **ao - 2017 IEEE Trustcom/BigDataSE/ICESS, 2017 - ieeexplore.ieee.org
The detection of the malicious application or malware on Android platform is a very
concerned issue. Many studies have demonstrated their effect from static property analysis …
concerned issue. Many studies have demonstrated their effect from static property analysis …