Vulcnn: An image-inspired scalable vulnerability detection system
Since deep learning (DL) can automatically learn features from source code, it has been
widely used to detect source code vulnerability. To achieve scalable vulnerability scanning …
widely used to detect source code vulnerability. To achieve scalable vulnerability scanning …
Iot-based android malware detection using graph neural network with adversarial defense
Since the Internet of Things (IoT) is widely adopted using Android applications, detecting
malicious Android apps is essential. In recent years, Android graph-based deep learning …
malicious Android apps is essential. In recent years, Android graph-based deep learning …
Black-box Adversarial Example Attack towards {FCG} Based Android Malware Detection under Incomplete Feature Information
The function call graph (FCG) based Android malware detection methods have recently
attracted increasing attention due to their promising performance. However, these methods …
attracted increasing attention due to their promising performance. However, these methods …
SeGDroid: An Android malware detection method based on sensitive function call graph learning
Malware is still a challenging security problem in the Android ecosystem, as malware is
often obfuscated to evade detection. In such case, semantic behavior feature extraction is …
often obfuscated to evade detection. In such case, semantic behavior feature extraction is …
Obfuscation-resilient android malware analysis based on complementary features
Existing Android malware detection methods are usually hard to simultaneously resist
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …
Structural attack against graph based android malware detection
Malware detection techniques achieve great success with deeper insight into the semantics
of malware. Among existing detection techniques, function call graph (FCG) based methods …
of malware. Among existing detection techniques, function call graph (FCG) based methods …
SCDetector: Software functional clone detection based on semantic tokens analysis
Code clone detection is to find out code fragments with similar functionalities, which has
been more and more important in software engineering. Many approaches have been …
been more and more important in software engineering. Many approaches have been …
Apppoet: Large language model based android malware detection via multi-view prompt engineering
W Zhao, J Wu, Z Meng - Expert Systems with Applications, 2025 - Elsevier
Due to the vast array of Android applications, their multifarious functions and intricate
behavioral semantics, attackers can adopt various tactics to conceal their genuine attack …
behavioral semantics, attackers can adopt various tactics to conceal their genuine attack …
A deep dive inside drebin: An explorative analysis beyond android malware detection scores
Machine learning advances have been extensively explored for implementing large-scale
malware detection. When reported in the literature, performance evaluation of machine …
malware detection. When reported in the literature, performance evaluation of machine …
IntDroid: Android malware detection based on API intimacy analysis
Android, the most popular mobile operating system, has attracted millions of users around
the world. Meanwhile, the number of new Android malware instances has grown …
the world. Meanwhile, the number of new Android malware instances has grown …