Vulcnn: An image-inspired scalable vulnerability detection system

Y Wu, D Zou, S Dou, W Yang, D Xu, H ** - Proceedings of the 44th …, 2022 - dl.acm.org
Since deep learning (DL) can automatically learn features from source code, it has been
widely used to detect source code vulnerability. To achieve scalable vulnerability scanning …

Iot-based android malware detection using graph neural network with adversarial defense

R Yumlembam, B Issac, SM Jacob… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Since the Internet of Things (IoT) is widely adopted using Android applications, detecting
malicious Android apps is essential. In recent years, Android graph-based deep learning …

Black-box Adversarial Example Attack towards {FCG} Based Android Malware Detection under Incomplete Feature Information

H Li, Z Cheng, B Wu, L Yuan, C Gao, W Yuan… - 32nd USENIX Security …, 2023 - usenix.org
The function call graph (FCG) based Android malware detection methods have recently
attracted increasing attention due to their promising performance. However, these methods …

SeGDroid: An Android malware detection method based on sensitive function call graph learning

Z Liu, R Wang, N Japkowicz, HM Gomes… - Expert Systems with …, 2024 - Elsevier
Malware is still a challenging security problem in the Android ecosystem, as malware is
often obfuscated to evade detection. In such case, semantic behavior feature extraction is …

Obfuscation-resilient android malware analysis based on complementary features

C Gao, M Cai, S Yin, G Huang, H Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Existing Android malware detection methods are usually hard to simultaneously resist
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …

Structural attack against graph based android malware detection

K Zhao, H Zhou, Y Zhu, X Zhan, K Zhou, J Li… - Proceedings of the …, 2021 - dl.acm.org
Malware detection techniques achieve great success with deeper insight into the semantics
of malware. Among existing detection techniques, function call graph (FCG) based methods …

SCDetector: Software functional clone detection based on semantic tokens analysis

Y Wu, D Zou, S Dou, S Yang, W Yang… - Proceedings of the 35th …, 2020 - dl.acm.org
Code clone detection is to find out code fragments with similar functionalities, which has
been more and more important in software engineering. Many approaches have been …

Apppoet: Large language model based android malware detection via multi-view prompt engineering

W Zhao, J Wu, Z Meng - Expert Systems with Applications, 2025 - Elsevier
Due to the vast array of Android applications, their multifarious functions and intricate
behavioral semantics, attackers can adopt various tactics to conceal their genuine attack …

A deep dive inside drebin: An explorative analysis beyond android malware detection scores

N Daoudi, K Allix, TF Bissyandé, J Klein - ACM Transactions on Privacy …, 2022 - dl.acm.org
Machine learning advances have been extensively explored for implementing large-scale
malware detection. When reported in the literature, performance evaluation of machine …

IntDroid: Android malware detection based on API intimacy analysis

D Zou, Y Wu, S Yang, A Chauhan, W Yang… - ACM Transactions on …, 2021 - dl.acm.org
Android, the most popular mobile operating system, has attracted millions of users around
the world. Meanwhile, the number of new Android malware instances has grown …