A survey of android malware detection with deep neural models

J Qiu, J Zhang, W Luo, L Pan, S Nepal… - ACM Computing Surveys …, 2020 - dl.acm.org
Deep Learning (DL) is a disruptive technology that has changed the landscape of cyber
security research. Deep learning models have many advantages over traditional Machine …

A review of android malware detection approaches based on machine learning

K Liu, S Xu, G Xu, M Zhang, D Sun, H Liu - IEEE access, 2020 - ieeexplore.ieee.org
Android applications are developing rapidly across the mobile ecosystem, but Android
malware is also emerging in an endless stream. Many researchers have studied the …

Deep learning in mobile and wireless networking: A survey

C Zhang, P Patras, H Haddadi - IEEE Communications surveys …, 2019 - ieeexplore.ieee.org
The rapid uptake of mobile devices and the rising popularity of mobile applications and
services pose unprecedented demands on mobile and wireless networking infrastructure …

A survey on malware detection using data mining techniques

Y Ye, T Li, D Adjeroh, SS Iyengar - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed
serious and evolving security threats to Internet users. To protect legitimate users from these …

The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges

M Waqas, S Tu, Z Halim, SU Rehman, G Abbas… - Artificial Intelligence …, 2022 - Springer
Security is one of the biggest challenges concerning networks and communications. The
problem becomes aggravated with the proliferation of wireless devices. Artificial Intelligence …

Droidcat: Effective android malware detection and categorization via app-level profiling

H Cai, N Meng, B Ryder, D Yao - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Most existing Android malware detection and categorization techniques are static
approaches, which suffer from evasion attacks, such as obfuscation. By analyzing program …

The Circle of life: A {large-scale} study of the {IoT} malware lifecycle

O Alrawi, C Lever, K Valakuzhy, K Snow… - 30th USENIX Security …, 2021 - usenix.org
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …

Malicious code detection based on CNNs and multi-objective algorithm

Z Cui, L Du, P Wang, X Cai, W Zhang - Journal of Parallel and Distributed …, 2019 - Elsevier
An increasing amount of malicious code causes harm on the internet by threatening user
privacy as one of the primary sources of network security vulnerabilities. The detection of …

The rise of ransomware: Forensic analysis for windows based ransomware attacks

I Kara, M Aydos - Expert Systems with Applications, 2022 - Elsevier
While information technologies grow and propagate worldwide, malwares have modified
and risen their efficiency towards information system. Recently, the attackers have started to …

Automated testing of android apps: A systematic literature review

P Kong, L Li, J Gao, K Liu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Automated testing of Android apps is essential for app users, app developers, and market
maintainer communities alike. Given the widespread adoption of Android and the …