A comprehensive survey on deep learning based malware detection techniques

M Gopinath, SC Sethuraman - Computer Science Review, 2023 - Elsevier
Recent theoretical and practical studies have revealed that malware is one of the most
harmful threats to the digital world. Malware mitigation techniques have evolved over the …

A survey of android malware detection with deep neural models

J Qiu, J Zhang, W Luo, L Pan, S Nepal… - ACM Computing Surveys …, 2020 - dl.acm.org
Deep Learning (DL) is a disruptive technology that has changed the landscape of cyber
security research. Deep learning models have many advantages over traditional Machine …

Location privacy-preserving mechanisms in location-based services: A comprehensive survey

H Jiang, J Li, P Zhao, F Zeng, Z Xiao… - ACM Computing Surveys …, 2021 - dl.acm.org
Location-based services (LBSs) provide enhanced functionality and convenience of
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …

A review of android malware detection approaches based on machine learning

K Liu, S Xu, G Xu, M Zhang, D Sun, H Liu - IEEE access, 2020 - ieeexplore.ieee.org
Android applications are developing rapidly across the mobile ecosystem, but Android
malware is also emerging in an endless stream. Many researchers have studied the …

[HTML][HTML] DL-Droid: Deep learning based android malware detection using real devices

MK Alzaylaee, SY Yerima, S Sezer - Computers & Security, 2020 - Elsevier
The Android operating system has been the most popular for smartphones and tablets since
2012. This popularity has led to a rapid raise of Android malware in recent years. The …

A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

Computation offloading toward edge computing

L Lin, X Liao, H Jin, P Li - Proceedings of the IEEE, 2019 - ieeexplore.ieee.org
We are living in a world where massive end devices perform computing everywhere and
everyday. However, these devices are constrained by the battery and computational …

A multimodal deep learning method for android malware detection using various features

TG Kim, BJ Kang, M Rho, S Sezer… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With the widespread use of smartphones, the number of malware has been increasing
exponentially. Among smart devices, android devices are the most targeted devices by …

A private and efficient mechanism for data uploading in smart cyber-physical systems

Z Cai, X Zheng - IEEE Transactions on Network Science and …, 2018 - ieeexplore.ieee.org
To provide fine-grained access to different dimensions of the physical world, the data
uploading in smart cyber-physical systems suffers novel challenges on both energy …

Angora: Efficient fuzzing by principled search

P Chen, H Chen - 2018 IEEE Symposium on Security and …, 2018 - ieeexplore.ieee.org
Fuzzing is a popular technique for finding software bugs. However, the performance of the
state-of-the-art fuzzers leaves a lot to be desired. Fuzzers based on symbolic execution …