메뉴 건너뛰기




Volumn , Issue , 2018, Pages 140-145

Tuning deep learning performance for android malware detection

Author keywords

Deep Learning; Malware Detection; Performance Tuning

Indexed keywords

ANDROID (OPERATING SYSTEM); ARTIFICIAL INTELLIGENCE; COMPUTER AIDED INSTRUCTION; COMPUTER CRIME; MALWARE;

EID: 85047741653     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SNPD.2018.8441128     Document Type: Conference Paper
Times cited : (30)

References (23)
  • 3
    • 84949671050 scopus 로고    scopus 로고
    • A cloud computing based network monitoring and threat detection system for critical infrastructures
    • Z. Chen, G. Xu, V. Mahalingam, L. Ge, J. Nguyen, W. Yu, and C. Lu. A cloud computing based network monitoring and threat detection system for critical infrastructures. Big Data Research, 3:10-23, 2016.
    • (2016) Big Data Research , vol.3 , pp. 10-23
    • Chen, Z.1    Xu, G.2    Mahalingam, V.3    Ge, L.4    Nguyen, J.5    Yu, W.6    Lu, C.7
  • 5
    • 85032434210 scopus 로고    scopus 로고
    • State-of-the-art deep learning: Evolving machine intelligence toward tomorrows intelligent network traffic control systems
    • Fourthquarter
    • Z. M. Fadlullah, F. Tang, B. Mao, N. Kato, O. Akashi, T. Inoue, and K. Mizutani. State-of-the-art deep learning: Evolving machine intelligence toward tomorrows intelligent network traffic control systems. IEEE Communications Surveys and Tutorials, 19(4):2432-2455, Fourthquarter 2017.
    • (2017) IEEE Communications Surveys and Tutorials , vol.19 , Issue.4 , pp. 2432-2455
    • Fadlullah, Z.M.1    Tang, F.2    Mao, B.3    Kato, N.4    Akashi, O.5    Inoue, T.6    Mizutani, K.7
  • 8
    • 85046378997 scopus 로고    scopus 로고
    • A survey of deep learning: Platforms, applications and emerging research trends
    • W. G. Hatcher and W. Yu. A survey of deep learning: Platforms, applications and emerging research trends. IEEE Access, 2018.
    • (2018) IEEE Access
    • Hatcher, W.G.1    Yu, W.2
  • 9
    • 84930630277 scopus 로고    scopus 로고
    • Deep learning
    • Y. LeCun, Y. Bengio, and G. Hinton. Deep learning. Nature, 521(7553):436-444, 2015.
    • (2015) Nature , vol.521 , Issue.7553 , pp. 436-444
    • LeCun, Y.1    Bengio, Y.2    Hinton, G.3
  • 10
    • 85026378512 scopus 로고    scopus 로고
    • A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications
    • Oct
    • J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao. A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5):1125-1142, Oct 2017.
    • (2017) IEEE Internet of Things Journal , vol.4 , Issue.5 , pp. 1125-1142
    • Lin, J.1    Yu, W.2    Zhang, N.3    Yang, X.4    Zhang, H.5    Zhao, W.6
  • 14
    • 84910651844 scopus 로고    scopus 로고
    • Deep learning in neural networks: An overview
    • J. Schmidhuber. Deep learning in neural networks: An overview. Neural networks, 61:85-117, 2015.
    • (2015) Neural Networks , vol.61 , pp. 85-117
    • Schmidhuber, J.1
  • 16
    • 85019760246 scopus 로고    scopus 로고
    • IEEE 802.11 network anomaly detection and attack classification: A deep learning approach
    • March
    • V. L. L. Thing. IEEE 802.11 network anomaly detection and attack classification: A deep learning approach. In 2017 IEEE Wireless Communications and Networking Conference (WCNC), pages 1-6, March 2017.
    • (2017) 2017 IEEE Wireless Communications and Networking Conference (WCNC , pp. 1-6
    • Thing, V.L.L.1
  • 19
    • 85037656743 scopus 로고    scopus 로고
    • A survey on the edge computing for the Internet of Things
    • W. Yu, F. Liang, X. He, W. G. Hatcher, C. Lu, J. Lin, and X. Yang. A survey on the edge computing for the Internet of Things. IEEE Access, 6:6900-6919, 2018.
    • (2018) IEEE Access , vol.6 , pp. 6900-6919
    • Yu, W.1    Liang, F.2    He, X.3    Hatcher, W.G.4    Lu, C.5    Lin, J.6    Yang, X.7
  • 23
    • 85030541939 scopus 로고    scopus 로고
    • DeepFlow: Deep learningbased malware detection by mining Android application for abnormal usage of sensitive data
    • July
    • D. Zhu, H. Jin, Y. Yang, D. Wu, and W. Chen. DeepFlow: Deep learningbased malware detection by mining Android application for abnormal usage of sensitive data. In 2017 IEEE Symposium on Computers and Communications (ISCC), pages 438-443, July 2017.
    • (2017) 2017 IEEE Symposium on Computers and Communications (ISCC , pp. 438-443
    • Zhu, D.1    Jin, H.2    Yang, Y.3    Wu, D.4    Chen, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.