2013 International Conference on Computing, Networking and Communications (ICNC) 2013
DOI: 10.1109/iccnc.2013.6504180
|View full text |Cite
|
Sign up to set email alerts
|

A neural network approach to category validation of Android applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(13 citation statements)
references
References 20 publications
0
13
0
Order By: Relevance
“…According to Ghorbanzadeh, M., Chen, Y., Ma, Z., Clancy, TC and McGwier, R. [11], where they proposed to assess the security vulnerabilities seeming in a structure of permissions of an Android application. They used a dataset of 1700 benign and malicious applications in their study, they also used an Apktool tool that allows decompiling an APK file to obtain .xml files like AndroidManifest.…”
Section: Machine Learning With Static Analysis 31mentioning
confidence: 99%
“…According to Ghorbanzadeh, M., Chen, Y., Ma, Z., Clancy, TC and McGwier, R. [11], where they proposed to assess the security vulnerabilities seeming in a structure of permissions of an Android application. They used a dataset of 1700 benign and malicious applications in their study, they also used an Apktool tool that allows decompiling an APK file to obtain .xml files like AndroidManifest.…”
Section: Machine Learning With Static Analysis 31mentioning
confidence: 99%
“…On the contrary to the existing methods proposed in [4,[26][27][28][29]36], our employed datasets have a large number of fine-grained categories, all the utilized features in AndroClass are stable and clearly represent the actual functionalities of the app, AndroClass does not need to access the users' smartphones for feature extraction and thereby does not pose any issues to the user privacy, our method can be applied to classify unreleased or newly released apps as well, and Andro-Class does not utilize existing third-party tools for feature extraction. In Sections 2 and 3.5, we discuss these issues in detail.…”
Section: Introductionmentioning
confidence: 95%
“…Ultimately, we evaluate the system utility at the sifted RBs and store the utility maximizing ones as feasible candidates. The RB allocation procedure (equations (7) and (8) and boundary point mapping) is illustrated in Algorithm (1) and (2).…”
Section: B Discrete Practical Rates (Rbs)mentioning
confidence: 99%
“…The situation is further compounded by the predictions estimating 3700 million subscriptions by 2017 in retrospect to only 250 million users in 2008 [1]. Moreover, smartphones' traffic diversity [2], arose from elastic (inelastic) traffic-generating delay-tolerant (real-time) applications, necessitates quality of service (QoS) requirements in order to elevate users' quality of experience (QoE), tightly bound to the subscriber churn [3]. As such, resource allocation researches attentive to the traffic diversity and dynamism have received significant interest.…”
Section: Introductionmentioning
confidence: 99%