Proceedings of the 2018 Artificial Intelligence and Cloud Computing Conference 2018
DOI: 10.1145/3299819.3299834
|View full text |Cite
|
Sign up to set email alerts
|

An Android Malware Detection Method Based on Deep AutoEncoder

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…It designs a specific autoencoder structure that reduces the dimension of API feature vectors extracted and transformed from APK, and uses a logistic regression model for binary classification. The experimental results show that the detection method has the best effect when the weight ratio between benign training samples and malicious training samples is 1:4 on the data set composed of 5000 benign samples and 1200 malicious samples, and the recall rate and F1 value can reach 93% and 64.3% respectively [27].…”
Section: A Malware Detection Using Deep Learning Based On Static Anamentioning
confidence: 98%
See 2 more Smart Citations
“…It designs a specific autoencoder structure that reduces the dimension of API feature vectors extracted and transformed from APK, and uses a logistic regression model for binary classification. The experimental results show that the detection method has the best effect when the weight ratio between benign training samples and malicious training samples is 1:4 on the data set composed of 5000 benign samples and 1200 malicious samples, and the recall rate and F1 value can reach 93% and 64.3% respectively [27].…”
Section: A Malware Detection Using Deep Learning Based On Static Anamentioning
confidence: 98%
“…In contrast, the adjustment of artificial super parameters takes much time. In [17] [27], the deep automatic encoder is used as the deep neural network's pre-training method to reduce the original feature vector's dimension and shorten the training time. In [16] [17] [25], it has processed the features, in [16], it uses the existing or similarity-based feature extraction method to improve the static features, to achieve the effective feature representation in malware detection.…”
Section: Research Status Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Their ability to detect anomalies without labeled data is advantageous for identifying new malware variants. Traditional machine learning algorithms, like Decision Trees, offer superior interpretability and computational efficiency but rely on manual feature engineering and have limitations in anomaly detection [19]. Deep learning approaches, such as Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs), excel in spatial and temporal contexts but require large labeled datasets and can be computationally intensive.…”
Section: Deep Autoencodermentioning
confidence: 99%
“…The aforementioned features can be represented in different forms: the vectorized representation and the graph-based representation. Features such as permissions or API calls [57]- [64], raw [65], [66] or processed [67] opcode sequences, and dynamic behaviors [68], [69] are mainly represented as vectors. Other graph-based features such as control flow graphs [70], [71] and data flow graphs [72] can be directly fed to DL models (e.g., Graph Convolutional Network [73], [74]) or embedded into vectors by graph embedding techniques (e.g., Graph2vec [75]).…”
Section: A Representation Learningmentioning
confidence: 99%