2020
DOI: 10.1007/978-3-030-43020-7_15
|View full text |Cite
|
Sign up to set email alerts
|

An Evaluation of One-Class Feature Selection and Classification for Zero-Day Android Malware Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Wang et al [ 33 ] discuss one-class classification methods for detecting zero-day Android malware attacks using Intra-Class Distance (ICD) feature selection method. The one-class classification methods use benign samples only to construct the detection model as opposed to the two-class models that use both benign and malware samples.…”
Section: Related Workmentioning
confidence: 99%
“…Wang et al [ 33 ] discuss one-class classification methods for detecting zero-day Android malware attacks using Intra-Class Distance (ICD) feature selection method. The one-class classification methods use benign samples only to construct the detection model as opposed to the two-class models that use both benign and malware samples.…”
Section: Related Workmentioning
confidence: 99%
“…Sharmeen et al [27] propose two different detection models using a semisupervised approach of deep learning and adaptive frameworks. Wang and Zheng [28] evaluate the performance of different one-class feature selection and classification methods for zero-day Android malware detection. Wen and Chow [29] propose using a CNN-based model to detect malware from very small sequences of binary fragments in PE files.…”
Section: Literature Surveymentioning
confidence: 99%
“…In Wang and Zheng (2020) used the intra-class distance (ICD) attribute selection approach to explore a one-class categorization framework for detecting zero-day Android malware threats. One classification systems employ only harmless examples to build the detection algorithm, whereas the two-class classification methods both use benign and malicious data.…”
Section: Related Workmentioning
confidence: 99%