2020 International Conference on Networking and Network Applications (NaNA) 2020
DOI: 10.1109/nana51271.2020.00069
|View full text |Cite
|
Sign up to set email alerts
|

Android Malware Detection Based on Call Graph via Graph Neural Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Figure 1: The relationship between the K l and the model F1Figure2shows that as the proportion of node confusion increases, our method performs better, and the decline is more stable than Peng's and Li's methods[5][6]. It shows our denoising graph neural network can remove the influence of confusion attack and achieve better detection performance.…”
mentioning
confidence: 82%
“…Figure 1: The relationship between the K l and the model F1Figure2shows that as the proportion of node confusion increases, our method performs better, and the decline is more stable than Peng's and Li's methods[5][6]. It shows our denoising graph neural network can remove the influence of confusion attack and achieve better detection performance.…”
mentioning
confidence: 82%
“…In CGdroid [36], multiple node features are extracted from the disassembled methods in order to build a FCG that captures the semantic of functions. Indeed, each node is mapped to a vector of hand-designed features such as the number of string constants, the number of call and jump instructions, the associated permissions, etc.…”
Section: Fcg Approachesmentioning
confidence: 99%
“…It needs to convert the graph structure data into vectors, while the graph neural network can directly learn the features. Feng et al [ 17 ] constructed the approximate call graph from function invocation relationships to represent the app. They extracted each intra-function attributes as node features in the graph.…”
Section: Related Workmentioning
confidence: 99%