2022
DOI: 10.1016/j.asoc.2022.109044
|View full text |Cite
|
Sign up to set email alerts
|

Cryptocurrency malware detection in real-world environment: Based on multi-results stacking learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 15 publications
0
1
0
Order By: Relevance
“…are valid at the same time, it proves that the results required by both parties are correct and equal, or the protocol is terminated; (10) Alice decodes the points W 1i , W 2i to obtain points d 1i , d 1i ; Bob decodes the points…”
Section: Protocol Startmentioning
confidence: 84%
See 1 more Smart Citation
“…are valid at the same time, it proves that the results required by both parties are correct and equal, or the protocol is terminated; (10) Alice decodes the points W 1i , W 2i to obtain points d 1i , d 1i ; Bob decodes the points…”
Section: Protocol Startmentioning
confidence: 84%
“…In general, deep learning has achieved good results in text-similarity-matching tasks [4][5][6]. Natural language processing is important in deep learning as a vector-based approach to solve the problem of text similarity [7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…The frequency distribution of malware opcodes appears to deviate greatly from that of non-malicious software as rarer opcodes appear to explain greater variance in frequency than common opcodes [21]. Although the opcode feature can be beneficial for malware classification, it is limited by its incapability to define the invocation connections between instructions [26].…”
Section: Static Analysismentioning
confidence: 99%